PDF - Cloud Security Alliance

advertisement
Cloudy with Showers of
Business Opportunities and
and
a
Good
Chance
of
NIST
Security and Accountability
Not All Clouds are Equal – Can You Tell the Difference?
Security and Privacy Controls for Cloud-based Federal
Information Systems
Dr. Michaela Iorga,
Senior Security Technical Lead for Cloud Computing
Co-Chair, Cloud Security WG
Co-Chair, Cloud Forensics Science WG
May, 2015
The World is changing…
2
Many Shades of Cloud Views….
SECURITY VIEW
CLOUD VENDOR’S
VIEW
BUSINESS
VIEW
Security & Privacy may mean different
things to different people…
Army
Navy
Marines
4
Slide courtesy of Bill Murray, AWS, Amazon
Air Force
Balancing Cloud Benefits and Risks …
… is not easy but it
can be done.
•
•
•
•
•
Reduce Capital Cost
Improve Business Agility
Increase Productivity & Collaboration
Increase Competitiveness
Lower Staff Cost
•
•
•
•
•
Preserve Security Posture
Improve Security
Minimize Business Risk
Increase Availability
Preserve Privacy
NIST Risk Management Standards
•
•
•
•
•
•
•
•
Standards for Security Categorization of Federal Information and Information
Systems (FIPS 199); Feb 2004
Guide for Mapping Types of Information and Information Systems to Security
Categories (SP 800-60 Rev. 1); Aug 2008
Minimum Security Requirements for Federal Information and Information
Systems (FIPS 200); Mar 2006
Security Considerations in the System Development Life Cycle (SP 800-64 Rev.
2); Oct 2008
Guide for Applying the Risk Management Framework to Federal Information
Systems: A Security Life Cycle Approach (SP 800-37, Rev. 1); Feb 2010
Managing Information Security Risk: Organization, Mission, and Information
System View (SP 800-39); Mar 2011
Guide for Conducting Risk Assessments (SP 800-30 Rev. 1); Sep 2012
Security and Privacy Controls for Federal Information Systems and
Organizations (SP 800-53 Rev. 4); Apr 2013
Other Related NIST Special Publications
•
•
•
•
7
Performance Measurement Guide for Information Security (SP 800-55 Rev. 1);
Jul 2008
Contingency Planning Guide for Federal Information Systems (SP 800-34 Rev.
1); May 2010
Information Security Continuous Monitoring for Federal Information Systems and
Organizations (SP 800-137); Sep 2011
Computer Security Incident Handling Guide (SP 800-61 Rev. 2); Aug 2012
New NIST Special Publications (Drafts)
• DRAFT Systems Security Engineering: An Integrated Approach to Building
Trustworthy Resilient Systems (SP 800-160 Draft); May 12, 2014
• DRAFT Supply Chain Risk Management Practices for Federal Information
Systems and Organizations SP 800-161 (Second Draft); Jun. 3, 2014
• NIST SP 500-299: NIST Cloud Computing Security Reference Architecture (draft)
• NIST SP 800-173: Guide for Applying the Risk Management Framework to
Cloud-based Federal Information Systems; work in progress
• NIST SP 800-174: Security and Privacy Controls for Cloud-based Federal
Information Systems; work in progress
NIST Cloud Computing Security Reference
Architecture
(NIST SP 500-299)
DRAFT
NIST Cloud Publications Page:
http://www.nist.gov/itl/cloud/publications.cfm
NIST CC Security Reference Architecture - Approach
NIST Security Reference Architecture – formal model
NIST Security Reference Architecture – security components
Mapping
components to
architecture
NIST Reference Architecture
TCI Reference Architecture
+
NIST CC Reference Architecture (SP 500-292)
with Cross Cutting Concerns shown
Cloud
Cloud
Consumer
Consumer
Cloud
Cloud Auditor
Auditor
Cloud
Cloud Provider
Provider
Cloud
Orchestration
Service
ServiceLayer
Layer
SaaS
SaaS
Cloud
Cloud Broker
Broker
Cloud
Cloud Service
Service
Management
Management
Business
Business
Support
Support
PaaS
PaaS
Service
Service
Intermediation
Intermediation
IaaS
IaaS
Security
Security
Audit
Audit
Privacy
PrivacyImpact
Impact
Audit
Audit
Performance
Performance
Audit
Audit
Cloud
Cloud
Consumer
