SlideShare a Scribd company logo
1 of 37
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied.
Cloud Security Knowledge and
Certifications
Presented by Scott Hogg, CTO GTRI
CCIE #5133, CISSP #4610, CCSP, CCSK, AWS CSA-Associate
Colorado CSA Fall Summit – 11/10/2016
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• Securing Cloud Services
– Cloud Security Standards and Guidelines
• Cloud Security Certifications
– Cloud Security Alliance (CSA) Certificate of Cloud
Security Knowledge (CCSK)
– (ISC)2 Certified Cloud Security Professional (CCSP)
Today’s Agenda
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• Cloud Service Security Concerns/Threats
• Cloud Service Provider Security Certifications
Cloud Security Concepts
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• A breach of the Cloud Service Provider’s infrastructure can lead to a
“Hyperjacking” even whereby many customer’s data is exposed
• Examples of CSP Data Breaches:
– Google failure March 2011 deletion of 150k Gmail info
– Code Spaces goes out of business in June 2014 after AWS hack
– Google Drive breach in July 2014 hyperlink vulnerability
– Apple iCloud exposure of celebrity photos, August 2014
– Dropbox security breach in October 2014, compromising 7M user
passwords held for Bitcoin (BTC) ransom
– Worcester Polytechnic Institute (WPI) claims cross-VM RSA key
recovery in AWS, October 2015
– Datadog password breach for their AWS customers in July 2016
Concern About CSP Security
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• Cloud Security Alliance (CSA) provides advice for
securing cloud computing environments
• CSA is a US Federal 501(c)6 not-for-profit org, formed in
late 2008, now has over 48,000 members
• Mission = “promote the use of best practices for
providing security assurance within Cloud Computing,
and to provide education on the uses of Cloud
Computing to help secure all other forms of computing”
• https://cloudsecurityalliance.org/
Cloud Security Alliance (CSA)
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• CSA stated that the top three cloud computing threats are Insecure
Interfaces and API's, Data Loss & Leakage, and Hardware Failure.
• CSA’s Top 7 Security Threats (March 2010)
– https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
• In February 2013, the CSA published their “The Notorious Nine” cloud
computing top threats
– https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notor
ious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf
CSA – The Notorious Nine
1. Data Breaches
2. Data Loss
3. Account or Service Traffic
Hijacking
4. Insecure Interfaces and APIs
5. Denial of Service (DoS)
6. Malicious Insiders
7. Abuse of Cloud Services
8. Insufficient Due Diligence
9. Shared Technology Vulnerabilities
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• CSA published their newest Top 12 cloud computing
threats at 2016 RSA conference
• Threat No. 1: Data breaches
• Threat No. 2: Compromised credentials and broken
authentication
• Threat No. 3: Hacked interfaces and APIs
• Threat No. 4: Exploited system vulnerabilities
• Threat No. 5: Account hijacking
• Threat No. 6: Malicious insiders
CSA Treacherous 12 (or the Dirty Dozen)
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• Threat No. 7: The APT parasite
• Threat No. 8: Permanent data loss
• Threat No. 9: Inadequate diligence
• Threat No. 10: Cloud service abuses
• Threat No. 11: DoS attacks
• Threat No. 12: Shared technology, shared dangers
CSA Treacherous 12 (or the Dirty Dozen)
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• Customer bears more responsibility with IaaS than SaaS
Cloud Security Responsibility – A Sliding Scale
IaaS PaaS SaaS
Security GRC
Data Security
App Security
Platform Security
Infrastructure Security
Physical Security
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• Cloud Service Providers (CSPs) can obtain certifications
attesting their compliance with security standards.
– SOC 1/SSAE 16/ISAE 3402, SOC2, SOC3 American Institute of
Certified Public Accountants (AICPA) audit reports may be
requested from the provider.
– International Organization for Standardization (ISO) 27001
– Cloud Security Alliance (CSA) Security, Trust & Assurance Registry
(STAR)
– U.S. Health Insurance Portability and Accountability Act (HIPAA)
– Payment Card Industry (PCI) Data Security Standard (DSS) Level 1
service provider
– Motion Picture Association of America (MPAA)
Cloud Compliance Assurance
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• American Institute of Certified Public Accountants (AICPA)
– Wants to make sure organizations are using reliable and secure
services that their business relies upon
– Compliance with Sarbanes Oxley's (SOX) requirement (section
404)
• Statement on Auditing Standards No. 70 (SAS 70)
• Statement on Standards for Attestation Engagements (SSAE)
16
– American standard that replaces SAS 70
– Similar to the International standard ISAE 3402
– Service Organization Controls (SOC) 1, 2, & 3
– http://ssae16.com/SSAE16_overview.html
AICPA SSAE16 SOC 1/2/3
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• Service availability is a critical component of any cloud service
• CSPs operate within data centers that they may own and manage or
collocate their systems
• The Uptime Institute provides a “Tier Certification System” for assessing
critical data center infrastructure to promote increased availability
• Data Center Site Infrastructure Tier Standard: Topology
– Tier I: Basic Site Infrastructure
– Tier II: Redundant Site Infrastructure Capacity Components
– Tier III: Concurrently Maintainable Site Infrastructure
– Tier IV: Fault Tolerant Site Infrastructure
• Check the tier rating of your current data center or cloud provider
– https://uptimeinstitute.com/TierCertification/
– https://uptimeinstitute.com/TierCertification/certMaps.php
The Uptime Institute Tier Standard: Topology
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• ISO/IEC 27001:2013
– Information Security Management System (ISMS)
• ISO/IEC 17788:2014
– Information technology -- Cloud computing --
Overview and vocabulary
• ISO/IEC 17789:2014
– Information technology -- Cloud computing --
Reference architecture
ISO/IEC Cloud Security Standards
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• U.S. Federal organizations have specialized requirements for
secure cloud services.
• Civilian and DOD organizations may have to meet NIST 800-
37 and DoD Information Assurance Certification and
Accreditation Process (DIACAP) and Federal Information
Security Management Act (FISMA) compliance.
• Cloud providers may also be required to meet US
International Traffic in Arms Regulations (ITAR) compliance.
• Federal customers also need to have FIPS 140-2 security
systems running in the cloud.
• Federal Risk and Authorization Management Program
(FedRAMP) certified cloud providers are required.
U.S. Federal Cloud Security Requirements
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• The OMB requires federal agencies to use FedRAMP (Federal Risk and Authorization
Management Program) accredited cloud services for FIPS 199 Low and Moderate
system categories (Based on FISMA and NIST 800-53 Rev3 standards)
– http://www.FedRAMP.gov
• FedRAMP established the Joint Authorization Board (JAB) to approve cloud services
and monitor the process
• The JAB defines the standards by which Third Party Assessment Organizations
(3PAOs) will assess the cloud providers
• Third Party Accreditation Organizations (3PAOs) include: Coalfire, Kratos SecureInfo,
Veris Group, among others
– https://www.fedramp.gov/marketplace/accredited-3paos/
