Valmiki Mukherjee, CISSP, CRISC Director, Security Solutions, Mycroft Vice Chair of Board, CSA North Texas Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Introduction, Background and Definitions Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution About the CSA About CSA North Texas Mycroft • Global, not-for-profit, 501(c)6 organization • Over 31,000 individual members, 120 corporate members, 60 chapters • Building best practices and a trusted cloud ecosystem • Agile philosophy, rapid development of applied research • Certification • CCSK (individual) • CSA STAR (provider) • Approved Regional Chapter for Cloud Security Alliance • Founded in February 2012 • Registered as a not-forprofit 501(c)6 organization • Currently enrolling Individual and Corporate memberships • Serves as the GRC CoE • Poised to be one of the largest regional chapters for CSA • Join CSA NT at • Global Security Solution firm HQ’s in STL and NY • 20+ years in industry • One of the largest IAM practices in the world • Leading Solution provider of Security as a Service • Leading Mobile Security and Device Management product in West Europe • Leading IAM Service provider for several Fortune 100 Cos http://www.meetup.com/CSANTX/ Goal of CSA • To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution CSA Definition • Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services). NIST Definition • NIST defines cloud computing by describing five essential characteristics, three cloud service models, and four cloud deployment models. • Essential Characteristics: • Broad Network Access • Rapid Elasticity • Measured Service • On-Demand Self Service • Deployment Models • Public • Private • Hybrid • Community Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution CSA Cloud Reference Model IaaS (Compute & storage) is the foundation PaaS (Rapid application dev) adds middleware to IaaS SaaS represents complete applications on top of PaaS Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution Multi Tenancy • Multi-tenancy in its simplest form implies use of same resources or application by multiple consumers that may belong to same organization or different organization. • The impact of multi-tenancy is visibility of residual data or trace of operations by other user or tenant.Multi-tenancy in cloud service models implies a need for policy-driven enforcement, segmentation, isolation, governance, service levels, and chargeback/billing models for different consumer constituencies. Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution • Infrastructure as a Service (IaaS), delivers computer infrastructure (typically a platform virtualization environment) as a service, along with raw storage and networking. Rather than purchasing servers, software, data-center space, or network equipment, clients instead buy those resources as a fully outsourced service. • Software as a service (SaaS), Sometimes referred to as "on-demand software," is a software delivery model in which software and its associated data are hosted centrally (typically in the (Internet) cloud) and are typically accessed by users using a thin client, normally using a web browser over the Internet. • Platform as a service (PaaS), is the delivery of a computing platform and solution stack as a service. PaaS offerings facilitate deployment of applications without the cost and complexity of buying and managing the underlying hardware and software and provisioning hosting capabilities. This provides all of the facilities required to support the complete life cycle of building and delivering web applications and services entirely available from the Internet. Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution Jericho Cloud Cube Model Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution www.cloudsecurityalliance.org Risks • Lack of transparency, • Limited audit ability • Regulatory violation • No risk transference for data • Infrastructure misuse / break in Data Location & Mobility • Government access • Differences in data protection between regions • Cost of keeping data hosting in EU • Audit data is legally owned by CSP and not client. • Cases of CSP refusing to ‘hand over audit logs’. Security at multiple layers • Virtual image provided by IaaS provide • Platform stack provided by PaaS provider • IaaS, PaaS issues + application security Cloud lock in Resilience & Availability • Lack of standards • Lack of interoperability • Limited service portability • Incompatible management processes • Latency sensitive applications • Enforcement of SLA obligations • Insufficient capabilities to cater for critical data Multi-tenancy • Security of shared resources • Process isolation • Data segregation ‘Data sharding ‘ (fragmentation across images) • Identity & Access Management Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution Data Commingling • In-cloud segregation of data: difficult • Accidental seizure of customer data during forensic investigations Cloud Service and Data Security Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Data risks Physical to virtual mapping • CSP’s do not allow clients to classify data. • CSP’s cannot offer different levels of security based upon data sensitivity. • No DLP – data leakage protection services offered. • Crypto doesn’t like virtual • Current algorithms set to • optimise resource pooling • Can’t always use specialised HW • Encryption key management. Isolation • Hypervisor-VM and inter-VM isolation • Robust at system level (modulo kernel bugs) • Issues at management plane • Memory hijacking Copyright © 2012 Cloud Security Alliance VM Security • Guest OS needs security protection • at massive scale • resilient VM life-cycle • secure, scalable, dynamic Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution Reliance on VM vendor security • Issues with guest OS Security • Can VMWare, Microsoft be trusted to • implement kernel security correctly ?