Bangkok Thailand Cloud Governance : Cloud and GRC ( Audit) Moderator : Mr. Jirapon Tubtimhin Panelist : Mr. Metha Suvanasarn [Slide attached] : Mr. Wee Tan Yeong : Mr. Russell Pipe 7 February 2013 1 Abstract Cloud computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. Cloud resources can be rapidly deployed and easily scaled, with all processes, applications, and services provisioned "on demand", regardless of user location or device. As a result, cloud computing gives organizations the opportunity to increase their service delivery efficiencies, streamline IT management, and better align IT services with dynamic business requirements. In many ways, cloud computing offers the "best of both worlds", providing solid support for core business functions along with the capacity to develop new and innovative services. In addition to the usual challenges of developing secure IT systems, cloud computing presents an added level of risk, because essential services are often outsourced to a third party. The "externalized" aspect of outsourcing makes it harder to maintain data integrity and privacy, support data and service availability, and demonstrate compliance. The security measures discussed in this IBM Redpapers™ publication represent best practice implementations for cloud security. 2 2 Cloud Governance : Cloud and GRC ( Audit) Cloud and Risk Management Process->Decision Making 3 Cloud and Integrated GRC and Risk Appetite How many color in the Cloud -> White / Black / White and Black Cloud and Change enablement • • • • Where do we want to be? What needs to be done? How do we get there? What is risk appetite to be concerned? 4 Cloud and GRC (Audit) Criterion and Success Factors for Management and Audit 1. Objective<->Risk<->Controls<->Audit<->Reports<-> Monitor 2. Incorporate conditions and right to audit in contract vs. events. 3. Set Gap analysis with AS-IS and Standards[ To-Be] to identify potential solutions and proper actions 4. look for ways to integrate framework and approaches to/for Cloud 5. Match evidence via Audit and document review of service provide Process, People and Technology with required Enterprise and IT- Related goals and levels to be concerned. 6. Manage expectations and follow Vision-Mission-Policy-Strategy + Actions and Metrics.->Break down the overall project into achievable projects.++ 7.Focus on implementations that enable business value. And ensure adequate insight into the business environment. 8.Focus on change enablement planning and Enterprise goals.[Cont.] 5 5 Cloud and GRC (Audit) Challenges for Management and Auditors and how do we get there.? How to making 9. Cleary explain and sell business/Stakeholders benefits. final decisions? 10. Raise issues with the Audit Committee. 11. Consider how the culture might need to be changed. 12. Raise the issue with the CEO and Board. 13. Ensure that Risk management is and impact applied across the enterprise. 14. Apply management and governance principles. 15. Ensure adequate insight into the business environment. 16. Be careful on overly optimistic goals, and underestimation to effort required. 17. Be careful IT in fire-fighting mode and focused on Operational issues. 18. Lack of dedicated resources or capacity. 19.Insufficient insight into the business environment and Business overall objectives.++ 20.Set clear, measurable and realistic goals. 21.Make sure roles and responsibilities are clear and accepted, changing roles, and jobs descriptions if required. 22. ++++ 23. Do we get there? Or, Solutions too complex or impractical. Then, What to do? 66 Cloud and Integrated GRC and Risk Appetite Evaluate different models of cloud computing Different models of cloud computing have various ways of exposing their underlying infrastructure to the user. This influences the degree of direct control over the management of the computing infrastructure and the distribution of responsibilities for managing its security. With the Software as a Service (SaaS) model, most of the responsibility for security management lies with the cloud provider. SaaS provides a number of ways to control access to the Web portal, such as the management of user identities, application level configuration,and the ability to restrict access to specific IP address ranges or geographies. 7 Cloud and Integrated GRC and Risk Appetite Cloud models like Platform as a Service allow clients to assume more responsibilities for managing the configuration and security for the middleware, database software, and application runtime environments. The Infrastructure as a Service (IaaS) model transfers even more control, and responsibility for security, from the cloud provider to the client. In this model, access is available to the operating system that supports virtual images, networking, and storage. Organizations are intrigued with these cloud computing models because of their flexibility and costeffectiveness, but they are also concerned about security. Recent cloud adoption studies by industry analysts and articles in the press have confirmed these concerns, citing the lack of visibility and control, concerns about the protection of sensitive information, and storage of regulated information in a shared, externally managed environment. 