• FedRAMP Provisional Authority To Operate (ATO) issued by the JAB (after review of
security assessment package) to the federal agency consuming the cloud services
• List of FedRAMP Compliant Systems
– https://www.fedramp.gov/marketplace/compliant-systems/
FedRAMP
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• NIST Cloud Computing Public Security Working Group
• NIST SP 500-292
– NIST Cloud Computing Reference Architecture
• NIST SP 500-293
– US Government Cloud Computing Technology Roadmap Volume 1, 2 & 3
• NIST SP 500-299
– NIST Cloud Computing Security Reference Architecture
• NIST SP 800-144
– Guidelines on Security and Privacy in Public Cloud Computing
• NIST SP 800-145
– The NIST Definition of Cloud Computing
• NIST SP 800-146
– Cloud Computing Synopsis and Recommendations
NIST Guidelines on Cloud Security
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• CSA’s CCM is a gigantic spreadsheet that lists over 130
prominent control specifications across 15 control domains
and relates each to pertinent cloud security standards and
best practices
• Mappings for FedRAMP Low/Moderate, ISO/IEC 27001, NIST
800-53, among others
• This is a valuable resource to help remind you of all the
controls to consider when operating in a cloud environment
• Cloud Controls Matrix (CCM) v3.0.1 (6-6-16 Update)
– https://cloudsecurityalliance.org/group/cloud-controls-matrix/
– https://cloudsecurityalliance.org/download/cloud-controls-matrix-
v3-0-1/
CSA Cloud Controls Matrix (CCM)
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
CSA Cloud Controls Matrix (CCM)
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• Customers want to evaluate their CSPs against their
requirements and select the best provider
• Consider the CSPs position when they receive numerous
individual separate security questionnaires and assessments
from customers
• The CAIQ provides a standard template that answers most
customer queries for information
– 300-line spreadsheet that can help streamline CSP evaluation
– https://cloudsecurityalliance.org/download/consensus-
assessments-initiative-questionnaire-v3-0-1/
Consensus Assessments Initiative Questionnaire
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
Consensus Assessments Initiative Questionnaire
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• The CSA created the STAR certification for CSPs
• The STAR certification rates the CSP based on their adherence
and adoption to cloud security best practices and controls
• CSA STAR is based on the CSA’s Cloud Controls Matrix (CCM)
and the Consensus Assessments Initiative Questionnaire
(CAIQ)
• CSA STAR program provides a complimentary registry for CSPs
– https://cloudsecurityalliance.org/star/#_registry
• There are 3 levels of assurance
CSA Security Trust & Assurance Registry (STAR)
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• https://cloudsecurityalliance.org/star/
CSA Security Trust & Assurance Registry (STAR)
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• CSA CCSK
• (ISC)2 CCSP
Cloud Security Certifications
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• The CSA created a certification for individuals
• The CCSK validates that an individual has the
understanding and skills to help protect an organization
who is consuming cloud services
• The CCSK shows you the best practices and things to
consider when protecting cloud-based assets
• The CCSK domains provide a holistic cloud security
controls framework
– https://cloudsecurityalliance.org/education/ccsk/
Certificate of Cloud Security Knowledge
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• CCSK Guidance V3 has 14 domains
CCSK Body of Knowledge Domains
1. Cloud Architecture
2. Governance and Enterprise
Risk
3. Legal and Electronic Discovery
4. Compliance and Audit
5. Information Lifecycle
Management
6. Portability and Interoperability
7. Traditional Security, BCM, D/R
8. Data Center Operations
9. Incident Response
10. Application Security
11. Encryption and Key
Management
12. Identity and Access
Management
13. Virtualization
14. Security-as-a-Service
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• CCSK Training Classes are available (HP Education
Services)
– CCSK Foundation (2 days), CCSK Plus (3 days)
• CSA guidance version 3.0, Security Guidance for Critical
Areas of Focus in Cloud Computing, V3 (92% of test)
• European Network and Information Security Agency
(ENISA) whitepaper (8% of test)
– Cloud Computing: Benefits, Risks and Recommendations
for Information Security
• NIST documents (800-144, 800-145, 800-146, 500-292)
Preparing for the CCSK
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• Read the v3 FAQ and the v3 Prep guide
– https://downloads.cloudsecurityalliance.org/ccsk/CCS
K_FAQ_v3.pdf
– https://cloudsecurityalliance.org/wp-
content/uploads/2013/02/CCSK-Prep-Guide-V3.pdf
• CCSK online open-book exam costs $345
– 60 questions, 90 minutes, >80% to pass, 2 attempts
• https://ccsk.cloudsecurityalliance.org/
Taking the CCSK Exam
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• CCSK can be used for CPEs for other certs
• CSA drafted CSA Guidance version 4.0 (GitHub)
– https://github.com/cloudsecurityalliance/CSA-
Guidance
• CCSK version 4 (coming soon)
• CCSK Developer certification (in the works)
• CCSK Assurance certification (in the works)
What’s Next for the CCSK?
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• CSA and ISC2 collaborated on developing a new
cloud certification that builds upon the CCSK
Certified Cloud Security Professional (CCSP) – (ISC)2
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• The CCSP Common Body of Knowledge (CBK) consists of
the following six domains:
– 1 Architectural Concepts & Design Requirements
– 2 Cloud Data Security
– 3 Cloud Platform & Infrastructure Security
– 4 Cloud Application Security
– 5 Operations
– 6 Legal & Compliance
• ISO/IEC 17788 and NIST 800-145, 800-146, 500-299
• https://www.isc2.org/ccsp/default.aspx
Certified Cloud Security Professional (CCSP) – (ISC)2
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• Live In-Person CBK Training Class, 5 days, $1995
• Live On-Line CBK Training Class, 5 days, $1395
• On-Demand On-Line CBK Training - $495 ($395 for CISSPs)
• The Official (ISC)2 Guide to the CCSP CBK, by Adam Gordon
– ISBN: 978-1-119-20749-8, 560 pages, November 2015
– http://www.wiley.com/WileyCDA/WileyTitle/productCd-
1119207495.html
– $80, Members get 50% off with code ISC50
• Free Flash Cards On-Line
• Pearson VUE Computer-Based Exam
– 4 hours, 125 questions (>700/1000) - $549
Certified Cloud Security Professional (CCSP) – (ISC)2
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
Cloud Security Summary
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may
contain confidential information and are not to be copied.
• Security has more to do with people and processes than
technology. Good security comes down to discipline.
• If you have good InfoSec hygiene in your on-premises IT
infrastructure, you can have good cloud security operations.
• Cloud services can be less secure, equally secure, or more
secure than your traditional on-premises data center.
• It is easier to be secure from the beginning rather than try to
add security in after systems are in production.
• Good design, implementation using best practices, proper
maintenance, and vigilance will make your cloud system
secure.
• We encourage you to achieve cloud security certification to
validate your understanding of the topic area.
Cloud Security – The Bottom Line
© 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied.
Thank You For Your Time!
Scott Hogg, CTO GTRI
303-949-4865 | SHogg@gtri.com | @ScottHogg

