SlideShare a Scribd company logo
1 of 33
©2014 LinkedIn Corporation. All Rights Reserved.
Chris Niggel, CISSP CCSK
Charles Nwatu, GSLC
November 2014
Creating a Cloud Security Policy
©2014 LinkedIn Corporation. All Rights Reserved.
About LinkedIn
Our mission is to connect the world’s
professionals to make them more
productive and successful
LinkedIn currently has over 332 million
members worldwide
Over 6,000 full-time employees in 30
cities worldwide
©2014 LinkedIn Corporation. All Rights Reserved.
New Security Challenges
New enterprise applications can be bought
with a corporate card, no need for
procurement cycles
Corporate data is now unmanaged
Corporate security is still expected to provide
Confidentiality, Integrity, and Availability
IT can’t control what
applications
employees use, but
we can make the
approved apps more
attractive than the
alternatives
©2014 LinkedIn Corporation. All Rights Reserved.
Proposal to Create A Policy
Existing policy not enforceable
Not scalable to new cloud business needs
Made executive management aware of shortcomings
Develop plans to identify and resolve gaps
©2014 LinkedIn Corporation. All Rights Reserved.
Policy Timeline
Q4 ‘13 Q1 ‘14 Q2 ‘14 Q3 ‘14 Q4 ‘14 Q1 ‘15
Review of New Applications
Existing Application Gap Analysis
Policy Initial Release
Solution POC
Vendor Selection
Solution Deployment
Vendor Demos
Policy Review 12 Month Review
Security Assurance
Corporate IT
Policy Authoring Team
©2014 LinkedIn Corporation. All Rights Reserved.
Resourcing
Cloud
Security
Incident
Response
IT App
Owner
Security Corp IT
Director, Security Director,
IT
VP, Security
VP,
Engineering
Legal
Review
HR
Review
PMO
Support
©2014 LinkedIn Corporation. All Rights Reserved.
AUTHORING THE POLICY
©2014 LinkedIn Corporation. All Rights Reserved.
10,000 Foot Strategy
©2014 LinkedIn Corporation. All Rights Reserved.
Sample Data Types
Resources: US NIST FIPS 199, NIST 800-60 Vol. 2
Customer Company Personal
Limited Potential impact of release is limited
Confidential Potential impact of release is serious
Highly
Confidential
Potential impact of release is severe
©2014 LinkedIn Corporation. All Rights Reserved.
Level Mapping
A tiered approach enables the creation of security controls that are
appropriate for the types of content handled
Consider the most restrictive requirements for each level
Some content may not be allowed onto the cloud
Define “Cloud” for your organization
ComplexityRisk
Level 1
Level 2
Level 3
DurationEffort
©2014 LinkedIn Corporation. All Rights Reserved.
Sample Assurance Levels
Level 1 Data Classification
Applications that handle data in the following categories are classified as Level 1
Personal Limited
Company Limited
Level 2 Data Classification
Applications that handle data in the following categories are classified as Level 2
Personal Confidential
Company Confidential
Customer Confidential
Level 3 Data Classification
Applications that handle data in the following categories are classified as Level 3
Personal Highly Confidential
Company Highly Confidential
Customer Highly Confidential
Not Classified
We do not have any data in the following categories
Customer Limited
*These levels are not representative of LinkedIn policy
©2014 LinkedIn Corporation. All Rights Reserved.
Identify controls for Data Types
CSA Security Guidelines
PCI-DSS v3.0
AWS Security Whitepaper Google Security Whitepaper
NIST SP 800-61
©2014 LinkedIn Corporation. All Rights Reserved.
Get From Here to There
Domain 2: Governance and Enterprise Risk
Domain 3: Legal Issues: Contracts and Electronic Discovery
Domain 4: Compliance and Audit Management
Domain 6: Interoperability and Portability
Domain 7: Traditional Security, Business Continuity, & Disaster Recovery
Domain 8: Data Center Operations
Domain 9: Incident Response
Domain 10: Application Security
We focused on using the following domains to create categories important to LinkedIn.
Authentication & Administration
Auditing
Business Continuity
Data Security
Communication Security
Vendor Governance
Brand Reputation
©2014 LinkedIn Corporation. All Rights Reserved.
Structure of a Domain
5. Communication Security
Network Security Testing
Application Security Testing
Thick-Client or Physical Appliance Security
Mobile Client Security
Transport Layer Protection
Data Loss Prevention
3rd Party Application Interoperability