8 Cloud and Integrated GRC and Risk Appetite In the near term, most organizations are looking at ways to leverage the services of external cloud providers. These clouds would be used primarily for workloads with a low-risk profile, where a one-size-fits-all approach to security with few assurances is acceptable, and where price is the main differentiator. For workloads with a medium-to-high-risk profile involving highly regulated or proprietary information, organizations are choosing private and hybridclouds that provide a significant level of control and assurance. These workloads will be shifting into external clouds as they start offering tighter and more flexible security. 9 Cloud and Integrated GRC and Risk Appetite Take a closer look at thisframework to better understand the different aspects of a holistic security architecture. Security Framework Security GRC Governance, Risk management, and Compliance Organizations require visibility into the security posture of their cloud. This includes broad-based visibility into change, image, and incident management, as well as incident reporting for tenants and tenantspecific log and audit data. The above Security Framework was developed to describe security in terms of the business resources that need to be protected, and it looks at the different resource domains from a business point of view. 10 Security GRC Governance, Risk management, and Compliance Organizations require visibility into the security posture of their cloud. Visibility can be especially critical for compliance. The Sarbanes-Oxley Act, the Health Insurance Portability and Accountability Act (HIPAA), European privacy laws, and many other regulations require comprehensive auditing capabilities. Since public clouds are by definition a black box to the subscriber, potential cloud subscribers may not be able to demonstrate compliance. (A private or hybrid cloud, on the other hand, can be configured to meet those requirements.) In addition, providers sometimes are required to support third-party audits, and their clients can be directed to support eDiscovery and forensic investigations when a breach is suspected. This adds even more importance to maintaining proper visibility into the cloud. In general, organizations often cite the need for flexible Service Level Agreements (SLAs) that can be adapted to their specific situation, building on their experiences with strategic outsourcing and traditional, managed services. 11 Guide To Implementing A Secure Cloud The following security measures represent general best practice implementations for cloud security. At the same time, they are not intended to be interpreted as a guarantee of success. Guidance for your specific implementation requirements. -Implement and maintain a security program. -Build and maintain a secure cloud infrastructure. -Ensure confidential data protection. Implement strong access and identity management. -Establish application and environment provisioning. -Implement a governance and audit management program. -Implement a vulnerability and intrusion management program. -Maintain environment testing and validation. 12 A secure application development and testing program should be implemented Develop software applications based on best practices, with security being a conscious component of the initiative. :a. Validation of all security patches prior to production deployment. b. Ensure that test and production environments are separate. c. Ensure separation of duties between test, development, and administration personnel. d. Do not use production data that contains confidential or PII information in a test environment. e. Ensure removal of all test data and administrative information from the test environment prior to conversion to production. f. Ensure that all test accounts and custom accounts have been removed prior to production activation. g. Perform security code reviews on all code prior to release into production. 13 CSA Cloud Controls Matrix The Cloud Security Alliance Cloud Controls Matrix (CCM) is specifically designed to provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in assessing the overall security risk of a cloud provider. The CSA CCM provides a controls framework that gives detailed understanding of security concepts and principles that are aligned to the Cloud Security Alliance guidance in 13 domains. The foundations of the Cloud Security Alliance Controls Matrix rest on its customized relationship to other industry-accepted security standards, regulations, and controls frameworks such as the ISO 27001/27002, ISACA COBIT, PCI, NIST, Jericho Forum and NERC CIP and will augment or provide internal control direction for SAS 70 attestations provided by cloud providers. As a framework, the CSA CCM provides organizations with the needed structure, detail and clarity relating to information security tailored to the cloud industry. The CSA CCM strengthens existing information security control environments by emphasizing business information security control requirements, reduces and identifies consistent security threats and vulnerabilities in the cloud, provides standardize security and operational risk management, and seeks to normalize security expectations, cloud taxonomy and terminology, and security measures implemented in the cloud. The Cloud Controls Matrix is part of the CSA GRC Stack. 