Consumer
Resource
ResourceAbstraction
Abstraction
and
and
Control
ControlLayer
Layer
Physical
PhysicalResource
ResourceLayer
Layer
Hardware
Hardware
Provisioning/
Provisioning/
Configuration
Configuration
Service
Service
Aggregation
Aggregation
Portability/
Portability/
Interoperability
Interoperability
Service
Service
Arbitrage
Arbitrage
Facility
Facility
Cloud
Cloud Carrier
Carrier
Cross Cutting Concerns: Security, Privacy, etc
NIST Security Reference Architecture – formal model
11
NIST
CSA
NIST SWG leverages Cloud Security
Alliance’s Enterprise Architecture
(before: Trusted Cloud Initiative Reference Architecture)
https://cloudsecurityalliance.org/wp-content/uploads/2011/11/TCI-Reference-Architecture-1.1.pdf
NIST Security Reference Architecture
– security components -
14
Consumer’s ITOS
S&RM
S&RM
Consumer’s S&RM
Provider’s S&RM
Provider’s S&RM
Provider’s S&RM
Consumer’s BOSS SCs
Provider’s ITOS SCs
Provider’s ITOS SCs
Organizational
OrganizationalSupport
Support
Provider’s BOSS SCs
Broker’s ITOS SCs
Broker’s ITOS SCs
Broker’s BOSS SCs
Provider’s Infrastrct SCs
Provider’s Physical Sec
Carrier’s S&RM SCs
Carrier’s ITOS SCs
Carrier’s BOSS SCs
NIST Security Reference Architecture
– Security Index System Security Index System
NIST Security Reference Architecture
– Aggregated Security Index System – Heat Map
ISO/IEC based CC Security Reference Architecture
ISO/IEC Security Reference Architecture – security components
ISO/IEC Security Reference Architecture – formal model
Mapping
components to
architecture
ISO/ICE Reference Architecture
RMF2C + methodology
TCI Reference Architecture -> functional capabilities
+
OUR APPROACH IS MODULAR – YOU CAN SUBSTITUTE COMPONENTS
E.g. ISO/IEC based CC Security Reference Architecture -
ISO/IEC Security Reference Architecture – formal model
ISO/IEC Security Reference Architecture – security components
Mapping
components to
architecture
RMF2C + methodologyProprietary Set of Components/capabilities
ISO/ICE Reference Architecture
+
YOUR OWN SET OF
COMPONENTS
OR
USE CSA’s CCM !!
CCM vs. NIST SRA /CSA Enterprise Architecture
Cloud Security Alliance
Trusted Computing Initiative - Reference Architecture
https://research.cloudsecurityalliance.org/tci/
20
SP 500-299: Cloud Security Reference Architecture
RMF2C + Methodology
“Guide for Applying Risk
Management Framework
to Cloud-based Federal
Information Systems”
NIST SP 800-173
HELPS SELECT BEST-FITTING
CLOUD ARCHITECTURE
Guide for Applying Risk Management
Framework to Cloud-based Federal
Information Systems
NIST SP 800-173
- work in progress -
Learn how to build trust &
how FedRAMP or STAR can help..
Why Do We Fear
the Clouds ?
Searching For an Answer
N
O
I
T
A
NIST: Research – Challenging Security Requirement
for the USG Cloud Adoption, (whitepaper)
MeriTalk:
USER’s
DATA
L
E
R
1.... If I like it, it's mine.
2.... If it's in my hand, it's mine.
3.... If I can take it from you, it's mine.
4.... If I had it a little while ago, it is mine.
5.... If it's mine, it must never appear to be yours in any way.
6.... If I'm doing or building something, all the pieces are mine.
7.... If it looks just like mine, it's mine.
8.... If I saw it first, it's mine.
9.... If you are playing with something and you put it down, it automatically becomes mine.
10.... If it is broken, it's yours.
T
O
N
T
S
U
R
L
I
U
B
R
T
D
T
S
U
Trust & Trustworthiness (NIST SP 800-39*)
“Trust is an important concept related to risk management. How organizations
approach trust influences their behaviors and their internal and external trust
relationships. […] The reliance on IS services results in the need for trust
relationships among organizations”*
① Validated Trust. One organization obtains a body of evidence regarding the actions of
another organization and uses that evidence to establish a level of trust with the other
organization.
