ENISA and Cloud Security Dimitra Liveri| NIS Expert EuroCloud Forum 2015| Barcelona|07-10-2015 European Union Agency for Network and Information Security Securing Europe’s Information Society Operational Office in Athens 2 Positioning ENISA activities 3 Agenda • Benefits of Cloud Computing • Risks in Cloud Computing • ENISA Activities in Cloud Security • ENISA tools • Risk Assessment for SMEs • Cloud Certification Schemes List • Next steps 4 Cloud Computing is a Business model • Cloud Computing is another way of providing IT services • Characteristics are - Highly standardized services Highly standardized SLAs • Using such a service is outsourcing • Cloud SLAs are usually much more standardized than in other outsourcing contracts 5 Cloud Computing is a Deployment Model • Cloud computing is a deployment model • Information processing - • • In a shared environment using shared computing resources Resources can be quickly scaled to meet changed demand Cloud deployments are usually much more Cloudand is a deployment standardized automated than legacy IT © Google / Conny Zhou model 6 Cloud Opportunities Economies of Scale Efficient solutions • Better ROI • More efficient resource utilization also means cost savings • Cost of security spread to all customers High Resiliency Standardised solutions • Better back up services • Better patch management • Better business recovery • Better software update management • Portable and interoperable 7 Cloud Challenges Isolation Failures • control resides to the cloud provider Management GUI and API compromise • Identity and access management are particularly important • Full access to all resources (keys to many kingdoms) Loss of Governance • Customer cedes some control to the provider (depending on the deployment model) • This also affects security Presentation Title | Speaker Name Data protection • The CSP usually becomes data processor in terms of DP legislation • Data processing in datacentres abroad can imply that certain DP requirements cannot be met in the Cloud 8 Differences in Requirements for Governments vs. Companies Private Sector Public Sector • Difference depending on the scale i.e. Large companies and SMEs • Legacy Data • Investment from cost perspective EASIER TO MAKE THE RIGHT DECISION • Legacy Applications • Legacy Processes • Special information assurance requirements NEEDS MORE TIME TO ADOPT 9 ENISA’s work in the area of Cloud 2009 Cloud computing risk assessment 2009 Cloud security Assurance framework 2012 Procure secure (Security in SLAs) 2013 Critical cloud computing 2013 Incident reporting for cloud computing 2013 Securely deploying GovClouds 2013 Support EU Cloud Strategy 2014 Cloud Certification Meta-Framework 2014 Procurement security in GovClouds 2015 Cloud Security guide for SMEs http://www.enisa.europa.eu/activities/Resilience-and-CIIP/cloud-computing 10 ENISA engages the community ENISA Cloud Security and Resilience experts group 11 Cloud Computing Risk Assessment Addressed to: public sector, private sector (large companies and SMEs), governmental agencies 12 Risk Assessment in the Cloud Famous 2009 Guide Updated in 2012 Security Guide for SMEs – 2015 13 Security guide for SMEs • Small and medium size enterprises (SMEs) are an important driver for innovation and growth in the EU • Cloud Computing is a means for innovation, but cloud is for the SMEs still a challenge. • ENISA in this study presents: - - 11 security opportunities (compared to legacy IT benefits) 11 security risks (compared with legacy IT risks) 12 security questions for the SME to ask the provider (in one security “cheat sheet” 2 comprehensive scenarios Some legal advice 14 …and online tool Where you can: • rate your opportunities from cloud • rate your risks • produce a risks map • get your security questions 15 Governmental Clouds Addressed to: public sector, governmental agencies 16 Governmental Cloud reports (1/2) 2010: Guide on security and resilience for Governmental Clouds • • Presentation of the security benefits and drawbacks for the public sector to go in the cloud First steps need to be done towards taking the decision to go cloud 2013: Good practice guide on how to securely deploy Governmental Clouds • • • Definition of a governmental cloud (in a mature market) State of cloud computing adoption in the EU public sector Case studies of different approaches in adopting a cloud solution 17 Governmental Cloud reports (2/2) 2014: Security