CCSK Handbook
CCSK Handbook
Knowledge
CCSK Foundation Student Handbook
Version 4.1
Course Objective
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
1
The CCSK Foundation Course will
Course Overview prepare you for the CCSK exam and
provide additional material and
context.
The CCSK Plus course will prepare you for the CCSK exam
and provides expanded material and exercises to grow your
practical knowledge of cloud computing security through
hands-on exercises.
To pass the exam you will still need to study the CSA
Guidance, Common Assessment Initiative Questionnaire
(CAIQ), the Cloud Controls Matrix (CCM) and the ENISA
risk report.
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
2
Course Structure
The CCSK Foundation Training is divided
into 6 modules which map to domains
outlined in the CSA Security Guidance.
Find out more by hovering over the
circles on the right.
Course Structure
MODULE 1 //
Introduction To Cloud Computing
Domain 1 // Cloud
Computing Concepts
and Architectures
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
3
Course Structure
MODULE 2 //
Infrastructure Security For Cloud
Maps to the following domains in the Security
Guidance:
Domain 6 // Management
Plane and Business Continuity
Domain 7 // Infrastructure
Security
Domain 8 // Virtualization
and Containers
Course Structure
MODULE 3 //
Managing Cloud Security & Risk
Maps to the following domains in the Security
Guidance:
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
4
Course Structure
MODULE 4 //
Data Security For Cloud
Maps to the following domains in the Security
Guidance:
Course Structure
MODULE 5//
Securing Cloud Applications, Users & Related
Technologies
Maps to the following domains in the Security Guidance:
10
10
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
5
Course Structure
MODULE 6 // Cloud Security Operations
11
11
Note
• If you are taking the CCSK Plus class and have
not subscribed to Amazon EC2 and followed the
pre-class setup instructions, you need to now.
• It can take up to a day for your EC2
credentials to fully activate, but it typically
happens within minutes.
12
12
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
6
1 Be prepared to successfully pass the CCSK
written exam.
Learning Outcomes Understand cloud models and architectures,
2
and how to apply the Shared Responsibilities
model to building a cloud security program.
13
13
INTRODUCTION AND
CLOUD ARCHITECTURES
MODULE 1
14
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
7
Module Structure
Content in this module comes from
the following domains in CSA’s
Security Guidance and covers the
following subject areas:
Domain 1 // Cloud
Computing Concepts and
Architectures
• NIST
• Essential characteristics
• Service Models
• Deployment models
15
15
Module Structure
Unit 1 // Module Intro
Unit 2 // Introductions to
Architecture
Unit 3 // Cloud Essential
Characteristics
Unit 4 // Cloud Service
Models
Unit 5 // Cloud
Deployment Models
Unit 6 // Shared
Responsibilities
16
16
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
8
Understand the components of cloud
Learning Objectives infrastructure
17
18
18
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
9
Resource Pools
STORAGE
NETWORKS
COMPUTE
19
19
ABSTRACTION AUTOMATION
20
20
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
10
Traditional virtualization Static Virtualization vs
Cloud Computing
Cloud computing
Virtualization infrastructure.
• The cloud automates and orchestrates
21
22
22
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
11
Definitions
23
Potential Benefits of
Cloud Computing
• No capital expenditures
(using public cloud)
• More agility
• Unbounded scale
• Improved resource utilization
• Customer-controlled migration
• Resilience
• Pay for use
24
24
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
12
Cloud computing is a new operational model
1 that combines the benefits of abstraction
Review (virtualization) and automation
(orchestration) for new ways of delivering
and consuming technology.
Abstraction separates resources from their
2 underlying physical infrastructure. It allows
us to create resource pools out of those
underlying assets.
Automation (orchestration) allows us to
rapidly provision and deprovision those
3 resources from the resource pool.
This is different than traditional
virtualization which includes the abstraction
4 piece, but doesn't necessarily use that to
build resource pools, and lacks the
advanced orchestration of cloud.
Cloud can potentially provide a wide range
of benefits, but the key ones are economic,
5 agility, and resiliency.
25
25
26
26
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
13
Broad
Broad Network Access network
access
• Access through standard clients Rapid
• Computers (desktops, laptops) elasticity
• Mobile devices
• Traditional or cloud-based
software services (applications, Measured
processes, etc.) service
On-demand
self-service
Resource
pooling
27
27
Broad
Rapid Elasticity network
access
• Services can be rapidly and Rapid
elastically provisioned - in some
elasticity
cases, automatically - to quickly
scale out; and rapidly released to
quickly scale in.