② Direct Historical. The track record exhibited by an organization in the past is used to
establish a level of trust with other organizations.
③ Mediated Trust. An organization establishes a level of trust with another organization
based on assurances provided by some mutually trusted third party.
④ Mandated Trust. An organization establishes a level of trust with another organization
based on a specific mandate issued by a third party in a position of authority.
⑤ Hybrid Trust. An organization uses one of the previously described models in
conjunction with another model(s).
*NIST SP 800-39: Managing Information Security Risk; Organization, Mission, and Information System
View
Consumer’s Level of Control & SP 800-37 RMF
SaaS
RMF2C
RMF
RMF
RMF2C
RMF
PaaS
RMF
RMF
RMF2C
You manage
IaaS
Stack image source: Cloud Security Alliance specification, 2009
Trustworthiness requires visibility into Provider’s practices and risk/information
security decisions to understand risk tolerance. But level of trust can vary & the
accepted risk depends on the established trust relation.
NIST’s Work – Helps Consumer Deal With an
Iceberg Architecture
NIST SP 800-173:
Cloud-adapted Risk Management Framework
RMF
RMF
consumer
nsumer
co
Risk Management Framework (SP 800-37 Rev1) :
Step 1: Categorize Information System
Step 2: Select Security Controls
Step 3: Implement Security Controls
Step 4: Assess Security Controls
Step 5: Authorize Information System
Step 6: Monitor Security Controls
(Repeat process as necessary)
Cloud-adapted Risk Management Framework
(SP 800-173, draft):
Step 1: Categorize: System to be migrated
Step 2: Select: Security Requirements, perform
a Risk Assessment & select Security Controls
Step 3: Identify: best-fitting Cloud Architecture
Implement Cloud-based solution
Step 4: Assess Service Provider(s) & Controls
Step 5: Authorize Use of Service
Step 6: Monitor Service Provider [on-going, near-realtime ] (Repeat process as necessary)
RMF2C
CRMF
RMF2C
CRMF
SP 500-299
RMF
RMF
provider
provider
Stack--image
imagesource:
source:Cloud
CloudSecurity
SecurityAlliance
Alliance
Stack
specification,2009
2009
specification,
Applying Risk Management Framework to Cloud-based
Federal Information Systems
RMF
mer
RMF2C
RMF2C
consu
RM
F
provid
er
Stack - image source: CSA specification, 2009
Risk Management Framework (SP 800-37 Rev1) :
Step 1: Categorize Information System
Step 2: Select Security Controls
Step 3: Implement Security Controls
Step 4: Assess Security Controls
Step 5: Authorize Information System
Step 6: Monitor Security Controls
(Repeat process as necessary)
Cloud-adapted Risk Management Framework
(SP 800-173, draft):
Step 1: Categorize: System to be migrated
A&A
A&Aor
orC&A
C&A
Step 2: Select: Security Requirements, perform
Authoritiesprovide
provide
a Risk Assessment & select Security Controls Authorities
aastandardized
standardized
Step 3: Identify: best-fitting Cloud Architecture
approach
approachto
tosecurity
security
Implement Cloud-based solution
assessment
assessmentor
or
Step 4: Assess Service Provider(s) & Controls
certification
certificationand
and
Step 5: Authorize Use of Service
authorization..
Step 6: Monitor Service Provider [on-going, near-real-authorization..
time ] (Repeat process as necessary)
Applying Risk Management Framework to
Cloud-based Federal Information Systems
(NIST SP 800-173)
DR
DE AF
VE T
L O UN
PM D E
EN R
T
SP 800-173
Cloud-adapted Risk Management
Framework
Applying Risk Management Framework to Cloudbased Federal Information Systems
SaaS
CRMF
CRMF
You manage
1. Follows NIST RMF (SP 800-37 Rev1) structure
2. Discusses the impact of cloud computing
architecture (deployment model & service type),
and cloud characteristics
IaaS (multi-tenancy,PaaS
resource-pooling, elasticity, etc.) on
“Information System Boundary”.
3. Discusses the notion of TRUST in a
cloud ecosystem, and introduces the notion
of TRUST BOUNDARY
4. Introduces the “Security Conservation
Principle” & “Privacy Conservation
Principle”
Applying Risk Management Framework to Cloud-based
Federal Information Systems
Step 1 : Categorize Federal Information System
Step 2 : Select: Security Requirements, perform a Risk Assessment & select Security Controls
deemed necessary.