… www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution www.cloudsecurityalliance.org CSA Research Initiatives, Workgroups Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution Family of 4 research projects Cloud Controls Matrix Consensus Assessments Initiative Cloud Audit Cloud Trust Protocol Tools for governance, risk and compliance management Control Requirements Copyright © 2012 Cloud Security Alliance Private, Community & Public Clouds Provider Assertions www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution Cloud Control Matrix • Controls derived from guidance • Mapped to familiar frameworks: ISO 27001, COBIT, PCI, HIPAA, FISMA, FedRAMP • Rated as applicable to S-P-I • Customer vs. Provider role • Help bridge the “cloud gap” for IT & IT auditors Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution Common Assessment Initiative • Research tools and processes to perform shared assessments of cloud providers • Integrated with Controls Matrix • Version 1 CAI Questionnaire released Oct 2010, approximately 140 provider questions to identify presence of security controls or practices • Use to assess cloud providers today, procurement negotiation, contract inclusion, quantify SLAs Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution Cloud Audit • Open standard and API to automate provider audit assertions • Change audit from data gathering to data analysis • Necessary to provide audit & assurance at the scale demanded by cloud providers • Uses Cloud Controls Matrix as controls namespace • Use to instrument cloud for continuous controls monitoring Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution CTP • The CloudTrust Protocol (CTP) is the mechanism by which cloud service consumers ask for and receive information about the elements of transparency as applied to cloud service providers. TCI • Secure, interoperable identity in the cloud. CDG • Responsible for understanding the top requirements and needs of different stakeholders on governing and operating data in the Cloud, and prioritizing and answering the key problems and questions identified by Cloud stakeholders. Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution CSA STAR • CSA STAR (Security, Trust and Assurance Registry) • Public Registry of Cloud Provider self assessments • Based on Consensus Assessments Initiative Questionnaire • Provider may substitute documented Cloud Controls Matrix compliance • Voluntary industry action promoting transparency • Free market competition to provide quality assessments • Provider may elect to provide assessments from third parties Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution Trusted Cloud Initiative • Comprehensive Cloud Security Reference Architecture • Secure & interoperable Identity in the cloud • Getting SaaS, PaaS to be “Relying Parties” for corporate directories • Scalable federation • Outline responsibilities for Identity Providers • Assemble reference architectures with existing standards • www.cloudsecurityalliance.org/trustedcloud.html Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution TCI Reference Architecture Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution SRM • Security and Risk Management is the passwords, firewalls, and encryption that protect computer system and data. • It is the processes that define policies and audit systems wrt. these policies Description • Provide the core components of an organizations Information Security program. Service Capablities • • • • • • Identity and Access Management Privilege Management Infrastructure Governance, Risk Management, and Compliance Policies and Standards Threat and Vulnerability Management Infrastructure and Data Protection Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution ITOS • Focus on the IT Department including, Help Desk, Support teams, Planning & Process surrounding IT Description • ITOS outlines all the necessary services IT organizations will have in order to support its business needs. Provides standards and Best Practices based on PM BOK, CMMi, ISO/IEC 27002, COBIT, ITIL v3 Services Capabilities • • • • • • • • IT Operation Service Delivery Service Support Incident Management Problem Management Knowledge Management Change Management Release Management Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution BOSS • Encompasses all the critical corporate support functions such as HR, Compliance, Legal. This also includes monitoring of corporate resources for signs of abuse or fraud Description • BOSS was designed based on the best practices and reference frameworks with proven success of aligning the business and transforming the IS function as a business enabler Service Capability • • • • • • • Compliance Data Governance Operational Risk Management HR Security Security Monitoring Services Legal Services Internal Investigation Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution Presentation Services • This is where the end-user interacts with an IT Solution. Security requirements depend on the type of solution: B2C, B2B etc. • Service Capability • Presentation Modality (Social Media, Collaboration, Email, B2B/B2C/B2E Portals) • Presentation Platform (Desktop, Laptop, Mobile Devices etc.) Application Services • These are the Rules and processes behind the user interface that manipulate the data and perform transactions for the user. • Service Capabilities • Development Process • Security Knowledge • Programming Interfaces • Integration Middleware • Connectivity and Delivery • Abstraction Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution Information Services • Refers to the storage of data. Includes ETL