Storage at Rest
Virtualization
PCI-DSS 2.2.1
AWS Whitepaper
Google Security
Whitepaper
LinkedIn Security
Standards
CSA 10.6.3
CSA 10.1.3
CSA 5.6.5
PCI-DSS 11.3
©2014 LinkedIn Corporation. All Rights Reserved.
Structure of a Control
ISC2
PCI
2.2.1
CSA
13.1.8
©2014 LinkedIn Corporation. All Rights Reserved.
Policy Challenges - OAuth
When reviewing applications, consider 3rd party integrations
What applications are people using?
What permissions do those applications have?
How will you whitelist or blacklist apps?
©2014 LinkedIn Corporation. All Rights Reserved.
More Policy Challenges
Off Site Backups
Key Management
Drive Destruction
David Gard/Star Ledger/Corbis
©2014 LinkedIn Corporation. All Rights Reserved.
SSO Integration Classes
Class 0: Saved Password
Class 1: SSO, with Username / Password Backdoor
Class 2: SSO Access Only
Class 3: SSO Access Only, with automatic
account deprovisioning
©2014 LinkedIn Corporation. All Rights Reserved.
PRESENTING THE POLICY
©2014 LinkedIn Corporation. All Rights Reserved.
Execution
Business Owner
Corporate IT
New Projects Team
Corporate IT Support
Security Assurance
Legal / Procurement
Identify
New
Solution
Review
Define Support
Pilot
Contract Negotiation
Validate Production
Develop Production Req’s
Deployment PM Support
©2014 LinkedIn Corporation. All Rights Reserved.
Understanding your Audience
Employees / End-Users
Incident Response Teams
Application Support Teams
Security Assurance Team
Legal
©2014 LinkedIn Corporation. All Rights Reserved.
End Users - Service Catalog
Employees want to know where they can store their data, and how to
access those tools when they need them
©2014 LinkedIn Corporation. All Rights Reserved.
CSIRT Teams
Incident Response Teams need access to application assignment,
ownership, and data type information quickly. They do not need configuration
information
©2014 LinkedIn Corporation. All Rights Reserved.
Application Support Teams
Application Support teams need to know
how to recover applications quickly if there is
a SSO platform failure, and who to contact
during an outage
©2014 LinkedIn Corporation. All Rights Reserved.
Assurance Team - Worksheets
Assurance teams need tools to quickly
evaluate new applications
©2014 LinkedIn Corporation. All Rights Reserved.
Legal Documentation
Part of our security controls are enforced
through legal documents. Streamline this
by adding requirements into the MSA
This means defining terminology
throughout the policy and documentation
and being specific
Help your legal team by making a
playbook and offering flexibility
©2014 LinkedIn Corporation. All Rights Reserved.
LESSONS LEARNED
©2014 LinkedIn Corporation. All Rights Reserved.
Cloud Security Solutions
©2014 LinkedIn Corporation. All Rights Reserved.
Gap Analysis
Priority Control Type
1 Platform Usage and Incident Response Security and Operational
2 Content Inspection and Compliance Security
3 Administration and Automation Operational
4 Availability and Performance Monitoring Operational
5 Content Encryption Security
6 Application Inventory Process Security and Operational
©2014 LinkedIn Corporation. All Rights Reserved.
Policy Review and Feedback
Our data model was too limiting, had to soften Level 2 applications
Level 3 applications are very challenging, but we haven’t done enough to
fully evaluate
A more hands-on approach was needed to guide
customers through the process
The review process is ongoing & will transition to annual
©2014 LinkedIn Corporation. All Rights Reserved.
Variance Process
Considering the variance process at the outset will reduce the likelihood that
you’re caught needing to push an app through unprepared
Capture the compensating controls used for your next policy review
When reviewing existing applications, track what are existing risks versus
new risks
©2014 LinkedIn Corporation. All Rights Reserved.
Takeaways
Start with a top-down approach and understand your data model
The Cloud Security App space is very young. IAM is a quick win, followed by
monitoring, but your requirements may be different
Be flexible, this isn’t an HR policy – the business can and will roll over you.
Make the process easy, and the corporate-supported apps easier
©2014 LinkedIn Corporation. All Rights Reserved.©2014 LinkedIn Corporation. All Rights Reserved.©2014 LinkedIn Corporation. All Rights Reserved.