Measured
service
On-demand
self-service
Resource
pooling
28
28
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
14
Broad
Measured Service network
access
• Automatically control and Rapid
optimize resource usage
elasticity
• Leveraging a metering capability
at some level of abstraction
• Utility computing - you pay for Measured
what you use. service
On-demand
self-service
Resource
pooling
29
29
Broad
On-Demand Self-Service network
access
• A consumer can unilaterally Rapid
provision computing capabilities,
elasticity
such as server time and network
storage as needed automatically,
without requiring human
interaction with a service Measured
provider. service
On-demand
self-service
Resource
pooling
30
30
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
15
Broad
Resource Pooling network
access
• Resources are pooled to serve Rapid
multiple consumers using a multi-
elasticity
tenant model
• Different physical and virtual
resources
Measured
• Location independence
• Exact location of resources not in
service
customer’s control
On-demand
self-service
Resource
pooling
31
31
Multi-tenancy is an
emergent property of CHARGEBACK
SEGMENTATION
resource pooling. Once you / BILLING
have a pool and allow more MODELS
32
32
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
16
Policy-Driven
Enforcement POLICY-DRIVEN
ENFORCEMENT
Policy-driven enforcement -
the cloud provider and CHARGEBACK
SEGMENTATION
cloud consumers define / BILLING
how their environment MODELS
33
33
Segmentation POLICY-DRIVEN
ENFORCEMENT
GOVERNANCE
34
34
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
17
Isolation POLICY-DRIVEN
ENFORCEMENT
GOVERNANCE
35
35
Governance POLICY-DRIVEN
ENFORCEMENT
GOVERNANCE
36
36
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
18
Service Levels POLICY-DRIVEN
ENFORCEMENT
37
37
Chargeback/Billing
Models POLICY-DRIVEN
ENFORCEMENT
GOVERNANCE
38
38
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
19
The NIST model of cloud computing cleanly
1 describes the essential characteristics
Review required for something to be considered "a
cloud“
The most important of those is resource
2 pooling, which is what allows multiple
consumers to share the same underlying
physical resources.
But broad network access, elasticity,
3 measured service, and self service are all
also important and essential cloud features.
Thus multitenancy is an emergent properly
4 of resource pooling, not an essential
characteristic itself.
For multitenancy to work it needs strong
5 segregation (breaking up the environment)
and isolation (the security boundary
between segments)
39
39
SOFTWARE AS A SERVICE
(SaaS)
PLATFORM AS A SERVICE
(Paas)
INFRASTRUCTURE AS A SERVICE
(IaaS)
40
40
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
20
Infrastructure As A Service (IaaS)
• Provisions processing, storage,
networks, and other
fundamental computing
resources
• Consumer deploys and runs
arbitrary software
• Can include operating systems
and applications
41
41
Simplified IaaS
Architecture
42
42
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
21
Platform As A Service (PaaS)
• Application development
frameworks, middleware
capabilities, and functions
such as databases, messaging,
and queuing.
• Deploy consumer-created or
acquired applications onto
cloud infrastructure
• Created using programming
languages and tools supported
by the cloud provider
43
43
Simplified PaaS
Architecture
44
44
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
22
Software As A Service (SaaS)
• The consumer uses the
provider’s applications.
• Doesn’t necessarily have to
run on IaaS or PaaS, but must
still have the Essential
Characteristics.
• The consumer does not
manage or control the
underlying cloud infrastructure
including network, servers,
operating systems, storage, or
even individual application
capabilities.
45
45
Simplified SaaS
Example
Architecture
46
46
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
23
Service models describe what is offered to a
1 cloud consumer- infrastructure, a platform, or a
Review complete application (software).
Infrastructure as a Service provides resource
2 pools of virtualized infrastructure, such as
compute, network, or storage pools.
Platform as a Service further abstracts
3 capabilities and provides resource pools of pre-
configured services where the cloud consumer
doesn't manage the underlying infrastructure.
PaaS includes services such as databases,
container platforms, message queues, and a wide
range of other options.
Software as a Service fully abstracts everything
4 except the application itself. Cloud consumers
use the application but have no insight or
management of the underlying resources.
In real-world deployments cloud consumers often
5 mix and match the service models to meet
project requirements.
47
47
Hybrid 48
48
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
24
Cloud Deployment Models Private Cloud
Hybrid 49
49
Hybrid 50
50
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
25
Cloud Deployment Models Hybrid
Hybrid 51
51
52
52
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
26
Hybrid Cloud
Legacy access /
control
Cloud bursting
53
53
Logical Model
INFRASTRUCTURE
The core components of a
computing system: compute,
network, and storage. The
foundation that every else is
built on. The moving parts.
54
54
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
27
Logical Model
METASTRUCTURE
The protocols and mechanisms
that provide the interface
between the infrastructure layer
and the other layers. The glue
that ties the technologies and
enables management and
configuration.
55
55
Logical Model
APPLISTRUCTURE
The applications deployed in the
cloud and the underlying
application services used to
build them. For example,
platform as a service features
like message queues, artificial
intelligence analysis, or
notification services.
56
56
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
28
Logical Model
INFOSTRUCTURE
The data and information.
Content in a database, i.e.
storage, etc.
57
57
58
58
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
29
Shared Responsibilities Model
CONSUMER
Management Plane/Metastructure
PROVIDER
59
59
The lower down the stack the cloud service provider stops, the more security
capabilities and management consumers are responsible for implementing and
managing themselves.
60
60
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
30
Cloud SECURITY CONSIDERATIONS BREAK DOWN TO:
61
62
62
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
31
Infrastructure
Security for Cloud
Computing
Module 2
63
Module Structure
MODULE 2 //
Infrastructure Security For Cloud
Maps to the following domains in the Security
Guidance:
64
64
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
32
Module Structure
Unit 1 // Module Introduction
Unit 2 // Introduction to
Infrastructure Security for Cloud
Computing
Unit 3 // Software Defined
Network
Unit 4 // Cloud Network Security
Unit 5 // Securing Compute
Workloads
Unit 6 // Management Plane
Security
Unit 7 // BCDR
65
65
66
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
33
Intro to Infrastructure
Security for Cloud
Computing
Module 2 // Unit 2
67
Macro Layers
MANAGEMENT PLANE
VIRTUALIZED
INFRASTRUCTURE
BASE INFRASTRUCTURE
68
68
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
34
Cloud Infrastructure Security Overview
• No capital expenditures
INFRASTRUCTURE
(using public cloud) COMPONENTS
• More agility
• Unbounded scale
• Improved resource
utilization MANGEMENT
Cloud
HYPERVISORS
security
• Customer-controlled PLANE
migration
• Resilience
• Pay for use
NETWORK
69
69
70
70
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
35
Public vs. Private
71
71
72
72
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
36
Simplified Infrastructure Components
!