14 GRC Stack : Cloud Security Alliance Achieving Governance, Risk Management and Compliance (GRC) goals requires appropriate assessment criteria, relevant control objectives and timely access to necessary supporting data. Whether implementing private, public or hybrid clouds, the shift to compute as a service presents new challenges across the spectrum of GRC requirements. The Cloud Security Alliance GRC Stack provides a toolkit for enterprises, cloud providers, security solution providers, IT auditors and other key stakeholders to instrument and assess both private and public clouds against industry established best practices, standards and critical compliance requirements. 15 Value driver & Risk driver & Controls 16 IT Risk Management Audit / Assurance Program IT Governance, Risk and Control IT governance, risk and control are critical in the performance of any assurance management process. Governance of the process under review will be evaluated as part of the policies and management oversight controls. Risk plays an important role in evaluating what to audit and how management approaches and manages risk. Both issues will be evaluated as steps in the audit/assurance program. Controls are the primary evaluation point in the process. The audit/assurance program will identify the control objectives and the steps to determine control design and effectiveness. 17 IT Risk Management Audit / Assurance Program Responsibilities of IT Audit and Assurance Professionals IT audit and assurance professionals are expected to customize this document to the environment in which they are performing an assurance process. This presentation is to be used as a review tool and starting point for Cloud-> GRC>Audit. It may be modified by the IT audit and assurance professional, assumed that the IT audit and assurance professional has the necessary subject matter expertise required to conduct the work and is supervised by a professional with the CISA designation and/or necessary subject matter expertise to adequately review the work performed. 18 IT Risk Management Audit / Assurance Program The primary view of IT is that of an operations or service delivery organization. In this capacity, IT risk addresses the ability to deliver the IT services that enable the enterprise to perform day-to-day operational processes. However, IT risk also addresses system development, acquisition and maintenance processes. This relates to ensuring the selection, development and maintenance of business processes that operate the revenue generation and fulfillment of the organization, and address business needs in a cost-effective manner. Finally, IT risk addresses the ability for IT to provide value and/or benefit to the enterprise through automation. 19 IT Risk Management Audit / Assurance Program 20 Maturity Assessment vs. Target Assessment This spider graph is an example of the assessment results and maturity target for an IT risk management assessment. Cloud Perspectives 21 Cloud and Integrated GRC and Audit Only with such unified platform can enterprise IT Leaders ensure that they have a highly consumable cloud that will not breakdown as workloads and complexity grow. Otherwise, enterprise will not gain the agility and efficiency that they seek from the cloud. 22 GRC Stack Initiatives Cloud Audit The goal of Cloud Audit is to provide a common interface and namespace that allows cloud computing providers to automate the Audit, Assertion, Assessment, and Assurance (A6) of their infrastructure (IaaS), platform (PaaS), and application (SaaS) environments and allow authorized consumers of their services to do likewise via an open, extensible and secure interface and methodology. Cloud Audit provides the technical foundation to enable transparency and trust in private and public cloud systems. 23 GRC Stack Initiatives Cloud Controls Matrix (CCM) The Cloud Security Alliance Cloud Controls Matrix (CCM) is specifically designed to provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in assessing the overall security risk of a cloud provider. The Cloud Controls Matrix provides a controls framework that gives detailed understanding of security concepts and principles that are aligned to the Cloud Security Alliance guidance in 13 domains. The foundations of the Cloud Security Alliance Cloud Controls Matrix rest on its customized relationship to other industry-accepted security standards, regulations, and controls frameworks such as the HITRUST CSF, ISO 27001/27002, ISACA COBIT, PCI, HIPAA and NIST, and will augment or provide internal control direction for SAS 70 attestations provided by cloud providers. As a framework, the CSA CCM provides organizations with the needed structure, detail and clarity relating to information security tailored to the cloud industry. The CSA CCM strengthens existing information security control environments by emphasizing business information security control requirements, reduces and identifies consistent security threats and vulnerabilities in the cloud, provides standardize security and operational risk management, and seeks to normalize security expectations, cloud taxonomy and terminology, and security measures implemented in the cloud. 