Framework for Governmental Clouds • 4 phases, 10 different steps and the specific actions to be taken in each one • 4 use case scenarios to find the solutions that better fits each implementation Presentation Title | Speaker Name 18 Critical Clouds Addressed to: private sector, (public sector in some cases) 19 ENISA’s Critical Cloud Study • First assessment of CIIP aspects of Cloud computing • Illustrates dependencies and provides examples for failures • Provides recommendations for Cloud security governance from the CIIP perspective • Conclusions can be applied to Governmental Cloud usage 20 Incident Reporting for Cloud Computing • Cloud computing incidents could have major impact. • Large scale incidents should be reported to improve trust • Public sector and industry should agree on scope and thresholds of reporting. • ENISA suggests a model for incident reporting of cloud incidents involving CSPs and regulators. 21 Cloud in the Critical Sectors Critical Clouds Cloud Computing in the Finance Sector Cloud supporting Health care systems and services Cloud supporting eGovernment 22 Good Practices for the use of Cloud Computing in the area of Finance Sector • Identification of critical challenges to cloud computing adoption in the Finance sector • Assess legal and regulatory context (challenges and opportunities) in all member states • Support industry and understand their uptake – why do some use and some don’t use cloud • Propose recommendations 23 Cloud Certification Addressed to: private sector large companies and SMEs, (public sector and governmental agencies in some cases) 24 The EU Cloud Strategy “EU should not only be cloud-friendly, but also cloud–active” The European Commission’s strategy “Unleashing the potential of cloud computing in Europe” Adopted on 27 September 2012, it is designed to speed up and increase the use of cloud computing across the economy Cutting through the jungle of technical standards Development of model “safe and fair” contract terms and conditions A European Cloud Partnership to drive innovation and growth from the public sector “I am pleased that ETSI launched and steered the Cloud Standards Coordination (CSC) initiative in a fully transparent and open way for all stakeholders.” “...ensuring technical security requirements are mapped onto certification, as ENISA is leading…” “... we officially launch the platform for public sector cooperation with this "Cloud for Europe" initiative. This is an enormous step forward.…” Neelie Kroes, European Commissioner for the Digital Agenda Oct 2013 25 ENISA realising the EU Cloud Strategy: Certification • Strategic objective of EC Strategy: List of voluntary certification schemes • Cloud Certification Schemes List (CCSL): List of existing certification schemes – 13 Certification schemes included – Powered by ENISA, supported by the EC and the Cloud Selected Industry Group (C-SIG) • Cloud Certification Schemes Metaframework (CCSM): Meta-framework based on existing certification schemes – Mapping detailed ICT security requirements of the public sector in the EU (11 countries and more will come) – Matrix will results to be used for procurement Visit: https://resilience.enisa.europa.eu/cloud-computing-certification 26 How we draw CCSM Country A Country B Security requirement Security requirement Security requirement Security requirement Security requirement Security requirement Security requirement Security requirement Requirements not covered by CCSM or existing certification schemes remain to be evaluated separately. CCSM Security objectives Security objective Security objective Security objective Cloud Certification Scheme Scheme ref Scheme ref Security objective Security objective Cloud Certification Scheme Scheme ref Scheme ref Scheme ref Scheme ref Scheme ref Scheme ref Scheme ref Scheme ref Scheme ref Scheme ref Scheme ref 27 Next steps Ex-post analysis of cloud incidents (early 2016) • EU perspective on ex post analysis (forensics) for cloud incidents: 8 countries(IT, ES, IE, NL, GR, FR, EE, UK): Academia, LEAs, Forensics Specialists, CERTs. • Challenges, procedures, tools, legal restrictions ICT in e-Health (2016) • Challenges and opportunities of ICT deployments in eHealth (medical records, patient records etc) • Cloud computing use case in eHealth • Big data use case in e Health 28 Thank you and Welcome! PO Box 1309, 710 01 Heraklion, Greece Tel: +30 28 14 40 9710 info@enisa.europa.eu www.enisa.europa.eu