More Related Content

What's hot

The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...Cohesive Networks
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
How to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationHow to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationExigent Technologies LLC
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Phil Agcaoili
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachAnchises Moraes
 
Cybersecurity Framework - What are Pundits Saying?
Cybersecurity Framework - What are Pundits Saying?Cybersecurity Framework - What are Pundits Saying?
Cybersecurity Framework - What are Pundits Saying?Jim Meyer
 
Top 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure InfrastructureTop 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure InfrastructureInfosec
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quanticoTuan Phan
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. ManufacturingIgnyte Assurance Platform
 
Utilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyUtilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyEnclaveSecurity
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchMcKonly & Asbury, LLP
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Phil Agcaoili
 
Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controlsEnclaveSecurity
 
Cyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its AnalysisCyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its AnalysisRahul Neel Mani
 

What's hot (20)

Security assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP PrepSecurity assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP Prep
 
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
The Chicago School of Cybersecurity: A Pragmatic Look at the NIST Cybersecuri...
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
How to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationHow to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organization
 
Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6Intel Presentation from NIST Cybersecurity Framework Workshop 6
Intel Presentation from NIST Cybersecurity Framework Workshop 6
 
Gpc case study_eng_0221
Gpc case study_eng_0221Gpc case study_eng_0221
Gpc case study_eng_0221
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data Breach
 
Cybersecurity Framework - What are Pundits Saying?
Cybersecurity Framework - What are Pundits Saying?Cybersecurity Framework - What are Pundits Saying?
Cybersecurity Framework - What are Pundits Saying?
 
Top 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure InfrastructureTop 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure Infrastructure
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
 
CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
 
Utilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyUtilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare Technology
 
Does audit make us more secure
Does audit make us more secureDoes audit make us more secure
Does audit make us more secure
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
Cybersecurity for Board of Directors - CIO Perspectives Atlanta 2015
 
Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controls
 
Cyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its AnalysisCyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its Analysis
 

Similar to Scott Hogg - Gtri cloud security knowledge and certs

IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET Journal
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptxNguyenNM
 
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...Danny Miller
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxTrongMinhHoang1
 
IRJET- Data and Technical Security Issues in Cloud Computing Databases
IRJET- Data and Technical Security Issues in Cloud Computing DatabasesIRJET- Data and Technical Security Issues in Cloud Computing Databases
IRJET- Data and Technical Security Issues in Cloud Computing DatabasesIRJET Journal
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
A5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloudA5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloudDr. Wilfred Lin (Ph.D.)
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingIRJET Journal
 
AWS Security Week: Why Your Customers Care About Compliance
AWS Security Week: Why Your Customers Care About ComplianceAWS Security Week: Why Your Customers Care About Compliance
AWS Security Week: Why Your Customers Care About ComplianceAmazon Web Services
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Amazon Web Services
 
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.ITCamp
 
Securing the Foundation to Secure the Cloud
Securing the Foundation to Secure the CloudSecuring the Foundation to Secure the Cloud
Securing the Foundation to Secure the CloudTrent Adams
 
SDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinSDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinZivaro Inc
 

Similar to Scott Hogg - Gtri cloud security knowledge and certs (20)

IRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud EnvironmentIRJET- Improving Data Storage Security and Performance in Cloud Environment
IRJET- Improving Data Storage Security and Performance in Cloud Environment
 
Presd1 10
Presd1 10Presd1 10
Presd1 10
 
CompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and TricksCompTIA Cybersecurity Analyst Certification Tips and Tricks
CompTIA Cybersecurity Analyst Certification Tips and Tricks
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptx
 
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptx
 
IRJET- Data and Technical Security Issues in Cloud Computing Databases
IRJET- Data and Technical Security Issues in Cloud Computing DatabasesIRJET- Data and Technical Security Issues in Cloud Computing Databases
IRJET- Data and Technical Security Issues in Cloud Computing Databases
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
A5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloudA5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloud
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
 
Cloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit PlanningCloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit Planning
 
AWS Security Week: Why Your Customers Care About Compliance
AWS Security Week: Why Your Customers Care About ComplianceAWS Security Week: Why Your Customers Care About Compliance
AWS Security Week: Why Your Customers Care About Compliance
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
 
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
ITCamp 2018 - Tobiasz Koprowski - SECDEV(OPS). How to Brace Your IT Security.
 
Securing the Foundation to Secure the Cloud
Securing the Foundation to Secure the CloudSecuring the Foundation to Secure the Cloud
Securing the Foundation to Secure the Cloud
 
SDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same CoinSDN Security: Two Sides of the Same Coin
SDN Security: Two Sides of the Same Coin
 

More from Trish McGinity, CCSK

Csa privacy by design & gdpr austin chambers 11-4-17
Csa   privacy by design & gdpr austin chambers 11-4-17Csa   privacy by design & gdpr austin chambers 11-4-17
Csa privacy by design & gdpr austin chambers 11-4-17Trish McGinity, CCSK
 
Token Binding as the Foundation for a More Secure Web
Token Binding as the Foundation for a More Secure WebToken Binding as the Foundation for a More Secure Web
Token Binding as the Foundation for a More Secure WebTrish McGinity, CCSK
 
Security and Automation: Can they work together? Can we survive if they don't?
Security and Automation: Can they work together?  Can we survive if they don't?Security and Automation: Can they work together?  Can we survive if they don't?
Security and Automation: Can they work together? Can we survive if they don't?Trish McGinity, CCSK
 
Practical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggPractical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggTrish McGinity, CCSK
 
CSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassageCSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassageTrish McGinity, CCSK
 
Csa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghxCsa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghxTrish McGinity, CCSK
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesTrish McGinity, CCSK
 
Andrew Useckas Csa presentation hacking custom webapps 4 3
Andrew Useckas Csa presentation   hacking custom webapps 4 3Andrew Useckas Csa presentation   hacking custom webapps 4 3
Andrew Useckas Csa presentation hacking custom webapps 4 3Trish McGinity, CCSK
 