process, operational data store and data warehouses Service Capabilities • User Directory Services • Security Monitoring and Data Management • Service Delivery Data Management • Service Support Data Management • Data Governance Data Management • Risk Management Data Management • ITOS Data Management • BOSS Data Management Infrastructure Services • Facilities, Hardware, Network and Virtual Environments. Provides basic core capabilities for higher-level capabilities to exist Service Capabilities • • • • • • • • Facility Security Servers and Storage Services Network Services Availability Services Patch Management Equipment Maintenance Virtual Desktop Virtualization: Storage, Server, Network Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution Cloud Trust Protocol • Developed by CSC, transferred to CSA • Open standard and API to verify control assertions • “Question and Answer” asynchronous protocol, leverages SCAP (Secure Content Automation Protocol) • Integrates with Cloud Audit • Now we have all the components for continuous controls monitoring Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Government Deliver “continuous ??? monitoring” required by A&A methodologies ??? •FedRAMP •DIACAP •Other C&A standards NIST 800-53, HITRUST CSF, ISO 27001/27002, ISACA COBIT, PCI, HIPAA, SOX, GLBA, STIG, NIST 800-144, SAS 70, … Specs Extensions Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution Commercial Continuous monitoring … with a purpose • Common technique and nomenclature to request and receive evidence and affirmation of controls from cloud providers Claims, offers, and the basis for auditing service delivery • Common interface and namespace to automate the Audit, Assertion, Assessment, and Assurance (A6) of cloud environments Pre-audit checklists and questionnaires to inventory controls • Industry-accepted ways to document what security controls exist The recommended foundations for controls • Fundamental security principles in assessing the overall security risk of a cloud provider Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Responding to SAS70, SSAE 16, HIPAA, ITAR, FRCP, HITECH, GLBA, PCI DSS, all elements of CFATS, DIACAP, NIST 800-53, ISO27001, CAG, ENISA, CSA V2.3, … transparency Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution TaaS Enterprise CSC Trusted Community Cloud Cloud Trust Response Manager (CRM) CTP TaaS Dashboard CTP TaaS Private Trusted Cloud CTP CTP CTP Cloud Trust Agent Downstream compliance processing Responding to all elements of transparency Using reclaimed visibility into the cloud to confirm security and create digital trust Copyright © 2012 Cloud Security Alliance CTP •• CTP • www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution Authorized TaaS Users ... 1 • What does my cloud computing configuration look like right now? • What audit events have occurred in my cloud configuration? • Who has access to my data now? • Who has had access to my data? • Where are my data and • What vulnerabilities exist in processing being performed? my cloud configuration? CloudTrust Protocol (CTP) Elements of Transparency ... 23 CTP CTP • Private Cloud • Other Public Clouds • CSC Trusted Cloud CTP Transparencyas-a-Service (TaaS) CTP Copyright © 2012 Cloud Security Alliance CTP www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution 6 Types Initiation Policy Introduction Provider assertions Provider notifications Evidence requests • Families • Configuration • Vulnerabilities • Anchoring Anchoring • Audit log • Service Management Only 23 in total in the entire protocol • Elements • Geographic • Platform • Process • Service Statistics Client extensions Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org SecaaS • Research for gaining greater understanding for how to deliver security solutions via cloud models. TWG • Provide direct influence on how to deliver secure cloud solutions and foster cloud awareness within all aspects of Telecommunications. HIM • Provide direct influence on how health information service providers deliver secure cloud solutions (services, transport, applications and storage) to their clients, and foster cloud awareness within all aspects of healthcare and related industries. Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Critical Areas of Focus in Cloud Computing Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution Governance and Enterprise Risk Flagship research project Legal and eDiscovery Compliance and Audit Aims at establishing a stable, secure baseline for cloud operations V3 Released on 11/14/2011 Guidance > 100k downloads: Portability and Interoperability Traditional Security, BCM and DR Operating in the Cloud Provides a practical, actionable road map to managers wanting to adopt the cloud paradigm safely and securely Information Management and Data Security Governing the Cloud Cloud Architecture Data Center Operations Incident Response, Notification and Remediation Application Security Encryption and Key Management Identity and Access Management Virtualization Security as a Service cloudsecurityalliance.org/guidance Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution Governance, ERM: Secure the cloud before procurement – contracts, SLAs, architecture Governance, ERM: Know provider’s third parties, BCM/DR, financial viability, employee vetting Legal: Plan for provider termination & return of assets Compliance: Identify data location when possible ILM: Persistence, Protection Portability & Interoperability: SOA “loose coupling” principles Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution BCM/DR: provider redundancy vs. your own DC Ops: provisioning, patching, logging Encryption: encrypt data when possible, segregate key mgt from cloud provider AppSec: Adapt secure software development lifecycle