ALL OF THESE
CORE
COMPONENTS
CONTROLLER COMPUTE NETWORK N E E D TSTORAGE
O BE
SECURELY
CONFIGURED,
PATCHED,
HARDENED,
API Server SDN Manager A N D Volume
M A I N TManagement
AINED.
Message
Hypervisors DHCP
Queue
73
73
Harden Secure
Infrastructure Services Architecture
74
74
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
37
1 Infrastructure security includes all the
underlying physical resources and the
Review software, like operating systems, that runs
on them.
2 With private cloud you are responsible for
securing all the hardware and software that
makes up the cloud platform. With public
cloud you are only responsible for what you
deploy in the cloud.
4
Securing cloud infrastructure starts with
proper design, then hardening of the base
systems and various services. Lastly,
providers must lock down the management
plane.
75
75
Module 2 // Unit 3
76
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
38
Underlying IaaS Networks
77
77
78
78
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
39
Virtual Networks
79
79
80
80
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
40
Software - Defined Networking
• Provides a decoupled control • Nearly all implementations are
plane that is (potentially) API-enabled.
easier to secure. • While they may look like a
• OpenFlow is an example of an regular network to the cloud
SDN. consumer, they function VERY
• Remote access is controlled by differently.
the Administrator. • Rely heavily on packet
• Different flavors support encapsulation.
different capabilities, but
generally they can couple
tightly with the cloud platform
and possibly security tools.
81
81
82
82
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
41
SDN Firewalls / Security Groups
POLICY-BASED APPLY ON A PER-ASSET LEVEL
• Not necessarily tied to IP addresses (INSTANCE OR PaaS OBJECT)
• Can include context/tagging and • But managed outside that asset. For
other intelligence example, if a virtual machine is
compromised that can’t be used to
disable the firewall
NO ADDITIONAL HARDWARE
OR SOFTWARE TO DEPLOY INTEGRATED INTO CORE SDN
LOGIC
TYPICALLY DEFAULT-DENY • Traffic/packets simply dropped if
they don’t match the policy’s rules
• Even assets in the same security
group can’t communicate • Tightly coupled with the cloud
orchestration so fully capable of
keeping up with high velocity
changes
83
83
84
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
42
Cloud Network Security
Module 2 // Unit 4
85
86
86
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
43
Losing Network Visibility
87
87
88
88
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
44
Bastion/Transit Networks / Accounts for Hybrid
89
89
90
90
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
45
Provider & Consumer
Responsibilities CONSUMER
• Proper virtual network design
• Implementing virtual security controls
(e.g., security groups)
• Securing their portion of the
management plane/metastructure
PROVIDER (e.g., proper IAM)
• Security of the virtualization
technology
• Exposing security controls (e.g.,
security groups)
• Disabling attack surface (e.g.,
packet sniffing)
• Securing the virtual
management infrastructure
91
91
92
92
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
46
Securing Compute
Workloads
Module 2 // Unit 5
93
94
94
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
47
Controls Monitoring Assessment
• May not be able to run agents • Network addresses are not • Providers often limit
(E.g., AV) sufficient to identify a workload vulnerability assessment
in the cloud
• “Traditional” agents may not • Default deny networks may
work properly in cloud or will • Logs should be offloaded further limit network
impede performance quickly due to more-ephemeral assessment effectiveness
nature of cloud workloads
• Agents must be cloud aware • Host assessments (agents) are
• E.g., not rely on static IP • Logging architectures should be often preferable
addresses and capable of redesigned to account for cloud
communicating across virtual
topology and variable costs of • Assess images rather than
network boundaries instances when using
different storage tiers
• Cascading log collection is immutable
• Agents should be lightweight
generally preferred. Collect
and support auto-scaling and
locally in object storage and
auto-registration use filtering tools to migrate
security-sensitive logs to
• Agents should not increase
central collection and
attack surface
management
• E.g., require ports to be open
for management
95
95
96
96
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
48
Creating Immutable Images with
Deployment Pipelines
97
97
CONSUMER
• Security settings
• Monitoring and logging
• Image asset management
• Use dedicated hosting if needed
PROVIDER
and available
• Workload isolation • All in-workload security controls
• Underlying infrastructure security (e.g., patching virtual machines)
• Securing the virtualization
technology
• Providing consumers adequate
security controls
• Protecting volatile memory
98
98
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
49
Compute Security
Recommendations
Leverage immutable workloads Maintain security controls for
whenever possible. long-running workloads but use
• Disable remote access. tools that are cloud aware.
• Integrate security testing into image
creation.
Store logs external to
• Alarm with file integrity monitoring. workloads.
• Patch by updating images, not
patching running instances.
• Choose security agents that are Understand and comply with
cloud-aware and minimize cloud provider limitations on
performance impact, if needed. vulnerability assessments and
penetration testing.