Steve Kosten - Exploiting common web application vulnerabilities
Steve Kosten - Exploiting common web application vulnerabilities Steve Kosten - Exploiting common web application vulnerabilities
Steve Kosten - Exploiting common web application vulnerabilities Trish McGinity, CCSK
 
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa versionLarry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa versionTrish McGinity, CCSK
 

More from Trish McGinity, CCSK (16)

Csa privacy by design & gdpr austin chambers 11-4-17
Csa   privacy by design & gdpr austin chambers 11-4-17Csa   privacy by design & gdpr austin chambers 11-4-17
Csa privacy by design & gdpr austin chambers 11-4-17
 
Privacy 101
Privacy 101Privacy 101
Privacy 101
 
Cloud Seeding
Cloud SeedingCloud Seeding
Cloud Seeding
 
Token Binding as the Foundation for a More Secure Web
Token Binding as the Foundation for a More Secure WebToken Binding as the Foundation for a More Secure Web
Token Binding as the Foundation for a More Secure Web
 
Security and Automation: Can they work together? Can we survive if they don't?
Security and Automation: Can they work together?  Can we survive if they don't?Security and Automation: Can they work together?  Can we survive if they don't?
Security and Automation: Can they work together? Can we survive if they don't?
 
GDPR Overview
GDPR OverviewGDPR Overview
GDPR Overview
 
Practical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggPractical AWS Security - Scott Hogg
Practical AWS Security - Scott Hogg
 
CSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassageCSA colorado 2016 presentation CloudPassage
CSA colorado 2016 presentation CloudPassage
 
Csa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghxCsa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghx
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA Technologies
 
Andrew Useckas Csa presentation hacking custom webapps 4 3
Andrew Useckas Csa presentation   hacking custom webapps 4 3Andrew Useckas Csa presentation   hacking custom webapps 4 3
Andrew Useckas Csa presentation hacking custom webapps 4 3
 
Steve Kosten - Exploiting common web application vulnerabilities
Steve Kosten - Exploiting common web application vulnerabilities Steve Kosten - Exploiting common web application vulnerabilities
Steve Kosten - Exploiting common web application vulnerabilities
 
Shawn Harris - CCSP SAH v2
Shawn Harris - CCSP SAH v2Shawn Harris - CCSP SAH v2
Shawn Harris - CCSP SAH v2
 
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa versionLarry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
 
Ed Rios - New ncc brief
Ed Rios - New ncc briefEd Rios - New ncc brief
Ed Rios - New ncc brief
 
Davitt Potter - CSA Arrow
Davitt Potter - CSA ArrowDavitt Potter - CSA Arrow
Davitt Potter - CSA Arrow
 

Recently uploaded

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Recently uploaded (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Scott Hogg - Gtri cloud security knowledge and certs

