CloudTrust Protocol Orientation and Status July 2011 | Ron Knode CloudTrust Protocol Orientation CloudTrust Protocol Orientation Topics • • • • • • • Why is it? What is it? CTP transfer to CSA {Strong} connection to CloudAudit Existing plans & strategies Things for the CSA/CloudAudit to “resolve” … other stuff … July 2011 | Ron Knode CloudTrust Protocol Orientation The Value Equation in the Cloud Security Service Transparency Service Compliance & Trust VALUE Captured Delivering evidence-based confidence… with compliance-supporting data & artifacts. July 2011 | Ron Knode CloudTrust Protocol Orientation The CTP Transfer • Nonexclusive, no-cost, royalty-free license to CloudTrust Protocol (CTP Version 2.0 – see reference #2 below) • Nonexclusive, no-cost, royalty-free license to make derivative works of/for the CTP • CSC representative as co-chair of CSA’s CTP Working Group • CSA to include an acknowledgement that CSC is the original developer of the CTP in any published materials (including electronic publication) that mention the CTP • Free, unrestricted use of CTP derivative works by CSC References 1. See “Digital Trust in the Cloud”, August 2009, www.csc.com/security/insights/32270digital_trust_in_the_cloud 2. See “Digital Trust in the Cloud: A Precis on the CloudTrust Protocol (V2.0)”, July 2010, http://www.csc.com/cloud/insights/57785-into_the_cloud_with_ctp 3. See “CSA + CTP = Nebula Nova”, 25 July 2011, http://www.csc.com/cloud/blog/68078csa_ctp_nebula_nova_a_commentary_and_essay July 2011 | Ron Knode CloudTrust Protocol Orientation Research Conclusions Summary Initial Results-August 2009 • The desire to benefit from the elastic promise of cloud processing is blocked for most enterprise applications because of security and privacy concerns. • The re-introduction of transparency into the cloud is the single biggest action needed to create digital trust in a cloud and enable the capture of enterprise-scale payoffs in cloud processing. • Even today there are ways to benefit from cloud processing while technologies and techniques to deliver digital trust in the cloud are evolving. • CSC has created a definition and an approach to "orchestrate" a trusted cloud and restore needed transparency. • Resist the temptation to jump into even a so-called “secure” cloud just to save money. Aim higher! Jump into the right “trusted” cloud to create and capture new enterprise value. www.csc.com/security/insights/32270digital_trust_in_the_cloud Or at www.csc.com/lefreports July 2011 | Ron Knode CloudTrust Protocol Orientation CloudTrust Protocol Revealed Research Extension Detailing “What” and “How” – July 2010 http://www.csc.com/cloud/insights/57785into_the_cloud_with_ctp July 2011 | Ron Knode • Transparency in the cloud is the key to capturing digital trust payoffs for both cloud consumers and cloud providers. • The CloudTrust Protocol (CTP) offers an uncomplicated, natural way to request and receive fundamental information about essential elements of transparency. • The reliable delivery of only a few elements of transparency generate a lot of digital trust, and that digital trust liberates cloud users to bring more and more core enterprise services and data to cloud techniques. • Transparency-as-a-Service (TaaS) using the CTP provides a flexible, uniform, and simple technique for reclaiming transparency into actual cloud architectures, configurations, services, and status … responding to both cloud user and cloud provider needs. • Transparency protocols like the CTP must be accompanied by corresponding concepts of operation and contractual conditions to be completely effective. CloudTrust Protocol Orientation CTP V2.0 Next Updates will be Published through the Cloud Security Alliance • Syntax • Semantics • Self-defined response (No insistence on orthodoxy) – Asset model – – Scope of response Implementation/deployment options • Extension July 2011 | Ron Knode CloudTrust Protocol Orientation A Complete Cloud Security Governance, Risk, and Compliance (GRC) Stack CloudTrust Protocol (CTP) Included Within CSA GRC Stack Government ??? Deliver “continuous monitoring” required by A&A methodologies ??? • FedRAMP • DIACAP • Other C&A standards NIST 800-53, HITRUST CSF, ISO 27001/27002, ISACA COBIT, PCI, HIPAA, SOX, GLBA, STIG, NIST 800-144, SAS 70, … July 2011 | Ron Knode Specs Extensions Commercial Continuous monitoring … with a purpose • Common technique and nomenclature to request and receive evidence and affirmation of controls from cloud providers Claims, offers, and the basis for auditing service delivery • Common interface and namespace to automate the Audit, Assertion, Assessment, and Assurance (A6) of cloud environments Pre-audit