99
99
100
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
50
Management Plane Security
Module 2 // Unit 6
101
102
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
51
Management Plane Access & Credentials
DIFFERENT PROVIDERS / APIs USE MULTIPLE
PLATFORMS USE DIFFERENT TECHNIQUES THAT MAY OR
AUTHENTICATION OPTIONS MAY NOT HAVE CEDENTIALS
• We cover some of these in more DIFFERENT FROM THE WEB
depth in the Identity Management CONSOLE
section • HTTP request signing (crypto using
WEB CONSOLE LOGINS ARE keys)
TYPICALLY LIKE LOGGING • Tokens
INTO ANY OTHER WEB • Oauth/SAML
SERVICE
ALL CONNECTIONS SHOULD
• Username and password ALWAYS USE TLS
• Maybe MFA
103
103
104
104
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
52
Root/Master Account Security
ENABLE HARDWARE MULTI-FACTOR
AUTHENTICATION (MFA)
• Store in a locked, central location
USE ISOLATED CREDENTIALS (A DESIGNATED
EMAIL OR USER ACCOUNT NOT USED FOR
ANYTHING ELSE)
• Use a name with a random seed if possible to reduce
phishing
IF AVAILABLE, USE ACCOUNT SECURITY
QUESTIONS
• Record and store securely
NEVER USE ACCOUNT EXCEPT FOR EMERGENCIES
105
105
106
106
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
53
Privileged Users
SERVICE SERVICE
SERVICE ADMIN
ADMIN ADMIN
SUPER-ADMIN SUPER-ADMIN
ROOT/MASTER ACCOUNT
107
107
108
108
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
54
1 The management plane is how you manage your
cloud deployments. It's the biggest difference
Review from traditional infrastructure security, and the
most critical piece to protect.
109
Business Continuity /
Disaster Recovery
Module 2 // Unit 7
110
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
55
Rule # 1
111
111
Key Aspects
Preparing for and
Managing Cloud
Provider Outages
Continuity within
the Provider / Portability
Platform
112
112
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
56
METASTRUCTURE
Cover the • The cloud configuration
113
114
114
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
57
BC/DR in the Cloud
115
115
116
116
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
58
Managing Cloud
Computing Security & Risk
Module 3
117
Module Content
Content in this module comes from the
following domains in CSA’s Security
Guidance and covers the following
subject areas:
Domain 2 // Governance and
Enterprise Risk Management
Domain 3 // Legal Issues,
Contracts and Electronic
Discovery
Domain 4 // Compliance and
Audit Management
Domain 5 // Information
Governance
118
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
59
Module Structure
Unit 1 //
Module Into
Unit 2 //
Governance
Unit 3 //
Risk
Unit 4 //
Compliance
Unit 5 //
Legal
Considerations for
Cloud
Unit 6 // Audit
Unit 7 // CSA Tools
119
119
120
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
60
BEFORE WE BEGIN…
This module and the Guidance focus on how cloud computing
affects governance, risk, and compliance (GRC). They are not
designed to educate you on GRC fundamentals.
121
121
Governance
MODULE 3 // UNIT 2
122
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
61
A Simplified Hierarchy
GOVERNANCE
ENTERPRISE
RISK
MANAGEMENT
INFORMATION
RISK
MANAGEMENT
INFORMATION
SECURITY
123
123
124
124
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
62
The Contract
125
125
From GOVERNANCE
CONTRACTS
SHARED
RESPONSIBILITIES
MODEL
RISK MANAGEMENT
126
126
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
63
1 Governance defines how an
Review organization is managed.
127
127
MODULE 3 // UNIT 3
128
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
64
Risk Management
129
129
Risk Assessment
Resources Value of
available Risk Tolerance assets
130
130
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
65
Service Model Effects
131
131
132
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
66
Less
• Physical control over assets.
• Need to manage risks the provider
accepts.
More
• Reliance on SLA and contract.
• Requirement to manage the
relationship and stay up to date.
Considerations
133
133
134
134
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
67
Governance & Risk
Recommendations
Identify the shared Understand how a contract impacts
responsibilities of security and your governance framework/model.
risk management based on the • Obtain and review contracts (and any
referenced documents) before
chosen cloud deployment and entering into an agreement.
service model. • Don’t assume that you can effectively
Develop a cloud governance negotiate contracts with a cloud
framework/model as per provider—but this also shouldn’t
necessarily stop you from using that
relevant industry best practices, provider.
global standards, and • If a contract can’t be effectively
regulations like CSA CCM, COBIT negotiated and you perceive an
5, NIST RMF, ISO/IEC 27017, unacceptable risk, consider alternate
HIPAA, PCI-DSS, EU GDPR, etc. mechanisms to manage that risk (e.g.,
monitoring or encryption).
135
135
136
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
68
Governance & Risk
Recommendations
Cloud providers should offer Create a specific risk
easy access to documentation management and risk
and reports needed by cloud acceptance/mitigation
prospects for assessments. methodology to assess the risks
• For example, the CSA STAR of every solution in the space
registry.
Use controls to manage residual
Align risk requirements to the risks.
specific assets involved and the • If residual risks remain, choose
risk tolerance for those assets. to accept or avoid the risks.
Use tooling to track approved
providers based on asset type
(e.g., linked to data
classification), cloud usage, and
137
management.