  • 1. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. Cloud Security Knowledge and Certifications Presented by Scott Hogg, CTO GTRI CCIE #5133, CISSP #4610, CCSP, CCSK, AWS CSA-Associate Colorado CSA Fall Summit – 11/10/2016
  • 2. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • Securing Cloud Services – Cloud Security Standards and Guidelines • Cloud Security Certifications – Cloud Security Alliance (CSA) Certificate of Cloud Security Knowledge (CCSK) – (ISC)2 Certified Cloud Security Professional (CCSP) Today’s Agenda
  • 3. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • Cloud Service Security Concerns/Threats • Cloud Service Provider Security Certifications Cloud Security Concepts
  • 4. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • A breach of the Cloud Service Provider’s infrastructure can lead to a “Hyperjacking” even whereby many customer’s data is exposed • Examples of CSP Data Breaches: – Google failure March 2011 deletion of 150k Gmail info – Code Spaces goes out of business in June 2014 after AWS hack – Google Drive breach in July 2014 hyperlink vulnerability – Apple iCloud exposure of celebrity photos, August 2014 – Dropbox security breach in October 2014, compromising 7M user passwords held for Bitcoin (BTC) ransom – Worcester Polytechnic Institute (WPI) claims cross-VM RSA key recovery in AWS, October 2015 – Datadog password breach for their AWS customers in July 2016 Concern About CSP Security
  • 5. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied.
  • 6. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • Cloud Security Alliance (CSA) provides advice for securing cloud computing environments • CSA is a US Federal 501(c)6 not-for-profit org, formed in late 2008, now has over 48,000 members • Mission = “promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing” • https://cloudsecurityalliance.org/ Cloud Security Alliance (CSA)
  • 7. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • CSA stated that the top three cloud computing threats are Insecure Interfaces and API's, Data Loss & Leakage, and Hardware Failure. • CSA’s Top 7 Security Threats (March 2010) – https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf • In February 2013, the CSA published their “The Notorious Nine” cloud computing top threats – https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notor ious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf CSA – The Notorious Nine 1. Data Breaches 2. Data Loss 3. Account or Service Traffic Hijacking 4. Insecure Interfaces and APIs 5. Denial of Service (DoS) 6. Malicious Insiders 7. Abuse of Cloud Services 8. Insufficient Due Diligence 9. Shared Technology Vulnerabilities
  • 8. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • CSA published their newest Top 12 cloud computing threats at 2016 RSA conference • Threat No. 1: Data breaches • Threat No. 2: Compromised credentials and broken authentication • Threat No. 3: Hacked interfaces and APIs • Threat No. 4: Exploited system vulnerabilities • Threat No. 5: Account hijacking • Threat No. 6: Malicious insiders CSA Treacherous 12 (or the Dirty Dozen)
  • 9. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • Threat No. 7: The APT parasite • Threat No. 8: Permanent data loss • Threat No. 9: Inadequate diligence • Threat No. 10: Cloud service abuses • Threat No. 11: DoS attacks • Threat No. 12: Shared technology, shared dangers CSA Treacherous 12 (or the Dirty Dozen)
  • 10. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • Customer bears more responsibility with IaaS than SaaS Cloud Security Responsibility – A Sliding Scale IaaS PaaS SaaS Security GRC Data Security App Security Platform Security Infrastructure Security Physical Security
  • 11. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • Cloud Service Providers (CSPs) can obtain certifications attesting their compliance with security standards. – SOC 1/SSAE 16/ISAE 3402, SOC2, SOC3 American Institute of Certified Public Accountants (AICPA) audit reports may be requested from the provider. – International Organization for Standardization (ISO) 27001 – Cloud Security Alliance (CSA) Security, Trust & Assurance Registry (STAR) – U.S. Health Insurance Portability and Accountability Act (HIPAA) – Payment Card Industry (PCI) Data Security Standard (DSS) Level 1 service provider – Motion Picture Association of America (MPAA) Cloud Compliance Assurance
  • 12. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • American Institute of Certified Public Accountants (AICPA) – Wants to make sure organizations are using reliable and secure services that their business relies upon – Compliance with Sarbanes Oxley's (SOX) requirement (section 404) • Statement on Auditing Standards No. 70 (SAS 70) • Statement on Standards for Attestation Engagements (SSAE) 16 – American standard that replaces SAS 70 – Similar to the International standard ISAE 3402 – Service Organization Controls (SOC) 1, 2, & 3 – http://ssae16.com/SSAE16_overview.html AICPA SSAE16 SOC 1/2/3
  • 13. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • Service availability is a critical component of any cloud service • CSPs operate within data centers that they may own and manage or collocate their systems • The Uptime Institute provides a “Tier Certification System” for assessing critical data center infrastructure to promote increased availability • Data Center Site Infrastructure Tier Standard: Topology – Tier I: Basic Site Infrastructure – Tier II: Redundant Site Infrastructure Capacity Components – Tier III: Concurrently Maintainable Site Infrastructure – Tier IV: Fault Tolerant Site Infrastructure • Check the tier rating of your current data center or cloud provider – https://uptimeinstitute.com/TierCertification/ – https://uptimeinstitute.com/TierCertification/certMaps.php The Uptime Institute Tier Standard: Topology
  • 14. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • ISO/IEC 27001:2013 – Information Security Management System (ISMS) • ISO/IEC 17788:2014 – Information technology -- Cloud computing -- Overview and vocabulary • ISO/IEC 17789:2014 – Information technology -- Cloud computing -- Reference architecture ISO/IEC Cloud Security Standards
  • 15. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • U.S. Federal organizations have specialized requirements for secure cloud services. • Civilian and DOD organizations may have to meet NIST 800- 37 and DoD Information Assurance Certification and Accreditation Process (DIACAP) and Federal Information Security Management Act (FISMA) compliance. • Cloud providers may also be required to meet US International Traffic in Arms Regulations (ITAR) compliance. • Federal customers also need to have FIPS 140-2 security systems running in the cloud. • Federal Risk and Authorization Management Program (FedRAMP) certified cloud providers are required. U.S. Federal Cloud Security Requirements
  • 16. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • The OMB requires federal agencies to use FedRAMP (Federal Risk and Authorization Management Program) accredited cloud services for FIPS 199 Low and Moderate system categories (Based on FISMA and NIST 800-53 Rev3 standards) – http://www.FedRAMP.gov • FedRAMP established the Joint Authorization Board (JAB) to approve cloud services and monitor the process • The JAB defines the standards by which Third Party Assessment Organizations (3PAOs) will assess the cloud providers • Third Party Accreditation Organizations (3PAOs) include: Coalfire, Kratos SecureInfo, Veris Group, among others – https://www.fedramp.gov/marketplace/accredited-3paos/ • FedRAMP Provisional Authority To Operate (ATO) issued by the JAB (after review of security assessment package) to the federal agency consuming the cloud services • List of FedRAMP Compliant Systems – https://www.fedramp.gov/marketplace/compliant-systems/ FedRAMP