More Related Content

What's hot

Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015RAVI PRAKASH
 
Getting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSGetting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSSoftchoice Corporation
 
10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app control10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app controlAneel Mitra
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutionsijccsa
 
Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Perficient, Inc.
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your OrganizationRaffa Learning Community
 
EveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceEveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidencePaul Richards
 
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...Microsoft Österreich
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIOSR Journals
 
Packt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementPackt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementGluu
 
DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017
DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017
DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017Activo Consulting
 
Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm IJECEIAES
 
McMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy PaperMcMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy PaperMatthew J McMahon
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloudkairostech
 
Cloud service providers in pune
Cloud service providers in puneCloud service providers in pune
Cloud service providers in puneAnshita Dixit
 
Research challenges and issues in web security
Research challenges and issues in web securityResearch challenges and issues in web security
Research challenges and issues in web securityIAEME Publication
 
Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New BlockSean Dickson
 

What's hot (19)

Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015
 
Getting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSGetting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMS
 
10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app control10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app control
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
 
Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
EveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceEveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidence
 
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
 
Packt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementPackt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access management
 
DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017
DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017
DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017
 
Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm
 
McMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy PaperMcMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy Paper
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud
 
Cloud service providers in pune
Cloud service providers in puneCloud service providers in pune
Cloud service providers in pune
 
Research challenges and issues in web security
Research challenges and issues in web securityResearch challenges and issues in web security
Research challenges and issues in web security
 
Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New Block
 

Similar to Cloud Security Policy in 40 Characters

Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Group of company MUK
 
CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCipherCloud
 
Securing The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StorySecuring The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StoryCloudLock
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Oddscentralohioissa
 
The Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security BreachThe Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security BreachCloudLock
 
Cloud cpr uncc cloud computing conference 2013
Cloud cpr   uncc cloud computing conference 2013Cloud cpr   uncc cloud computing conference 2013
Cloud cpr uncc cloud computing conference 2013C5_LUCK
 
3 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 20153 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 2015ObserveIT
 
Cloud - Everyone is doing it, But is it safe?
Cloud - Everyone is doing it, But is it safe?Cloud - Everyone is doing it, But is it safe?
Cloud - Everyone is doing it, But is it safe?Jean-Marie Abi-Ghanem
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Securing the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicySecuring the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicyAllot Communications
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use CasesNetskope
 
4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint Governance4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint GovernanceImperva
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure
 
How is Your AppSec Program Doing Compared to Others
How is Your AppSec Program Doing Compared to OthersHow is Your AppSec Program Doing Compared to Others
How is Your AppSec Program Doing Compared to OthersDenim Group
 

Similar to Cloud Security Policy in 40 Characters (20)

Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint
 
CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud Adoption
 
Securing The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StorySecuring The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's Story
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
 
The Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security BreachThe Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security Breach
 
Cloud cpr uncc cloud computing conference 2013
Cloud cpr   uncc cloud computing conference 2013Cloud cpr   uncc cloud computing conference 2013
Cloud cpr uncc cloud computing conference 2013
 
3 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 20153 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 2015
 
Cloud - Everyone is doing it, But is it safe?
Cloud - Everyone is doing it, But is it safe?Cloud - Everyone is doing it, But is it safe?
Cloud - Everyone is doing it, But is it safe?
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Developing Secure Apps
Developing Secure AppsDeveloping Secure Apps
Developing Secure Apps
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Securing the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicySecuring the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use Policy
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases
 
4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint Governance4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint Governance
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
 
How is Your AppSec Program Doing Compared to Others
How is Your AppSec Program Doing Compared to OthersHow is Your AppSec Program Doing Compared to Others
How is Your AppSec Program Doing Compared to Others
 

Recently uploaded

Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxBipin Adhikari
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 

Recently uploaded (20)

Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptx
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 