137
138
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
69
Compliance
MODULE 3 // UNIT 4
139
Compliance
Obligations arise from Compliance and Audits
multiple sources • Compliance validates
• Legislation awareness of and adherence to
• Broad based regulation corporate obligations
• Industry specific regulation • Audits are a key tool for
proving (or disproving)
• Contracts compliance.
140
140
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
70
HOW Cloud Changes Compliance
• The cloud customer is always responsible for compliance but may now
also rely on the provider.
• Cloud customers will rely more on third-party assessments.
• The cloud metastructure may span jurisdictions, while the data/assets
don’t; this must be integrated into compliance activities.
• Not all cloud providers are equal with regards to compliance, and not
all services from a single provider are always within the same audit /
attestation / certification scope.
141
141
Compliance Inheritance
142
142
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
71
Recommendations
Compliance, audit, and assurance should be Cloud providers must maintain their
continuous. certifications/attestations over time
• They should not be seen as merely point-in-time and proactively communicate any
activities, and many standards and regulations changes in status
are moving more towards this model. This is
especially true in cloud computing, where both Cloud providers should engage in
the provider & customer tend to be in more continuous compliance initiatives to
constant flux and are rarely ever in a static state. avoid creating any gaps, and thus
exposures, for their customers.
Cloud providers should clearly communicate their
audit results, certifications and attestations, with Provide customers commonly needed
particular attention to: evidence and artifacts of compliance,
• The scope of assessments. such as logs of administrative activity
the customer cannot otherwise collect
• Which specific features/services are covered in
which locations and jurisdictions. on their own.
• How customers can deploy compliant
applications and services on the cloud
• Any additional customer responsibilities and
limitations.
143
143
Recommendations
Cloud customers should: • Ensure they understand what
• Understand their full artifacts of compliance the
compliance obligations before provider offers.
deploying, migrating to or • Effectively collect and manage
developing in the cloud. provider offered artifacts.
• Evaluate a provider’s 3rd–party • Create and collect their own
attestations and certifications artifacts when the provider’s
and align those to compliance artifacts are not sufficient.
needs. Keep a register of cloud
• Understand the scope of providers used, relevant
assessments and certifications, requirements and current
including both the controls status. The CSA Cloud Controls
and the features/services Matrix can support this activity.
covered.
144
144
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
72
1 Compliance is a tool to ensure organizations
are meeting corporate obligations.
Review
2 Audits are how we validate compliance, and
they can be performed internally or
externally using third parties.
145
145
MODULE 3 // UNIT 5
146
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
73
Representative Laws & Implementing
Regulations
• Is the applicable law where
your business resides,
where the data resides,
or where the customer
resides?
• Privacy regulations tend to
be the most impactful on
cloud security operations
• Don’t worry, these are here
as background and you
don’t need to memorize
these regulations.
147
147
148
148
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
74
Asia Pacific (APAC) // Australia
149
149
China
150
150
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
75
Japan
• Act on the Protection of
Personal Information (APPI)
requires private sector to
protect personal
information
• Prior consent required for
data transferred to 3rd
party outside the country
• Consent is not required if
certain standards are met
as outlined by the Personal
Information Protection
Commission
151
151
Russia
• Russian data
protection laws
require consent
for most data
processing
• Companies are
required to store
personal data of
Russian citizens
within Russia
152
152
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
76
EMEA //
European Union & European Economic Area
153
153
EMEA //
European Union & European Economic Area
• Network Information
Security Directive
(NIS Directive)
• Protects critical
infrastructure and
essential services
154
154
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
77
General Data Protection Regulation (GDPR)
Applicability Accountability Obligations
155
155
156
156
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
78
General Data Protection Regulation (GDPR)
Breaches of Security Sanctions
157
157
158
158
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
79
EMEA //
Countries Outside EU/EEA
• Countries with
similar protection
laws to GDPR or
1995 EU Data
Protection Directive:
Dubai, Israel,
Morocco, Senegal,
South Africa, Qatar.
159
159
• Argentina, Chile,
Colombia, Mexico,
Peru and Uruguay
have laws inspired
mainly by the
European directive
95/46/EC
• Many laws refer to
the APEC Privacy
Framework
160
160
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
80
Canada
• Personal Information
Protection and
Electronic
Documents Act
(PIPEDA)
• Applies to entities
subject to federal
jurisdiction and all
provincial
jurisdictions
161
161
United States
• No single national
law for data
protection and
regulation.
162
162
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
81
U.S. Federal Laws
• Among others, Gramm-Leach- • Companies must adopt
Bliley Act (GLBA), reasonable security measures
Accountability Act of 1996 around personal data.
(HIPAA), Children’s Online • Organizations are responsible
Privacy Protection Act of 1998 for subcontractors’ actions.
(COPPA) all regulate privacy
and information security.
163
163
• State laws around data security • Most state laws that address
apply to any entity that information security require a
collects/processes data of an written contract between the
individual living in that state, entity and the service provider
regardless of where data is mandating use of reasonable
stored. security measures.
164
164
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
82
United States
Breaches of Security Federal & State Agencies
• Private or gov’t entities must • Federal Trade Commission
notify individuals of security (FTC) & state attorneys general
breaches. also enforce accountability in
Privacy Laws entities around privacy and
security practices. These
• California Consumer Privacy decrees give guidance around
Act (CCPA) protects data for protection of personal
individuals, families and information.
devices. In effect Jan. 2020 –
significant implications.