Step 3 : Identify best-fitting Cloud Architecture &
Implement cloud-based solution
SaaS
PaaS
SaaS Boundary
IaaS
PaaS Boundary
IaaS Boundary
Ecosystem Orchestration Boundary
Cloud Deployment Boundary
Cloud-adapted Risk Management Framework –cont.
Step 4: Assess Service Provider(s) & Broker (if applicable)  leverage FedRAMP P-ATOs
or Agency-ATOs, or assess the controls  build necessary TRUST that the residual
risk is acceptable
Step 5: Authorizea Use of Service  negotiate SLAs & Security SLA
User-data Boundary
Us
e
Da r
ta
User-data Boundary
t
r-Da
Use dary
n
Bou
Step 6: Monitor Service Provider(s) (on-going, near- real- time); Repeat process as necessary
Security and Privacy Controls for
Cloud-based Federal Information
Systems
NIST SP 800-174
- work in progress -
Controls allocation matters …
Controls’ Allocation Matters …
PaaS
SaaS
You manage
IaaS
Stack image source: Cloud Security Alliance specification, 2009
Provider’s implemented baseline
Consumer’s additional needs
33
Clouds are not identical …
even when implementing same baseline controls
PaaS
SaaS
You manage
IaaS
Stack image source: Cloud Security Alliance specification, 2009
34
A & A baseline
A&A
A&Aor
orC&A
C&AAuthorities
Authorities
provide
provideaastandardized
standardized
approach
to
approach tosecurity
security
assessment
or
assessment orcertification
certification
and
authorization.
and authorization.
Security and Privacy Controls for Cloud-based Federal Information
Systems (*Cloud Overlay*)
NOW: Identifying SP 800-53 Security and Privacy Controls for Cloud Capabilities
Audit Planning
Reviewed
Low (Capability
implementation)
Reviewed
Moderate (Capability
implementation)
Reviewed
High (Capability
implementation)
AC-1, AC-2, AC-3, AC- AC-2(1), AC-2(2), AC- AC-2(11), AC-2(13), AC- 8, AC-17, AC-18, AC- 2(3), AC-2(4), AC-2(5), 6(3), AC-6(7), AC-6(8),
19, AC-20
AC-2(7), AC-2(9), AC- AC-18(4), AC-21(2)
2(10), AC-2(12), AC-4,
AU-1, AU-2, AU-3, AU- AC-4(21), AC-5, AC-6, AU-13,
12, AU-6, AU-9,
AC-6(1), AC-6(2), AC6(5), AC-6(9), ACCM-3(1), CM-5(1), CMAT-1, AT-2, AT-3
6(10), AC-10, AC-11, 5(3), CM-5(4), CM-6(2),
AC-11(1), AC-12, AC- CM-8(4)
CM-1, CM-2, CM-3, CM- 17(9), AC-18(1), AC4, CM-5, CM-6, CM-7, 19, AC-19(5), ACMA-4(3)
CM-8, CM-10, CM-11 20(1), AC-20(2), AC-21
AU-2(3), AU-3(1),
PE-2(3), PE-3(1), PEIA-1, IA-2, IA-2(1), IA-4,CM-2(1), CM-2(3), CM- 6(4)
IA-5, IA-5(1), IA-6, IA- 2(7), CM-3 (2), CM-5,
7, IA-8
CM-6, CM-7(2), CMPS-4(2), PS-6(3)
7(5), CM-8(1), CMMA-1, MA-2, MA-3, MA- 8(3), CM-8(5),
RA-5(4), RA-5(6), RA4, MA-5
IA-5(4), IA-5(6), IA5(10)
MP-1, MP-2, MP-4, MP- 5(7),
5, MP-6,
MA-3(3), MA-5(1)
SC-3, SC-7(8), SC-7(10),
PE-1, PE-2, PE-3, PE-6 MP-5(4)
SC-7(11), SC-7(14), SCPL-1, PL-4
