Evidence for Accountable Cloud Computing Services

Similar documents
Javier Villegas. Azure SQL Server Managed Instance

CLOUD FORENSICS : AN OVERVIEW. Kumiko Ogawa

Course Overview This five-day course will provide participants with the key knowledge required to deploy and configure Microsoft Azure Stack.

Security Models for Cloud

Module Day Topic. 1 Definition of Cloud Computing and its Basics

DIGITAL FORENSICS FORENSICS FRAMEWORK FOR CLOUD COMPUTING

Cloud Customer Architecture for Securing Workloads on Cloud Services

Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack

20537A: Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack

Cloud Essentials for Architects using OpenStack

Managing SaaS risks for cloud customers

Certification Exam Outline Effective Date: April 2015

INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE

Securing the cloud ISACA Korea. Han Ther, Lee CISA, CISM, CISSP, CRISC, ITILF, MCSA

Cloud Computing: A European Perspective. Rolf von Roessing CISA, CGEIT, CISM International Vice President, ISACA

Building Trust in the Era of Cloud Computing

Security Readiness Assessment

DISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing WHAT IS CLOUD COMPUTING? 2. Slide 3. Slide 1. Why is it called Cloud?

Cloud Computing Lecture 4

2018 Cisco and/or its affiliates. All rights reserved.

Geneva, 6-7 December 2010 Addressing security challenges on a global scale

Copyright 2011 EMC Corporation. All rights reserved.

DELIVERING TRUSTED CLOUDS How Intel and Red Hat integrated solutions for secure cloud computing

Enhanced Privacy ID (EPID), 156

Building Hybrid Clouds

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control

Public vs private cloud for regulated entities

Technicalities of Living in the JD Edwards Cloud Cloud Options and Strategies

SOARING THROUGH THE CLOUDS IT S A BREEZE

Agenda GDPR Overview & Requirements IBM Secure Virtualization Solution Overview Summary / Call to Action Q & A 2

Certification Exam Outline Effective Date: August 1, 2019

Cloud Certified Professional (CCP) Course Catalog

CompTIA CV CompTIA Cloud+ Certification. Download Full Version :

Data Protection. Code of Conduct for Cloud Infrastructure Service Providers

On Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor

CLOUD GOVERNANCE SPECIALIST Certification

Faculté Polytechnique

Cloud Computing. Faculty of Information Systems. Duc.NHM. nhmduc.wordpress.com

Part III: Evaluating the Business Value of the Hybrid Cloud

Overview of International Standards for Cloud Computing

CSA GUIDANCE VERSION 4 S TAT E O F T H E A R T CLOUD SECURITY AND GDPR NOTES. Hing-Yan Lee (Dr.) EVP, APAC, Cloud Security Alliance

Actual Agility with SDN: Weaving SDN into Data Center Automation May 6, John Burke Principal Research Analyst & CIO

ECSA Assessment Report

BUILDING A PRIVATE CLOUD. By Mark Black Jay Muelhoefer Parviz Peiravi Marco Righini

FUJITSU Software ServerView Cloud Monitoring Manager V1.0. Overview

FPKIPA CPWG Antecedent, In-Person Task Group

NEXT GENERATION CLOUD SECURITY

Cloud Computing An IT Paradigm Changer

Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard

Creating a Practical Security Architecture Based on sel4

Kako napraviti Cloud?

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer

In this unit we are going to look at cloud computing. Cloud computing, also known as 'on-demand computing', is a kind of Internet-based computing,

STANDARDS TO HELP COMPLY WITH EU LEGISLATION. EUROPE HAS WHAT IT TAKES INCLUDING THE WILL?

CLOUD SECURITY SPECIALIST Certification. Cloud Security Specialist

Practical Guide to Platform as a Service.

Intel s s Security Vision for Xen

Secure & Unified Identity

Domain Registrations. Shared Hosting. Office 365 and Hosted Exchange #DOMAINS #HOSTING #

EMC Strategy Overview: Journey To The Private Cloud

David Jenkins (QSA CISA) Director of PCI and Payment Services

Virtual Machine Encryption Security & Compliance in the Cloud

RA-GRS, 130 replication support, ZRS, 130

Managing your Cloud with Confidence

Testing Cloud Services: SaaS, PaaS and IaaS. Kees Blokland Jeroen Mengerink

Introduction to Device Trust Architecture

Importance of the Data Management process in setting up the GDPR within a company CREOBIS

Merging Enterprise Applications with Docker* Container Technology

Securing Cloud Computing

Jim Reavis CEO and Founder Cloud Security Alliance December 2017

Version 1/2018. GDPR Processor Security Controls

Cloud-Security: Show-Stopper or Enabling Technology?