24 GRC Stack Initiatives Consensus Assessments Initiative Questionnaire (CAIQ) The Cloud Security Alliance Consensus Assessments Initiative (CAI) was launched to perform research, create tools and create industry partnerships to enable cloud computing assessments. We are focused on providing industry-accepted ways to document what security controls exist in IaaS, PaaS, and SaaS offerings, providing security control transparency. This effort by design is integrated with and will support other projects from our research partners. The initial deliverable of this project is the Consensus Assessments Initiative Questionnaire (CAIQ). This questionnaire is available in spreadsheet format, and provides a set of questions a cloud consumer and cloud auditor may wish to ask of a cloud provider. It provides a series of “yes or no” control assertion questions which can then be tailored to suit each unique cloud customer’s evidentiary requirements. 25 GRC Stack Initiatives Cloud Trust Protocol (CTP) The Cloud Trust Protocol (CTP) is the mechanism by which cloud service consumers (also known as “cloud users” or “cloud service owners”) ask for and receive information about the elements of transparency as applied to cloud service providers. The primary purpose of the CTP and the elements of transparency is to generate evidence-based confidence that everything that is claimed to be happening in the cloud is indeed happening as described, …, and nothing else. This is a classic application of the definition of digital trust.4 And, assured of such evidence, cloud consumers become liberated to bring more sensitive and valuable business functions to the cloud, and reap even larger payoffs. With the CTP cloud consumers are provided a way to find out important pieces of information concerning the compliance, security, privacy, integrity, and operational security history of service elements being performed “in the cloud”. 26 Cloud Security Threats and How Government Agencies are Coping Cloud computing services exemplify a significant change in the way companies and organizations perceive IT infrastructure in terms of cost and productivity. Many of the functions and capabilities provided by cloud environments are typically very costly and laborintensive to implement in traditional data centers. For this reason many companies, organizations, and government agencies are rethinking IT infrastructure and opting for virtualization to reduce costs while maintaining productivity in a difficult economy. Although cloud computing represents many new opportunities to access state-of-the-art technology at a much lower cost, many are concerned about the risks associated with cloud computing systems and the loss of control over IT infrastructure which you otherwise have with a traditional IT infrastructure. This is especially true with government agencies that have countless security and compliance requirements to follow, most of which cannot be accessed on a cloud services platform. These are guidelines enforced by International Traffic in Arms Regulations and security controls and certifications such as ISO 27001, ISO 27002, SAS-70, SAS-70 Type 2, and regulations set forth by the Health Insurance Portability and Accountability Act. According to the Cloud Security Alliance cyber criminals continue to take advantage of new technologies to extend the reach of criminal activities and avoid detection. Cloud computing systems have been highly targeted due to the fact it is a relatively new technology without the security controls typically included in a traditional IT infrastructure. However, this is rapidly changing but in the meantime, the Cloud Security Alliance has highlighted some of the top cloud computing threats which CSPs face when providing cloud services to organizations. 27 Common Cloud Security Threats Criminals find ways to release new threats on a frequent basis just as viruses and malware are released on the Internet every day. Cloud computing is not immune to this fact which can make risk management an ongoing task for maintaining secure cloud computing systems. Iaas and Paas Attacks: Cloud computing systems which are offered as IaaS (Infrastructure as a Service) and PaaS (Platform as a Service) have been subject to password and key cracking in which criminals use sophisticated software to obtain passwords and key codes for unauthorized access. A more common form of Iaas and Paas attacks are botnets which take command of the cloud server environment for malicious purposes and Denial of Service attacks which breach server security before sending massive amounts of information packets in an effort to bring down a cloud server and gain unauthorized access to sensitive data. Inside Threats: Cloud service providers employ a staff of people to help monitor and maintain the infrastructure however, when you use some of the services the provider may not reveal who has access to the servers and vaults which are used with cloud computing infrastructure. In this case, there is a chance that a threat to sensitive data could come from the inside if the cloud service provider does not have policies in place for monitoring employees and policy compliance. Depending upon the process the cloud service provider (CSP) uses for hiring, confidential data could be subject to espionage, hacking, or someone working within organized crime. Hijacking: Phishing and software exploitation has been around for some time now however, cloud computing adds a new dimension to this crime. If a criminal obtains unauthorized access to your credentials through a phishing scheme or software vulnerability it is then possible for them to eavesdrop on cloud computing activities, redirect your clients to sites that look legitimate but are laced with criminal intentions, or alter the data and information which is stored in an account on the cloud server. 