  • 17. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • NIST Cloud Computing Public Security Working Group • NIST SP 500-292 – NIST Cloud Computing Reference Architecture • NIST SP 500-293 – US Government Cloud Computing Technology Roadmap Volume 1, 2 & 3 • NIST SP 500-299 – NIST Cloud Computing Security Reference Architecture • NIST SP 800-144 – Guidelines on Security and Privacy in Public Cloud Computing • NIST SP 800-145 – The NIST Definition of Cloud Computing • NIST SP 800-146 – Cloud Computing Synopsis and Recommendations NIST Guidelines on Cloud Security
  • 18. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied.
  • 19. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • CSA’s CCM is a gigantic spreadsheet that lists over 130 prominent control specifications across 15 control domains and relates each to pertinent cloud security standards and best practices • Mappings for FedRAMP Low/Moderate, ISO/IEC 27001, NIST 800-53, among others • This is a valuable resource to help remind you of all the controls to consider when operating in a cloud environment • Cloud Controls Matrix (CCM) v3.0.1 (6-6-16 Update) – https://cloudsecurityalliance.org/group/cloud-controls-matrix/ – https://cloudsecurityalliance.org/download/cloud-controls-matrix- v3-0-1/ CSA Cloud Controls Matrix (CCM)
  • 20. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. CSA Cloud Controls Matrix (CCM)
  • 21. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • Customers want to evaluate their CSPs against their requirements and select the best provider • Consider the CSPs position when they receive numerous individual separate security questionnaires and assessments from customers • The CAIQ provides a standard template that answers most customer queries for information – 300-line spreadsheet that can help streamline CSP evaluation – https://cloudsecurityalliance.org/download/consensus- assessments-initiative-questionnaire-v3-0-1/ Consensus Assessments Initiative Questionnaire
  • 22. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. Consensus Assessments Initiative Questionnaire
  • 23. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • The CSA created the STAR certification for CSPs • The STAR certification rates the CSP based on their adherence and adoption to cloud security best practices and controls • CSA STAR is based on the CSA’s Cloud Controls Matrix (CCM) and the Consensus Assessments Initiative Questionnaire (CAIQ) • CSA STAR program provides a complimentary registry for CSPs – https://cloudsecurityalliance.org/star/#_registry • There are 3 levels of assurance CSA Security Trust & Assurance Registry (STAR)
  • 24. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • https://cloudsecurityalliance.org/star/ CSA Security Trust & Assurance Registry (STAR)
  • 25. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied.
  • 26. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • CSA CCSK • (ISC)2 CCSP Cloud Security Certifications
  • 27. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • The CSA created a certification for individuals • The CCSK validates that an individual has the understanding and skills to help protect an organization who is consuming cloud services • The CCSK shows you the best practices and things to consider when protecting cloud-based assets • The CCSK domains provide a holistic cloud security controls framework – https://cloudsecurityalliance.org/education/ccsk/ Certificate of Cloud Security Knowledge
  • 28. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • CCSK Guidance V3 has 14 domains CCSK Body of Knowledge Domains 1. Cloud Architecture 2. Governance and Enterprise Risk 3. Legal and Electronic Discovery 4. Compliance and Audit 5. Information Lifecycle Management 6. Portability and Interoperability 7. Traditional Security, BCM, D/R 8. Data Center Operations 9. Incident Response 10. Application Security 11. Encryption and Key Management 12. Identity and Access Management 13. Virtualization 14. Security-as-a-Service
  • 29. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • CCSK Training Classes are available (HP Education Services) – CCSK Foundation (2 days), CCSK Plus (3 days) • CSA guidance version 3.0, Security Guidance for Critical Areas of Focus in Cloud Computing, V3 (92% of test) • European Network and Information Security Agency (ENISA) whitepaper (8% of test) – Cloud Computing: Benefits, Risks and Recommendations for Information Security • NIST documents (800-144, 800-145, 800-146, 500-292) Preparing for the CCSK
  • 30. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • Read the v3 FAQ and the v3 Prep guide – https://downloads.cloudsecurityalliance.org/ccsk/CCS K_FAQ_v3.pdf – https://cloudsecurityalliance.org/wp- content/uploads/2013/02/CCSK-Prep-Guide-V3.pdf • CCSK online open-book exam costs $345 – 60 questions, 90 minutes, >80% to pass, 2 attempts • https://ccsk.cloudsecurityalliance.org/ Taking the CCSK Exam
  • 31. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • CCSK can be used for CPEs for other certs • CSA drafted CSA Guidance version 4.0 (GitHub) – https://github.com/cloudsecurityalliance/CSA- Guidance • CCSK version 4 (coming soon) • CCSK Developer certification (in the works) • CCSK Assurance certification (in the works) What’s Next for the CCSK?
  • 32. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • CSA and ISC2 collaborated on developing a new cloud certification that builds upon the CCSK Certified Cloud Security Professional (CCSP) – (ISC)2
  • 33. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • The CCSP Common Body of Knowledge (CBK) consists of the following six domains: – 1 Architectural Concepts & Design Requirements – 2 Cloud Data Security – 3 Cloud Platform & Infrastructure Security – 4 Cloud Application Security – 5 Operations – 6 Legal & Compliance • ISO/IEC 17788 and NIST 800-145, 800-146, 500-299 • https://www.isc2.org/ccsp/default.aspx Certified Cloud Security Professional (CCSP) – (ISC)2
  • 34. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • Live In-Person CBK Training Class, 5 days, $1995 • Live On-Line CBK Training Class, 5 days, $1395 • On-Demand On-Line CBK Training - $495 ($395 for CISSPs) • The Official (ISC)2 Guide to the CCSP CBK, by Adam Gordon – ISBN: 978-1-119-20749-8, 560 pages, November 2015 – http://www.wiley.com/WileyCDA/WileyTitle/productCd- 1119207495.html – $80, Members get 50% off with code ISC50 • Free Flash Cards On-Line • Pearson VUE Computer-Based Exam – 4 hours, 125 questions (>700/1000) - $549 Certified Cloud Security Professional (CCSP) – (ISC)2
  • 35. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. Cloud Security Summary
  • 36. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. • Security has more to do with people and processes than technology. Good security comes down to discipline. • If you have good InfoSec hygiene in your on-premises IT infrastructure, you can have good cloud security operations. • Cloud services can be less secure, equally secure, or more secure than your traditional on-premises data center. • It is easier to be secure from the beginning rather than try to add security in after systems are in production. • Good design, implementation using best practices, proper maintenance, and vigilance will make your cloud system secure. • We encourage you to achieve cloud security certification to validate your understanding of the topic area. Cloud Security – The Bottom Line
  • 37. © 2016 Global Technology Resources, Inc. All Rights Reserved. Contents may contain confidential information and are not to be copied. Thank You For Your Time! Scott Hogg, CTO GTRI 303-949-4865 | SHogg@gtri.com | @ScottHogg