Cloud Security Policy in 40 Characters

  • 1. ©2014 LinkedIn Corporation. All Rights Reserved. Chris Niggel, CISSP CCSK Charles Nwatu, GSLC November 2014 Creating a Cloud Security Policy
  • 2. ©2014 LinkedIn Corporation. All Rights Reserved. About LinkedIn Our mission is to connect the world’s professionals to make them more productive and successful LinkedIn currently has over 332 million members worldwide Over 6,000 full-time employees in 30 cities worldwide
  • 3. ©2014 LinkedIn Corporation. All Rights Reserved. New Security Challenges New enterprise applications can be bought with a corporate card, no need for procurement cycles Corporate data is now unmanaged Corporate security is still expected to provide Confidentiality, Integrity, and Availability IT can’t control what applications employees use, but we can make the approved apps more attractive than the alternatives
  • 4. ©2014 LinkedIn Corporation. All Rights Reserved. Proposal to Create A Policy Existing policy not enforceable Not scalable to new cloud business needs Made executive management aware of shortcomings Develop plans to identify and resolve gaps
  • 5. ©2014 LinkedIn Corporation. All Rights Reserved. Policy Timeline Q4 ‘13 Q1 ‘14 Q2 ‘14 Q3 ‘14 Q4 ‘14 Q1 ‘15 Review of New Applications Existing Application Gap Analysis Policy Initial Release Solution POC Vendor Selection Solution Deployment Vendor Demos Policy Review 12 Month Review Security Assurance Corporate IT Policy Authoring Team
  • 6. ©2014 LinkedIn Corporation. All Rights Reserved. Resourcing Cloud Security Incident Response IT App Owner Security Corp IT Director, Security Director, IT VP, Security VP, Engineering Legal Review HR Review PMO Support
  • 7. ©2014 LinkedIn Corporation. All Rights Reserved. AUTHORING THE POLICY
  • 8. ©2014 LinkedIn Corporation. All Rights Reserved. 10,000 Foot Strategy
  • 9. ©2014 LinkedIn Corporation. All Rights Reserved. Sample Data Types Resources: US NIST FIPS 199, NIST 800-60 Vol. 2 Customer Company Personal Limited Potential impact of release is limited Confidential Potential impact of release is serious Highly Confidential Potential impact of release is severe
  • 10. ©2014 LinkedIn Corporation. All Rights Reserved. Level Mapping A tiered approach enables the creation of security controls that are appropriate for the types of content handled Consider the most restrictive requirements for each level Some content may not be allowed onto the cloud Define “Cloud” for your organization ComplexityRisk Level 1 Level 2 Level 3 DurationEffort
  • 11. ©2014 LinkedIn Corporation. All Rights Reserved. Sample Assurance Levels Level 1 Data Classification Applications that handle data in the following categories are classified as Level 1 Personal Limited Company Limited Level 2 Data Classification Applications that handle data in the following categories are classified as Level 2 Personal Confidential Company Confidential Customer Confidential Level 3 Data Classification Applications that handle data in the following categories are classified as Level 3 Personal Highly Confidential Company Highly Confidential Customer Highly Confidential Not Classified We do not have any data in the following categories Customer Limited *These levels are not representative of LinkedIn policy
  • 12. ©2014 LinkedIn Corporation. All Rights Reserved. Identify controls for Data Types CSA Security Guidelines PCI-DSS v3.0 AWS Security Whitepaper Google Security Whitepaper NIST SP 800-61
  • 13. ©2014 LinkedIn Corporation. All Rights Reserved. Get From Here to There Domain 2: Governance and Enterprise Risk Domain 3: Legal Issues: Contracts and Electronic Discovery Domain 4: Compliance and Audit Management Domain 6: Interoperability and Portability Domain 7: Traditional Security, Business Continuity, & Disaster Recovery Domain 8: Data Center Operations Domain 9: Incident Response Domain 10: Application Security We focused on using the following domains to create categories important to LinkedIn. Authentication & Administration Auditing Business Continuity Data Security Communication Security Vendor Governance Brand Reputation
  • 14. ©2014 LinkedIn Corporation. All Rights Reserved. Structure of a Domain 5. Communication Security Network Security Testing Application Security Testing Thick-Client or Physical Appliance Security Mobile Client Security Transport Layer Protection Data Loss Prevention 3rd Party Application Interoperability Storage at Rest Virtualization PCI-DSS 2.2.1 AWS Whitepaper Google Security Whitepaper LinkedIn Security Standards CSA 10.6.3 CSA 10.1.3 CSA 5.6.5 PCI-DSS 11.3