checklists and questionnaires to inventory controls • Industry-accepted ways to document what security controls exist The recommended foundations for controls • Fundamental security principles in assessing the overall security risk of a cloud provider CloudTrust Protocol Orientation Transparency as a Service (TaaS) Authorized Users What vulnerabilities exist in my cloud configuration? July 2011 | Ron Knode What does my cloud computing configuration look like now? Where are my data and processing being performed? Who has access to my data now? CloudTrust Protocol Orientation What audit events have occurred in my cloud configuration? Transparency as a Service (TaaS) Turn on the lights you need … when you need them 1 CloudTrust Protocol Elements of Transparency Private Cloud Other Public Clouds CSC Trusted Cloud Transparency as a Service (TaaS) 23 CloudTrust Protocol (CTP) Transparency as a Service (TaaS) Reclaiming Digital Trust Across Security, Privacy, and Compliance Needs SAS70, SSAE 16, HIPAA, ITAR, FRCP, HITECH, GLBA, PCI DSS, CFATS, DIACAP, NIST 800-53, ISO27001, CAG, ENISA, CSA V2.3, … Responding to all elements of transparency Enterprise TaaS CSC Trusted Community Cloud Cloud Trust Response Manager (CRM) TaaS Dashboard TaaS Private Trusted Cloud Cloud Trust Agent Downstream compliance processing CTP Responding to all elements of transparency • Using reclaimed visibility into the cloud to confirm security and create digital trust Source: http://www.csc.com/cloud/insights/57785-into_the_cloud_with_ctp • • Elements of Transparency in the CTP 6 TYPES FAMILIES Configuration Policy introduction ELEMENTS Vulnerabilities Provider assertions Geographic ANCHORING Provider notifications Platform Audit log EVIDENCE REQUESTS Process Service Management Client extensions Service Statistics July 2011 | Ron Knode CloudTrust Protocol Orientation Only 23 in entire protocol Initiation CloudTrust Protocol Pathways Mapping the Elements of Transparency in Deployment Admin & Ops Session start: 1 Session end: 2 Alerts: 18 Specs Transparency Requests Assertions Evidence Affirmations Configuration definition: 20 Security capabilities and operations: 17 Configuration & vulnerabilities: 3,4,5,6,7 Anchoring: 8, 9, 10 (geographic, platform, process) SCAP CloudAudit.org SCAP Sign / sealing Users: 19 Anchors: 21 Quotas: 22 Alert conditions: 23 Violation: 11 Audit: 12 Access: 13 Incident log: 14 Config/control: 15 Stats: 16 23 June 2011 | Ron Knode CloudTrust Protocol Orientation Extensions Consumer/provider negotiated: 24 1 CloudTrust Protocol V2.0 Syntax See pages of 5-6 Attachment A • Based on XML • Traditional RESTful web service over HTTP July 2011 | Ron Knode CloudTrust Protocol Orientation Elastic Characteristics of the CTP Cloud Providers Legend: Provider dimension Deployment dimension Source: http://www.csc.com/cloud/insights/57785into_the_cloud_with_ctp Transparency-as-a-Service CTP CTP Cloud Consumers Multiple Styles of Implementation The CTP is machine and human readable OUT-OF-BAND RESTful Web Service RESTful Web Service Cloud Consumer Cloud Provider RESTful Web Service Trust Evidence (Elements of transparency) CloudTrust Protocol Service RESTful Web Service Cloud Consumer Cloud Provider Trust Evidence IN-BAND Source: http://www.csc.com/cloud/insights/57785into_the_cloud_with_ctp (Elements of transparency) CloudTrust Protocol Service Scope of TaaS Enterprise or Client-Specific RESTful Web Service RESTful Web Service Cloud Consumer CLIENT SPECIFIC Cloud Provider RESTful Web Service Trust Evidence (Elements of transparency) CloudTrust Protocol Service Client Deployed Application Cloud Consumer Cloud Provider Client Trust Evidence ENTERPRISE Source: http://www.csc.com/cloud/insights/57785into_the_cloud_with_ctp CloudTrust Protocol Service (Partial elements of transparency) Undecideds… • Evidence Request category “integrity and liability verification technique” – Attest to the content, provenance, and imputability of the response (with legal import) – Transmission integrity not sufficient; Require legal liability of intent to provide response as delivered • E.g, Surety AbsoluteProof technique • Final namespace • Trust package correlation with all contributing (traditional) security services • Identity store for transparency service authorizations July 2011 | Ron Knode CloudTrust Protocol Orientation Undecideds… • EoT extension technique – Characteristics of specification – Degree of automation • Business constructs and back office issues, e.g., – SLA foundations – Concepts of operation – Service Terms & Conditions recommendations • Transparency operator training and operations monitoring July 2011 | Ron Knode CloudTrust Protocol Orientation