Cloud computing the use of contracts as a means of governing networked computer services.

Business Technology Briefing: Fear of Flying, And How You Can Overcome It

WORKSHARE SECURITY OVERVIEW

Benefits of Cloud Computing

Why Choose MS Azure?

Orchestrating the Cloud Infrastructure using Cisco Intelligent Automation for Cloud

Why the cloud matters?

CLOUD COMPUTING. The Old Ways Are New Again. Jeff Rowland, Vice President, USAA IT/Security Audit Services. Public Information

Table of Contents. AIS Application & Interface Security Application Security...20

Cloud Computing: Is it safe for you and your customers? Alex Hernandez DefenseStorm

Data Privacy in the Cloud E-Government Perspective

Securing Your Virtual World Harri Kaikkonen Channel Manager

PUBLIC AND HYBRID CLOUD: BREAKING DOWN BARRIERS

Open Hybrid Cloud & Red Hat Products Announcements

CHAPTER 5 DISCUSSION AND ANALYSIS

Use Case Brief BORDERLESS DATACENTERS

IBM Bluemix compute capabilities IBM Corporation

Azure SQL Database. Indika Dalugama. Data platform solution architect Microsoft datalake.lk

Cisco Cloud Strategy. Uwe Müller. Leader PreSales Cloud & Datacenter Germany

Digital Renewable Ecosystem on Predix Platform from GE Renewable Energy

A sanity check on Cloud from a Benelux point of view. Is Cloud turning into Fast Food? Are we conscious of the health risks?

GDPR: A technical perspective from Arkivum

Cloud Computing: Standardization Challenges EC/ETSI Workshop on Standards in the Cloud Emmanuel Darmois September 28, 2011

Xen Community Update. Ian Pratt, Citrix Systems and Chairman of Xen.org

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY

SailPoint Technologies

Cloud Computing Overview. The Business and Technology Impact. October 2013

TEN ESSENTIAL NETWORK VIRTUALIZATION DEFINITIONS

Transcription:

Thomas Rübsamen, Christoph Reich Hochschule Furtwangen University HFU Aryan Taherimonfared, Tomasz Wiktor Wlodarczyk, Chunming Rong Center for IP-based Service Innovation, TN-IDE, University of Stavanger

Agenda 1. Introduction 2. Accountability and evidence 3. What should be evidence? 4. Where is evidence collected? 5. Challenges 6. Summary 2

Introduction Transparency and control issues arise, when data is stored remotely in the cloud Lost control over physical servers/networks Service provision/de-provision Tenant isolation Data processing/movement Adding key terms to cloud SLAs is not enough Processes and mechanisms must be developed to monitor and audit these terms Providers must provide evidence Cloud customer must be allowed to verify, that his data is being stored and maintained correctly in the cloud, and that his policies are adhered to Evidence collection shall capture, integrate and process logs, (data) policies and context Showing what happens in the cloud and providing evidence for it can address transparency and accountability issues 3

Accountability and Evidence I Evidence may be derived from different sources, events and architectural layers Mapping of evidence to accountability contracts/slas and other policy requirements No efficient mechanisms to gather convincing evidence from verified log data No incentive for providers to publish log information How to make evidence gathering mechanisms compatible and interoperable? 4

Accountability and Evidence II Collect evidence to support (external) audits and verification Evidence is provided to (automated) audits for fault detection Accountability attributes are assured by evidence Attributability: a property of an observation can be assigned to an actor Observability: how well internal actions of a system can be described by observing the external output Assurance: Provision of evidence to proof an incident has happened / not happened Verifiability: An aspect of a contractual relationship can be observed through evidence 5

Accountability and Evidence IV 6

What should be evidence? Information about data traveling in the cloud (where, juristiction) Information about data access (by whom and when, role, identity, purpose, time) Information about processes (data lifecycle events) Logging data from involved components/services 7

Where is Evidence Collected - Gathering Points Guest Usage Guest App SaaS Guest OS PaaS IaaS Hypervisor CMS Host OS Hardware Network 8

Challenges of Evidence Large amounts of data (Big Data?) Various data formats How can evidence be trusted (certification, singing, tamper-evident recording) Retention-time of evidence (laws may apply) Interoperability of evidence collection in multi-provider scenarios (cloud provider accountability chains) Multi-tenancy in monitoring tools and devices 9

Summary Build an evidence base for collected information to assure accountability and support audits Evidence will be collected at many architectural layers in the cloud stack Many challenges to address 10

Thank You for Your Attention! 11