28 Common Cloud Security Threats (cont.) Issues with Shared Technology: In a cloud environment which offers multi-tenancy the services are typically provided with scalability which is accomplished using a shared infrastructure. Sometimes the proper isolation and security properties are not in place which can create a gap between the virtualized server and the host operating system. This can cause problems with data breaches, network traffic, disk partitions, CPU caches, and other shared elements. Once the shared technology is accessed it can impact the security of others who are using the cloud services. These are a few of the general cloud security threats which can occur in a cloud computing environment. Government agencies are able to cope with these threats by using cloud service providers (CSPs) which have been certified by the FedRAMP assessment process which is a standardized approach set forth by the federal government to ensure security and compliance is being followed when using cloud computing systems. Government agencies are also choosing to use services such as GovCloud provided by Amazon Web Services which has been designed to meet government data security compliance and guidelines for different types of data classification. GovCloud also ensures access to data stays within the borders of the United States in accordance with the International Traffic in Arms Regulations. 29 Cloud Computing Service Audit Data Classification 30 Cloud Audit CloudAudit is a specification for the presentation of information about how a cloud computing service provider addresses control frameworks. The goal of CloudAudit is to provide cloud service providers with a way to make their performance and security data readily available for potential customers. The specification provides a standard way to present and share detailed, automated statistics about performance and security. Standardized information makes comparisons among providers easier, reducing the resources required to assemble documentation and analyze the data. CloudAudit is intended to benefit cloud computing providers as well. For example, the cost of responding to a potential customer's compliance controls may be minuscule for a large vendor. However, a small vendor may find it burdensome to provide that information to multiple prospective customers. With CloudAudit, vendors can provide information once and only update when there are changes. CloudAudit’s development codename was A6 (Automated Audit, Assertion, Assessment, and Assurance API). According to the Internet Engineering Task Force (IETF) draft document, CloudAudit provides “a common interface, naming convention, set of processes and technologies utilizing the HTTP protocol to enable cloud service providers to automate the collection and assertion of operational, security, audit, assessment, and assurance information.“ CSA released CloudAudit as part of a free tool suite for cloud-based Governance, Risk and Compliance (GRC) in November 2010. The tool consists of a directory or common namespace that serves as an organized repository. Cloud computing providers can put whatever they want within the directories (PDF files, text documents, links to websites, etc.) to indicate how they are addressing requirements within various control frameworks. The first set of namespaces is compliance-driven with a focus on PCI-DSS, HIPAA, COBIT, ISO 27002 and NIST 800-53. 31 IT Assurance Framework ISACA’s IT Assurance Framework™ (ITAF™) includes a section (3630.6) on outsourcing and third-party activities (see figure 1). Cross-references are included—COBIT® PO4, PO7, PO8, PO9, AI2 and AI5, and ISACA IT Audit and Assurance Guidelines (formerly IS Audit Guidelines) G4, G18, G32 and G37. These referenced documents provide useful technical assistance in conducting an IT audit for cloud computing. 32 IT Assurance Framework (cont.) Obviously, the fact that a third party is involved means direct auditing of the service entity may not be practical or even possible. ITAF also supplies a list of potential documents that could provide service audit information that should be relevant (see figure 2). 33 Information Security – International Standard (ISO 27001) 1. Security policy 2. Organization of information security ISO 27001 Objectives 3. Asset management Processes & Activities 4. Human resources security 5. Physical and environmental security 6. Communications and operations management 7. Access control 8. Information systems acquisition, development and maintenance 9. Information security incident management 10. Business continuity management 11. Compliance Interdependent Approaches / Consideration ... ... Domains Supervision / Monitoring / Across Criteria / Functions Consideration of common errors in identifying objectives – Identifying a means as an end. Failing to consider each type & all types of objectives. Failing to consider the relationships between objectives. 34 Developing the IT Audit Plan & Related Monitoring by management Understanding the Business + IT Risk Understanding the IT environment in a business context 35 35 36 36 Metha Suvanasarn : CGEIT;CRISC;CRMA; CIA;CPA www.itgthailand.com 37 37