Editor's Notes

  1. AWS Certified Solutions Architect - Associate Many organizations are moving to the cloud and they need to do so with their eyes wide open. Some organizations and IT administrators may fear the cloud, but we all use cloud services in some way. Our organizations want to take advantage of the financial and operational benefits of cloud computing, but prevent exposing our organizations to undue risk. This presentation covers the topic of cloud security in a down-to-earth and practical way and covers how you can become knowledgeable about cloud security and obtain certification. This presentation will review the current industry standard guidelines for cloud security Discuss risks of cloud services used insecurely Review the important security controls when operating in a cloud environment We will also review a few of the popular cloud security certifications, namely: Cloud Security Alliance (CSA) Certificate of Cloud Security Knowledge (CCSK) (ISC)2 Certified Cloud Security Professional (CCSP)
  2. Breaking Down Cloud Security Proactively build security into your cloud architecture or reactively assess the security of your cloud   Presentation Abstract: Many organizations are moving to the cloud and they need to do so with their eyes wide open. Some organizations and IT administrators may fear the cloud, but we all use cloud services in some way. Our organizations want to take advantage of the financial and operational benefits of cloud computing, but not expose our organizations to undue risk. This presentation covers the topic of cloud security in a down-to-earth and practical way and provides realistic security measures you can put in practice right away. This presentation will review the current industry standard guidelines for cloud security We will also review several popular Cloud Service Provider (CSP) security models and security controls. No cloud security presentation would be complete without a brief introduction to software container security concepts. This presentation will review several examples of cloud security controls that provide virtual firewalling, server/service security, encryption. We will also review a few of the popular cloud security certifications, namely: Cloud Security Alliance (CSA) Certificate of Cloud Security Knowledge (CCSK) (ISC)2 Certified Cloud Security Professional (CCSP)   Learner Objectives: After this session, the attendee will understand the common models for cloud security and the typical security domains and protection measures. The attendee will understand common security controls in public cloud providers and point-solutions to help secure access, data, and services. The attendee will be inspired to pursue one of the popular cloud security certifications to further build their cloud security capabilities.   Tech Bio: Scott Hogg, CCIE #5133, CISSP #4610, is the CTO for Global Technology Resources, Inc. (GTRI). Scott helps organizations leverage cloud services securely and possess the CCSK and CCSP cloud security certifications. Scott also actively works on SDN security and network programmability and has formed the Denver Network Programmability User Group (NPUG) chapter. Scott is a founding member of the Rocky Mountain IPv6 Task Force (RMv6TF), and a member of the Infoblox IPv6 Center of Excellence (COE). Scott has authored the Cisco Press book on IPv6 Security and writes for NetworkWorld.com.  
  3. CSP Security Breaches Google Drive, Dropbox, Box and iCloud Reach the Top 5 Cloud Storage Security Breaches List https://psg.hitachi-solutions.com/credeon/blog/google-drive-dropbox-box-and-icloud-reach-the-top-5-cloud-storage-security-breaches-list Dropbox http://www.cnet.com/news/hackers-hold-7-million-dropbox-passwords-ransom/ http://www.networkworld.com/article/3114724/the-dropbox-data-breach-is-a-warning-to-update-passwords.html iCloud http://www.buzzfeed.com/rachelzarrell/jennifer-lawrence-ariana-grande-picture-leak#.am7DvxzM0 http://www.bankinfosecurity.com/crypto-keys-stolen-from-amazon-cloud-a-8581/op-1 Code Spaces offered developers source code repositories and project management services using Git or Subversion http://www.infoworld.com/article/2608076/data-center/murder-in-the-amazon-cloud.html http://www.information-age.com/technology/cloud-and-virtualisation/123458406/catastrophe-cloud-what-aws-hacks-mean-cloud-providers Researchers steal secret RSA encryption keys in Amazon’s cloud http://www.networkworld.com/article/2989757/cloud-security/researchers-steal-secret-rsa-encryption-keys-in-amazon-s-cloud.html https://eprint.iacr.org/2015/898.pdf Mexican voter info on AWS https://www.databreaches.net/personal-info-of-93-4-million-mexicans-exposed-on-amazon/ Datadog breach http://www.geekwire.com/2016/datadog-amazon-web-services-customers-hit-security-breach/ +++ Rhino Security Labs https://rhinosecuritylabs.com/2016/02/aws-security-vulnerabilities-and-the-attackers-perspective/ 9 data security tips for cloud migration http://www.computerworld.com/article/3106908/cloud-security/9-data-security-tips-for-cloud-migration.html Anthem 2015 breach – cloud service was used for exfiltration of data Mid 2015 IRS breach – vulnerable APIs – exposing 300,000 records
  4. https://en.wikipedia.org/wiki/Cloud_Security_Alliance https://cloudsecurityalliance.org/ Cloud Security Alliance (CSA) is a non-profit group that aims to educate and promote the use of best practices for providing security assurance within Cloud Computing. They freely publish their Security Guidance for Critical Areas of Focus in Cloud Computing v3.0. Cloud Security Alliance’s Trusted Cloud Initiative (TCI) – Reference Architecture https://research.cloudsecurityalliance.org/tci/ https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf Got big data? The Cloud Security Alliance offers up 100 best practices http://www.computerworld.com/article/3113127/security/got-big-data-the-cloud-security-alliance-offers-up-100-best-practices.html
  5. https://cloudsecurityalliance.org/ Abuse and Nefarious Use of Cloud Computing Insecure Interfaces and APIs (Application Programming Interfaces) Malicious Insiders Shared Technology Issues Data Loss or Leakage Account or Service Hijacking Unknown Risk Profile https://en.wikipedia.org/wiki/Cloud_computing#Security_and_privacy https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf International Journal of Advanced Research in Engineering and Applied Sciences SECURITY ANALYSIS OF CLOUD COMPUTING, By Anju Chhibber*, Dr. Sunil Batra** http://garph.co.uk/IJAREAS/Mar2013/6.pdf -- only lists 6 of the 7??? Gartner: Seven cloud-computing security risks http://www.infoworld.com/article/2652198/security/gartner--seven-cloud-computing-security-risks.html June 2008 report titled "Assessing the Security Risks of Cloud Computing." Privileged user access Regulatory compliance Data location Data segregation Recovery Investigative support Long-term viability https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf
  6. The top 12 cloud security threats http://www.networkworld.com/article/3042610/security/the-dirty-dozen-12-cloud-security-threats.html https://cloudsecurityalliance.org/group/top-threats/
  7. The top 12 cloud security threats http://www.networkworld.com/article/3042610/security/the-dirty-dozen-12-cloud-security-threats.html
  8. Page 242 – CCSP class guide
  9. Is your organization mandated to meet specific compliance requirements? Look on their web site first
  10. https://en.wikipedia.org/wiki/SAS70 Replaced by https://en.wikipedia.org/wiki/SSAE_16 http://ssae16.com/SSAE16_overview.html http://www.datacenterknowledge.com/archives/2011/09/27/why-data-centers-need-ssae-16/ http://www.aicpa.org/research/standards/auditattest/downloadabledocuments/at-00801.pdf http://www.ifac.org/system/files/downloads/b014-2010-iaasb-handbook-isae-3402.pdf
  11. https://uptimeinstitute.com/ https://uptimeinstitute.com/tiers https://uptimeinstitute.com/TierCertification/allCertifications.php?page=1&ipp=All https://uptimeinstitute.com/TierCertification/certMaps.php