Virtualization: Harden, rollback, port VM images IdM: Federation & standards e.g. SAML, OpenID SecaaS: Security as a Service with all Cloud Components Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution Corporate Governance: • The balance of control between stakeholders, directors and managers of an organization providing consistent management, cohesive application of policies, guidance and controls, and enabling effective decision-making Enterprise Risk Management: • Methods and processes (framework) used by organizations to balance decision-making based on identifying particular events or circumstances relevant to the organization's objectives (risks and opportunities), assessing them in terms of likelihood and magnitude of impact, determining a response strategy, and monitoring progress to protect and create value for their stakeholders Compliance and Audit Assurance • Awareness and adherence to corporate obligations (e.g., corporate social responsibility, ethics, applicable laws, regulations, contracts, strategies and policies) by assessing the state of compliance, assessing the risks and potential costs of non-compliance against the costs to achieve compliance, and hence prioritize, fund, and initiate any corrective actions deemed necessary Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution Create • Creation is the generation of new digital content, or the alteration/updating/modifying of existing content. Store • Storing is the act committing the digital data to some sort of storage repository and typically occurs nearly simultaneously with creation. Use • Data is viewed, processed, or otherwise used in some sort of activity, not including modification. Share • Information is made accessible to others, such as between users, to customers, and to partners. Archive Data Loss Prevention • Data leaves active use and enters long-term storage. • • • • • Destroy • Data is permanently destroyed using physical or digital means (e.g., cryptoshredding) Dedicated appliance/server Virtual appliance Endpoint agent Hypervisor-agent DLP SaaS Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution Interoperability • Requirement for the components of a cloud eco-system to work together to achieve their intended result. Portability • Portability defines the ease of ability to which application components are moved and reused elsewhere regardless of provider, platform, OS, infrastructure, location, storage, the format of data, or API’s. Interoperability Considerations Portability Consideration Hardware Service Levels Network Devices Virtualization Different Architectures Frameworks Storage Security Integration Security Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution Hypervisor security Virtualization • Virtualization is one of the key elements of Infrastructure as a Service (IaaS) cloud offerings and private clouds, and it is increasingly used in portions of the back-end of Platform as a Service (PaaS) and SaaS (Software as a Service) providers as well. • Virtualization is also, naturally, a key technology for virtual desktops, which are delivered from private or public clouds. Inter-VM attacks and blind spots Performance concerns Operational complexity from VM sprawl Instant-on gaps Virtual machine encryption Data comingling Virtual machine data destruction Virtual machine image tampering In-motion virtual machines Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution Areas of Focus in IAM • Identity provisioning/deprovisioning • Authentication • Single/Reduced Sign On • Multiple form and factor • Federation • Identity and Service Provider/Broker • Authorization • Fine/Coarse Grained • User profile management • Role Based Access Control • Support for compliance Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org Mycroft’s Industry Solution for SecaaS Copyright © Cloud 2012 Security Mycroft Alliance Inc. Copyright © 2012 www.mycroftinc.com www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution Mycroft’s As-A-Service solutions, value add and IP surround, extend, integrate and manage commercial IAM / GRC and security software to provide policy- and controlscompliant applications throughout the extended enterprise Copyright © Cloud 2012 Security Mycroft Alliance Inc. Copyright © 2012 www.mycroftinc.com www.cloudsecurityalliance.org Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution Mycroft Elastic Accelerated Delivery (MEAD) • • • • • • Managed hosting services on a dedicated grid, shared grid, or on-premise private grid Fully encapsulated security products from manufacturers who know Access to professional services teams Management services Integration, management, and support services Patented IP Heimdall Web Services Portal • • • • • Provides single access point to multiple grids for quick application selection & delivery Leverages self-service model for accurate management & monitoring Features Service Measurement Index compliance to help assess cloud services Includes rapid response capability that converts business requests into technical queries Patented IP Mycroft Services • • • • • • Web SSO Federated SSO Account Provisioning User Self-Service Certification and Attestation Access Control Copyright © Cloud 2012 Security Mycroft Alliance Inc. Copyright © 2012 www.mycroftinc.com www.cloudsecurityalliance.org Copyright © Cloud 2012 Security Mycroft Alliance Inc. Copyright © 2012 Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution www.mycroftinc.com www.cloudsecurityalliance.org Copyright © Cloud 2012 Security Mycroft Alliance Inc. Copyright © 2012 Cloud Overview Initiatives for Cloud Security Strategic Areas of Focus Industry Solution www.mycroftinc.com www.cloudsecurityalliance.org Copyright © 2012 Cloud Security Alliance www.cloudsecurityalliance.org