165
165
Industry Standards
166
166
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
83
Contracts
Before Entering Negotiations Contract Terms
• Due diligence of your own • Pricing
entity • Allocation of Risk/Responsibility
• Due diligence of other party • Termination
• Does the service allow your
company to meet its objectives & • Representation and Warranties
still be in compliance?
• Data/IP Ownership
• Data Location
• SLA
• Privacy/Privacy Level Agreement
(PLA)
167
167
Contracts
During Performance
• Monitoring
• Preparing for termination and
transition
• Unintended contract
• Closing
168
168
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
84
GLOBAL TRENDS:
Protection of privacy and allowing individuals to have
Review some control over the collection and use of their
personal data.
There is a concern for the security of personal data and
company data. A significant number of laws require the
Due to the nature of the cloud, it has adoption of formal security policies
become easy to transfer data across Countries and states are recognizing that security
the globe. However, the ease of breach occurs for a variety of reasons - state actors,
movement of the data makes it hackers, disgruntled employees, negligence or
susceptible to be caught under inadvertent error. These breaches should be notified to
numerous legal systems. It is the affected parties. Numerous new laws require prompt
therefore important to appreciate the disclosures to individuals and government agencies.
wide variety - as well as the amazing There is a concern that data laws many not be
similarities - between the laws that equivalent from state to state and countries are
govern cloud services. establishing barriers to prevent the transfer of data to
those that do not offer “adequate protection”.
In the past 10 years, the number of Finally like for any other relationship, things are better
countries having privacy or security recorded in writing. Contracts are important. Cloud
laws has more than doubled, and the contract can be tricky because it’s easy to sign when
number of laws that govern the privacy they are just posted on a website for the customer to
or security of company data and click on “I agree”. Make sure you read them carefully to
personal data has skyrocketed. understand the terms.
169
169
Audit
MODULE 3 // UNIT 6
170
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
85
Audit
171
171
172
172
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
86
Artifacts of Compliance
173
173
Artifacts of Compliance
• In cloud, assessing risk is collecting Key places to focus on:
all audit evidence and can be
• Management place
challenging
• Configuration pieces
• Understand requirements for logging
and what kinds of data to collect • Adding more logging in applications
• Change in management logs are • System logs need to be pushed to a
common artifacts you need. different location, ex: object storage
on cloud provider
• Map what you need to your cloud
provider
• Collect admin activity to have logs of
changes
• Store artifacts in a central repository
• Build architecture to store centrally
174
174
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
87
Artifacts of Compliance
Core of audit considerations:
• Make sure you know what you need to collect to meet compliance
obligations
• Evaluate what you can get from your cloud provider and how to get it
• Store in a central location
• Build in extra logging to compensate for places where you lose
visibility
175
175
Assessment
Frequency
176
176
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
88
1 Different types of audits and assessments
have different focuses, and even when the
Review same name is used can have different focus
and scope across cloud providers.
2 Cloud providers often limit the kinds of
assessments their customers can use since
some of these, like vulnerability
assessments, can't be distinguished from
real attacks without being constrained.
3 Ensure you know the scope, results, and
timing (dates) of previous audits. Not all
audits on a provider's website are
necessarily up to date or cover the service
under consideration.
4 Cloud consumers are responsible for
maintaining their own artifacts of
compliance for their own audits, such as log
files.
177
177
CSA Tools
MODULE 3 // UNIT 7
178
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
89
Cloud Controls Matrix
The CSA CCM is a controls framework for organizations to
operate securely when cloud services are utilized.
179
179
180
180
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
90
SAMPLE CCM
181
181
182
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
91
Consensus Assessment Initiative Questionnaire
183
183
184
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
92
Security, Trust, Assurance, & Risk Registry
Promotes security governance, assurance, and compliance in the cloud
185
185
186
186
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
93
STARWatch
The CSA STARWatch is a SaaS application to help cloud providers
manage compliance with CSA STAR requirements
187
187
STARWatch
188
188
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
94
1 The Cloud Controls Matrix is a list of cloud
security controls mapped by domain and
Review aligned to various regulatory frameworks.
2 The CCM is an excellent tool for evaluating
your cloud security controls and is useful to
both cloud providers and consumers.
3 The Consensus Assessment Initiative
Questionnaire is a standard set of security
questions for cloud providers. It allows
cloud consumers to directly compare
providers and allows providers to reduce the
need to respond to non-standard RFPs.
4 The Cloud Security Alliance Guidance (which
this training is based on) tells you how to
implement your controls, while the CCM
tells you which controls to implement.
5 The STAR and StarWatch tool serve as
central repositories and methods for cloud
provider security documentation, including
the CAIQ.
189
189
Module 4
190
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
95
Module Content
Content in this module comes from the following
domains in CSA’s Security Guidance:
DOMAIN 5 // Information
Governance
DOMAIN 6 // Management Plane
and Business Continuity
DOMAIN 11 // Data Security
191
191
Module Structure
Unit 1 // Module Intro
Unit 2 // Cloud Data Storage and
Data Moving to the Cloud
Unit 3 // Access Controls and
Entitlements
Unit 4 // Encryption for IaaS
Unit 5 // Encryption for PaaS and
SaaS
Unit 6 // Encryption key
management
Unit 7 // Other Data Security
Options
Unit 8 // Data Security Lifecycle
192
192
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
96
Understand the different cloud
Objectives storage models
193
193
Module 4 // Unit 2
194
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
97
Cloud Data Storage Is Different
• All data is eventually stored on a • This storage may be
physical device, but cloud expressed/exposed like
platforms use multiple types of traditional storage but under the
data storage virtualization to hood is quite different.
abstract and build storage pools. • Just like SDN
• These are not necessarily off-the- • Security focuses on access
shelf technologies that map to controls, encryption, and proper
traditional data storage configuration.
virtualization, like SAN/NAS, that
are well known.