  12. ISO/IEC 15408-1:2009 – Common Criteria (CC) http://www.iso.org/iso/catalogue_detail.htm?csnumber=50341 ISO/IEC 17788:2014 – Cloud Overview and vocabulary Information technology -- Cloud computing -- Overview and vocabulary http://www.iso.org/iso/catalogue_detail?csnumber=60544 ISO/IEC 17789:2014 – Cloud Reference Architecture Information technology -- Cloud computing -- Reference architecture http://www.iso.org/iso/catalogue_detail?csnumber=60545 ISO/IEC 27000:2014 Information technology – Security techniques – Information security management systems – Overview and vocabulary. ISO/IEC 27001:2013 – ISMS - Information security management systems Requirements Information technology — Security techniques — Information security management systems — Requirements http://www.iso.org/iso/home/standards/management-standards/iso27001.htm https://www.iso.org/obp/ui/#iso:std:iso-iec:27001:ed-2:v1:en ISO/IEC 27018:2014 – PII Data Information technology -- Security techniques -- Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors http://www.iso.org/iso/catalogue_detail.htm?csnumber=61498 PII data in cloud ISO/IEC 27034-1:2011 – Application Security – Overview and concepts Information technology -- Security techniques -- Application security -- Part 1: Overview and concepts http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=44378 ISO/IEC 27037:2012 – Guidelines for identification, collection, acquisition and preservation of digital evidence Information technology -- Security techniques -- Guidelines for identification, collection, acquisition and preservation of digital evidence http://www.iso.org/iso/catalogue_detail?csnumber=44381 ISO/IEC 27041:2015 - Guidance on assuring suitability and adequacy of incident investigative method Information technology -- Security techniques -- Guidance on assuring suitability and adequacy of incident investigative method http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=44405 ISO/IEC 27042:2015 - Guidelines for the analysis and interpretation of digital evidence Information technology -- Security techniques -- Guidelines for the analysis and interpretation of digital evidence http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=44406 ISO/IEC 27043:2015 - Incident investigation principles and processes Information technology -- Security techniques -- Incident investigation principles and processes http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=44407 ISO/IEC DIS 27050-1 - Electronic discovery -- Part 1: Overview and concepts Information technology -- Security techniques -- Electronic discovery -- Part 1: Overview and concepts http://www.iso.org/iso/catalogue_detail.htm?csnumber=63081
  13. http://collaborate.nist.gov/twiki-cloud-computing/pub/CloudComputing/CloudSecurity/NIST_Security_Reference_Architecture_2013.05.15_v1.0.pdf https://www.fedramp.gov/ AWS, Microsoft cloud win US government security approval http://www.networkworld.com/article/3088124/aws-microsoft-cloud-win-us-government-security-approval.html AWS GovCloud, Microsoft's Azure GovCloud, and CSRA's ARC-P IaaS have received provisional authority to offer services under the high baseline of the government's Federal Risk and Authorization Management Program (FedRAMP), a set of security standards for cloud services. AWS and Azure clouds gain security OK from feds http://www.computerworld.com/article/3088130/security/aws-and-azure-clouds-gain-security-ok-from-feds.html FedRAMP: A challenging path to operational excellence for cloud providers http://www.networkworld.com/article/3082212/compliance/fedramp-a-challenging-path-to-operational-excellence-for-cloud-providers.html
  14. https://en.wikipedia.org/wiki/FedRAMP http://www.FedRAMP.gov http://cloud.cio.gov/fedramp FedRAMP is a collaboration of the GSA, NIST, DHS, DOD, NSA, OMB, the Federal CIO Council https://www.fedramp.gov/marketplace/compliant-systems/ http://www.gsa.gov/portal/category/102375 FedRAMP Provisional ATO issued by the Joint Authorization Board (JAB) Third-party, independent Assessor (3PAO) https://www.fedramp.gov/participate/3paos/ https://www.coalfire.com/ AWS Compliance http://aws.amazon.com/compliance/ http://aws.amazon.com/compliance/fedramp-faqs/
  15. Federal Cloud Computing Strategy published in 2011, U.S. Chief Information Officer (CIO) Vivek Kundra http://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdf http://collaborate.nist.gov/twiki-cloud-computing/pub/CloudComputing/CloudSecurity/NIST_Security_Reference_Architecture_2013.05.15_v1.0.pdf NIST SP 500-291: Cloud Computing Standards Roadmap NIST SP 500-292: NIST Cloud Computing Reference Architecture NIST SP 500-293: US Government Cloud Computing Technology Roadmap Volume 1, High-Priority requirements to Further USG Agency Cloud Computing Adoption NIST SP 500-293: US Government Cloud Computing Technology Roadmap Volume II, Useful Information for Cloud Adopters (Draft) NIST SP 500-293: US Government Cloud Computing Technology Roadmap Volume III, Technical Considerations for USG Cloud Computing Deployment Decisions (Draft) NIST SP 800-144: Guidelines on Security and Privacy in Public Cloud Computing, NIST SP 800-145: The NIST Definition of Cloud Computing NIST SP 800-146: Cloud Computing Synopsis and Recommendations (Draft) Cloud-adapted Risk Management Framework (CRMF)
  16. CSA Cloud Controls Matrix https://cloudsecurityalliance.org/group/cloud-controls-matrix/ Latest version: 3.0.1 07/10/2014 https://cloudsecurityalliance.org/research/ccm/
  17. CSA Cloud Controls Matrix https://cloudsecurityalliance.org/group/cloud-controls-matrix/ Cloud Controls Matrix v3.0.1 (6-6-16 Update) https://cloudsecurityalliance.org/download/cloud-controls-matrix-v3-0-1/
  18. Consensus Assessments Initiative Questionnaire v3.0.1 Now color coded to match the CCM https://cloudsecurityalliance.org/media/news/consensus-assessments-initiative-questionnaire-caiq-v-3-review/
  19. Consensus Assessments Initiative Questionnaire v3.0.1 Now color coded to match the CCM https://cloudsecurityalliance.org/media/news/consensus-assessments-initiative-questionnaire-caiq-v-3-review/
  20. https://cloudsecurityalliance.org/star/ LEVEL ONE: CSA STAR Self-Assessment LEVEL TWO: CSA STAR Attestation LEVEL TWO: CSA STAR Certification LEVEL TWO: CSA C-STAR Assessment LEVEL THREE: CSA STAR Continuous Monitoring STARWatch SaaS Software that helps automate the assessment/compliance process https://cloudsecurityalliance.org/star/#_watch CSA STARWatch is a Software as a Service (SaaS) application to help organizations manage compliance with CSA STAR (Security, Trust and Assurance Registry) requirements. STARWatch delivers the content of the Cloud Controls Matrix (CCM) and Consensus Assessments Initiative Questionnaire (CAIQ) in a database format, enabling users to manage compliance of cloud services with the CSA best practices
  21. https://cloudsecurityalliance.org/education/ccsk/#_why https://cloudsecurityalliance.org/wp-content/uploads/2015/04/CSA_CCSK-Brochure_April_2015.pdf
  22. CSA Security Guidance for Critical Areas of Focus in Cloud Computing V3 https://cloudsecurityalliance.org/education/ccsk/ https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf CSA has a vendor independent certification that focuses on the subject of cloud security. GTRI has several people who have achieved this cert. GTRI can rely on these individuals when we talk to our customers about how to secure a cloud deployment.
  23. Preparing to take the CCSK exam – Study materials https://cloudsecurityalliance.org/education/training/ https://ccsk.cloudsecurityalliance.org/ https://cloudsecurityalliance.org/education/ccsk/ https://cloudsecurityalliance.org/education/training/ https://cloudsecurityalliance.org/wp-content/uploads/2013/02/CCSK-V3-FAQ.pdf https://cloudsecurityalliance.org/wp-content/uploads/2013/02/CCSK-Prep-Guide-V3.pdf Udemy https://www.udemy.com/understand-the-ccsk-cloud-security-certification/
  24. https://ccsk.cloudsecurityalliance.org/ https://cloudsecurityalliance.org/education/ccsk/ https://cloudsecurityalliance.org/education/training/ https://downloads.cloudsecurityalliance.org/ccsk/CCSK_FAQ_v3.pdf https://cloudsecurityalliance.org/wp-content/uploads/2013/02/CCSK-V3-FAQ.pdf https://cloudsecurityalliance.org/wp-content/uploads/2013/02/CCSK-Prep-Guide-V3.pdf Udemy https://www.udemy.com/understand-the-ccsk-cloud-security-certification/
  25. CCSK v4 was planned for early 2016 https://cloudsecurityalliance.org/education/ccsk/#_about
  26. https://www.isc2.org/ccsp-for-ccsks/default.aspx CCSK counts for 1 year of experience requirement for the CCSP CCSKs get discount on instructor-led classroom or live-on-line training CCSKs get special pricing for self-study tools for CCSK and OnDemand Training ($395)
  27. https://www.isc2.org/ccsp/default.aspx https://www.isc2.org/ccsp-domains/default.aspx https://www.isc2.org/ccsp-faqs/default.aspx
  28. https://www.isc2.org/ccsp/default.aspx Head in The Clouds & Feet on The Ground: The CCSP Certification https://itspmagazine.com/from-the-newsroom/head-in-the-clouds-feet-on-the-ground-the-ccsp-certification
  29. Converge Your Teams for Greater SDN/NFV Benefits https://communities.cisco.com/people/shogg@gtri.com/blog/2016/06/14/converge-your-teams-for-greater-sdnnfv-benefits