ITU Workshop on “Cloud Computing Standards – Today and the Future” (Geneva, Switzerland 14 November 2014) Data Protection for Public Cloud (International Standard ISO 27018) Stéphane Guilloteau Engineer Expert, Orange Labs stephane.guilloteau@orange.com Geneva, Switzerland, 14 November 2014 Agenda Introduction Scope of 27018 Methodology Context Requirements Structure Principles Sector-specific examples Conclusion Geneva, Switzerland, 14 November 2014 2 ISO/IEC 27018 published in 2014/08 Title Code of practice for PII protection in public clouds acting as PII processors PII=Personally Identifiable Information ISO/IEC JTC1 SC27 WG5 Information technology, Security techniques, Identity management and privacy technologies Geneva, Switzerland, 14 November 2014 3 SC 27 Figure by Jan Schallaböck, Vice-Convenor WG5 Geneva, Switzerland, 14 November 2014 4 WG5 Figure by Jan Schallaböck, Vice-Convenor WG5 Geneva, Switzerland, 14 November 2014 5 Scope Objective To create a common set of security categories and controls that apply to a public cloud computing service provider To meet the requirements for the protection of PII Geneva, Switzerland, 14 November 2014 6 Methodology Collecting together PII protection requirements according to ISO/IEC 29100 and the guidance for implementing controls given in ISO/IEC 27002 Designed for All types and sizes of organizations Geneva, Switzerland, 14 November 2014 7 Context A public cloud service provider is a “PII processor” when it processes PII for and according to the instructions of a cloud service customer (controller) “Privacy by Design” “PII lyfecycle consideration” Information security risk environment Geneva, Switzerland, 14 November 2014 8 Ecosystem Figure by Chris Mitchell, 27018 Editor Geneva, Switzerland, 14 November 2014 9 Requirements Three main sources legal, statutory, regulatory and contractual requirements risks corporate policies Geneva, Switzerland, 14 November 2014 10 27002 structure Security policies Organization of information security Human resource security Asset management Access control Cryptography Physical and environmental security Operations security Geneva, Switzerland, 14 November 2014 Communications security System acquisition, development and maintenance Supplier relationships Information security incident management Information security aspects of business continuity management Compliance 11 29100 principles Consent and choice Purpose legitimacy and specification Collection limitation Data minimization Use, retention and disclosure limitation Accuracy and quality Geneva, Switzerland, 14 November 2014 Openness, transparency and notice Individual participation and access Accountability Information security Privacy compliance 12 sector-specific examples clearly allocate responsibilities between the public cloud PII processor, its sub-contractors and the cloud service customer facilitate the exercise of PII principals’ rights ensure purpose specification and limitation principles notify data breach specify PII geographical location Geneva, Switzerland, 14 November 2014 13 Conclusion comply with applicable obligations be transparent enter into contractual agreement demonstrate effective implementation of PII protection do not replace applicable legislation and regulations, but can assist complete with standards in progress (29151, 29134…) Geneva, Switzerland, 14 November 2014 14