195
195
Major Cloud
Data Storage
Types
196
196
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
98
Data Dispersion
(Bit-Splitting) FILE
197
197
Manage Data
Migrating To
The Cloud
198
198
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
99
Cloud Access Security Brokers (CASB)
A lso kno w n as C lo ud S e c urity
Gate w ays
Inline (Local)
Inline (Cloud)
Via API
199
199
Application
encryption
Link/network
encryption
Proxy-based
encryption
200
200
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
100
Review
• Cloud data storage types include object,
volume, database and application.
201
201
Module 4 // Unit 3
202
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
101
Access Controls
• Always your first data security control
• Granularity and implementation vary
massively between platforms, services,
and technologies Management
• The finer-grained the access controls plane
the better for security, but the harder
for manageability Public & internal
• As with many things they may look the sharing controls
same on the surface but will likely be
very different in practice
• It’s critical to create platform-specific Application-
entitlement matrices level controls
203
203
VOLUME DESCRIBE X X X X X
OBJECT DESCRIBE X X X X X
VOLUME MODIFY X X X X
READ LOGS X X X
204
204
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
102
1 Access controls are the most
Review fundamental security control, even in
cloud computing.
205
Module 4 // Unit 4
206
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
103
Cloud Data Encryption Layers
APPLICATION
DATABASE
FILE/API
VOLUME STORAGE
207
207
208
208
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
104
Cloud Encryption System Matrix
• Where is the key?
• Where is the encryption engine?
• Where is the data?
209
209
210
210
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
105
Instance-Managed
211
211
Object Storage
CLIENT-SIDE
SERVER-SIDE
PROXY
212
212
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
106
1
There are multiple layers where you can
encrypt, each with benefits and
Review complications. Encrypting higher in the
application stack is often best for discreet
data, while lower-level encryption, like
volume, is better for bulk data.
2
Encryption systems are composed of the
data, the encryption engine, and the key
management, Where you place these
determines the architecture and affects the
security of the system.
213
Module 4 // Unit 5
214
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
107
ENCRYPTING PaaS • Encrypt
within your
app code
• Encrypt
APPLICATION before
sending to
• When you control the code, the platform
you can always encrypt there,
which is also more portable.
• Volatile memory and swap files
may be issues; understand OTHER DATABASE
your platform specifics.
• If you are the provider, use
per-customer keys as much as
possible. • Integrated into the
provider's platform • Transparent Database
• May include customer- Encryption (TDE)
managed key options • Field-Level
215
215
Example //
Application
Encryption
Architecture
• Where is the key?
• Where is the data?
• Where is the encryption
engine?
216
216
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
108
SaaS Encryption
• Provider-managed may offer
Provider customer managed keys (we
will discuss in a moment)
Managed
• Proxy encryption requires an
Customer external tool or service
• You re-route SaaS traffic to the
217
217
218
218
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
109
1
Platform as a Service (PaaS) encryption will
depend almost completely on the kind of
Review platform and options supported by your
provider. For workloads though, you can
nearly always program your own encryption
at the application layer.
2
When encrypting in your application, you
can handle the encryption in your own code
or hand it off to an external encryption
server or service.
3
For Software as a Service you only have two
options – rely on your provider's supported
encryption or use a third-party encryption
proxy that sits as a man in the middle.
SaaS encryption proxies may introduce new
4
security concerns due to requiring you to
break any network encryption to the cloud
provider. They may also break application
functionality. However, there are still valid
use cases, albeit limited.
219
219
Encryption Key
Management
Module 4 // Unit 6
220
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
110
Cloud Key Management Options
HSM / APPLIANCE
HYBRID
221
221
222
222
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
111
Cloud Key Management Options
• The customer owns the keys,
but the provider may manage HSM
223
223
Review 2
HSMs and physical appliances may be offered by
your cloud provider, or you can look at deploying
software or virtual appliances in the cloud,
connecting to existing hardware over a hybrid
connection, or even leverage new options like a key
management service from your cloud provider or a
third party.
Providers offer a range of key management options,
3 from the provider completely managing the keys, to
allowing you to manage your own keys in their
environment or even provide keys as needed.
4
Bring Your Own Key will work differently on different
providers and services, with varying levels of relative
security.
224
224
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
112
Other Data Security
Options
Module 4 // Unit 7
225
226
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
113
More Than Encryption
Data Loss Prevention
Auditing/Monitoring/Alerting • Typically a SaaS (and maybe PaaS)
priority, don’t see much in IaaS
• Collect at the provider /
metastructure and the data storage • CASB often best bet, and may
level when possible integrate with dedicated DLP tools
Provider Specific Controls • Cloud providers sometimes offer
basic DLP in the platform (mostly file
• Various providers and platforms have collaboration products)
their own data security controls that
may not fit our categories ERM/Digital Rights Management
• Full DRM not often seen and not a
cloud-specific issue. Will break most
SaaS
• Providers may offer DRM-like
capabilities (e.g., user + device +
content restrictions)
227
227
Data Masking //
Dynamic & Test Data Generation
PRODUCTION
ID LAST FIRST CREDIT CARD PAN
Masking Tool
228
228
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
114
1 Integrating PaaS and other new cloud
architectural options into applications and data
Review storage may allow cloud consumers to shift
more security burden onto cloud providers and
reduce the stack's attack surface.