  • 15. ©2014 LinkedIn Corporation. All Rights Reserved. Structure of a Control ISC2 PCI 2.2.1 CSA 13.1.8
  • 16. ©2014 LinkedIn Corporation. All Rights Reserved. Policy Challenges - OAuth When reviewing applications, consider 3rd party integrations What applications are people using? What permissions do those applications have? How will you whitelist or blacklist apps?
  • 17. ©2014 LinkedIn Corporation. All Rights Reserved. More Policy Challenges Off Site Backups Key Management Drive Destruction David Gard/Star Ledger/Corbis
  • 18. ©2014 LinkedIn Corporation. All Rights Reserved. SSO Integration Classes Class 0: Saved Password Class 1: SSO, with Username / Password Backdoor Class 2: SSO Access Only Class 3: SSO Access Only, with automatic account deprovisioning
  • 19. ©2014 LinkedIn Corporation. All Rights Reserved. PRESENTING THE POLICY
  • 20. ©2014 LinkedIn Corporation. All Rights Reserved. Execution Business Owner Corporate IT New Projects Team Corporate IT Support Security Assurance Legal / Procurement Identify New Solution Review Define Support Pilot Contract Negotiation Validate Production Develop Production Req’s Deployment PM Support
  • 21. ©2014 LinkedIn Corporation. All Rights Reserved. Understanding your Audience Employees / End-Users Incident Response Teams Application Support Teams Security Assurance Team Legal
  • 22. ©2014 LinkedIn Corporation. All Rights Reserved. End Users - Service Catalog Employees want to know where they can store their data, and how to access those tools when they need them
  • 23. ©2014 LinkedIn Corporation. All Rights Reserved. CSIRT Teams Incident Response Teams need access to application assignment, ownership, and data type information quickly. They do not need configuration information
  • 24. ©2014 LinkedIn Corporation. All Rights Reserved. Application Support Teams Application Support teams need to know how to recover applications quickly if there is a SSO platform failure, and who to contact during an outage
  • 25. ©2014 LinkedIn Corporation. All Rights Reserved. Assurance Team - Worksheets Assurance teams need tools to quickly evaluate new applications
  • 26. ©2014 LinkedIn Corporation. All Rights Reserved. Legal Documentation Part of our security controls are enforced through legal documents. Streamline this by adding requirements into the MSA This means defining terminology throughout the policy and documentation and being specific Help your legal team by making a playbook and offering flexibility
  • 27. ©2014 LinkedIn Corporation. All Rights Reserved. LESSONS LEARNED
  • 28. ©2014 LinkedIn Corporation. All Rights Reserved. Cloud Security Solutions
  • 29. ©2014 LinkedIn Corporation. All Rights Reserved. Gap Analysis Priority Control Type 1 Platform Usage and Incident Response Security and Operational 2 Content Inspection and Compliance Security 3 Administration and Automation Operational 4 Availability and Performance Monitoring Operational 5 Content Encryption Security 6 Application Inventory Process Security and Operational
  • 30. ©2014 LinkedIn Corporation. All Rights Reserved. Policy Review and Feedback Our data model was too limiting, had to soften Level 2 applications Level 3 applications are very challenging, but we haven’t done enough to fully evaluate A more hands-on approach was needed to guide customers through the process The review process is ongoing & will transition to annual
  • 31. ©2014 LinkedIn Corporation. All Rights Reserved. Variance Process Considering the variance process at the outset will reduce the likelihood that you’re caught needing to push an app through unprepared Capture the compensating controls used for your next policy review When reviewing existing applications, track what are existing risks versus new risks
  • 32. ©2014 LinkedIn Corporation. All Rights Reserved. Takeaways Start with a top-down approach and understand your data model The Cloud Security App space is very young. IAM is a quick win, followed by monitoring, but your requirements may be different Be flexible, this isn’t an HR policy – the business can and will roll over you. Make the process easy, and the corporate-supported apps easier
  • 33. ©2014 LinkedIn Corporation. All Rights Reserved.©2014 LinkedIn Corporation. All Rights Reserved.©2014 LinkedIn Corporation. All Rights Reserved.

Editor's Notes

  1. s.