PE-4, PE-5, PE-6(1)
7(15), SC-7(18), SCPS-1, PS-2,PS-3, PS-4, PL-4(1)
7(21), SC-24
PS-5, PS-6, PS-7
RA-5(1), RA-5(2), RARA-1, RA-2, RA-3, RA-55(5)
SI-7(10), SI-10(5)
SC-2, SC-4, SC-7(5),
SC-1, SC-7, SC-8, SC- SC-7(7), SC-8(1), SC12, SC-13, SC-15, SC- 10, SC-18, SC-23, SC28, SC-39
28(1)
SI-3(1), SI-3(2), SI4(4), SI-7, SI-10, SI-16
PM
Controls
Low (info protection)
Moderate (info protection)
High (info protection)
AC-1, AC-2, AC-3, AC-8, AC- AC-2(1), AC-2(2), AC-2(3), AC-2(11), AC-2(13), AC17, AC-18, AC-19, AC-20
AC-2(4), AC-2(5), AC-2(7), 6(3), AC-6(7), AC-6(8),
AC-2(9), AC-2(10), ACAC-18(4), AC-21(2)
AT-1, AT-2, AT-3
2(12), AC-4, AC-4(21), AC5, AC-6, AC-6(1), AC-6(2), AU-13,
AU-1, AU-2, AU-3, AU-6, AU- AC-6(5), AC-6(9), AC9, AU-12
6(10), AC-10, AC-11, AC- CM-3(1), CM-5(1), CM11(1), AC-12, AC-17(9), 5(3), CM-5(4), CM-6(2),
CM-1, CM-2, CM-3, CM-4,
AC-18(1), AC-19, ACCM-8(4)
CM-5, CM-6, CM-7, CM-8,
19(5), AC-20(1), ACCM-10, CM-11
20(2), AC-21
MA-4(3)
AU-2(3), AU-3(1),
IA-1, IA-2, IA-2(1), IA-4, IA-5,
PE-2(3), PE-3(1), PE-6(4)
IA-5(1), IA-6, IA-7, IA-8
CM-2(1), CM-2(3), CM2(7), CM-3 (2), CM-5, CM- PS-4(2), PS-6(3)
MA-1, MA-2, MA-3, MA-4,
6, CM-7(2), CM-7(5), CMMA-5
8(1), CM-8(3), CM-8(5),
RA-5(4), RA-5(6), RA5(10)
MP-1, MP-2, MP-4, MP-5,
IA-5(4), IA-5(6), IA-5(7),
MP-6
MA-3(3), MA-5(1)
SC-3, SC-7(8), SC-7(10),
MP-5(4)
SC-7(11), SC-7(14), SCPE-1, PE-2, PE-3, PE-6
PE-4, PE-5, PE-6(1)
7(15), SC-7(18), SCPL-4(1)
7(21), SC-24
PL-1, PL-4
RA-5(1), RA-5(2), RA-5(5)
SC-2, SC-4, SC-7(5), SC- SI-7(10), SI-10(5)
PS-1, PS-2,PS-3, PS-4, PS-5, 7(7), SC-8(1), SC-10, SCPS-6, PS-7
18, SC-23, SC-28(1)
SI-3(1), SI-3(2), SI-4(4), SIRA-1, RA-2, RA-3, RA-5
7, SI-10, SI-16
SC-1, SC-7, SC-8, SC-12,
SC-13, SC-15, SC-28, SC-39
SI-1, SI-2, SI-3, SI-4, SI-5, SI12
Security and Privacy Controls for Cloud-based Federal Information
Systems (*Cloud Overlay*)
Security and Privacy Controls for Cloud-based Federal Information
Systems (SP 800-174) & CSA’s STAR
SP 500-299
+
FedRAMP
NIST SP 800-53 R4
Overview of NIST’s Current & Future Work
SP 500-299
SP 800-174
SP 800-173
Guide to Applying Risk
Management Framework to
Cloud-based Federal
Information Systemd
Security and Privacy
Controls for Cloud-based
Federal Information
Systems
1.Identify Security Controls
2. Provide Implementation Guidance
3. Provide Assessment Guidance
Security SLA
Security Metrics
Cloud Computing Service
Metrics Description
Security
Intelligence
&
Continuous
Monitoring
Questions?
Thank you !
Additional Information
NIST Cloud Home Page:
http://www.nist.gov/itl/cloud
NIST Cloud Computing Collaborative Twiki:
http://collaborate.nist.gov/twiki-cloud-computing/bin/view/CloudComputing/CloudSecurity
39
Download