2
Good activity monitoring and alerting are
important to cloud data security, and providers
may also support a variety of additional
security controls.
Data Loss Prevention tends to be more useful
3
for SaaS and may be integrated into CASB
tools.
4 Traditional DRM/ERM isn't necessarily useful
for cloud, but some SaaS/PaaS services may
have "DRM-like" capabilities such as sharing or
view controls that provide similar protections.
5 Data masking is critical for test data
generation and to ensure production data is
not exposed in development environments.
229
229
Module 4 // Unit 8
230
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
115
Data Security
Lifecycle
231
231
232
232
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
116
Locations & Access
• The simple data security lifecycle does not address location or how
data is accessed
• External use reliant on different controls
• Internal and external access usually have different security policies
• You have *multiple* data security lifecycles
233
233
234
234
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
117
Mapping The Lifecycle To Functions
235
235
236
236
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
118
Mapping Controls
237
237
Recommendations
• Understand the specific • Consider CASB to monitor data
capabilities of the cloud flowing into SaaS. It may still
platform you are using. be helpful for some PaaS and
• Don’t dismiss cloud provider IaaS but rely more on existing
data security. In many cases it is policies and data repository
more secure than building your security for those types of
own and comes at a lower cost. large migrations.
• Create an entitlement matrix for • Use the appropriate encryption
determining access controls. option based on the threat
Enforcement will vary based on model for your data, business,
cloud provider capabilities. and technical requirements.
238
238
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
119
Recommendations
• Consider use of provider- • Ensure both API and data-level
managed encryption and monitoring are in place, and
storage options. Where that logs meet compliance and
possible, use a customer- lifecycle policy requirements
managed key. • Standards exist to help
• Leverage architecture to establish good security and
improve data security. Don’t the proper use of encryption
rely completely on access and key management
controls and encryption. techniques and processes.
Specifically, NIST SP-800-57,
ANSI X9.69 and X9.73.
239
239
240
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
120
Securing Cloud
Applications & Users
Module 5
241
Module Content
Content in this module comes from the
following domains in CSA’s Security
Guidance:
Domain 10 //
Application Security
Domain 12 //
Identity Entitlement and
Access Management
Domain 14 //
Related Technologies
242
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
121
Module Structure
Unit 1 // Module Intro
Unit 2 // SSDLC
Unit 3 // Testing and
Assessment
Unit 4 // DevOps and Immutable
Unit 5 // Secure Operations and
Architecture
Unit 6 // IAM definitions
Unit 7 // IAM Standards
Unit 8 // IAM in practice
243
243
Objectives
Discover how application security
differs in cloud computing.
244
244
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
122
How Cloud Changes AppSec
Opportunities Challenges
• Higher baseline security • Limited visibility
• Responsiveness / agility • Increased application scope
• Isolated environments • Changing threat models
• Independent VMs for • Reduced transparency
microservices
• Elasticity
• DevOps
• Unified interface
245
245
• Code review
Secure • SAST/DAST/Testing
Deployment • Vuln. assessment
• Deployment
• Change management
Secure • WAF/App defenses
Operation • Ongoing assessment
• Activity monitoring
246
246
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
123
SSDLC Frameworks
& Guidance
247
247
248
248
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
124
SSDLC Frameworks &
Guidance
NIST 800-64
249
249
250
250
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
125
SSDLC Frameworks &
Guidance
251
251
252
252
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
126
Secure Design & Development
253
253
254
254
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
127
Example Mapping Threat Model To
Countermeasures
THREAT SECURITY SERVICE
Spoofing Authentication
Tampering Digital signature, Hash
Repudiation Audit logging
Information
Encryption
Disclosure
Denial of
Availability
Service
Elevation of
Authorization
Privilege
255
255
256
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
128
SSDLC Testing
& Assessment
Module 5 // Unit 3
257
258
258
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
129
Secure Development & Testing
• Manual
• Usually implemented at
gate/checkpoint for only
• Cloud doesn’t change the kind of Code review specific functionality
testing, but does change some of • E.g., cloud auth and
what is tested encryption
259
260
260
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
130
Secure Deployment & Testing
• You can expect mostly
free reign to fuzz in
Code review IaaS, but not same level
• Use tools and companies with PaaS and SaaS
cloud-specific features and
experience; tools and
background don’t translate
from traditional to cloud as Unit /
well in these areas
SAST regression /
functional
261
261
262
262
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
131
Vulnerability Assessment
In The Cloud
263
263
264
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
132
DevOps
Module 5 // Unit 4
265
DevOps
Security Benefits:
• Greater standardization
• Automated testing
• Improved auditing
• Leverage automation No single definition, but
techniques to improve security typically refers to changing
operations culture and process around
continuous integration /
delivery and automation.
266
266
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
133
DevOps & Continuous Integration
Server/Container
Configuration
267
267
268
268
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
134
1 There are many definitions of DevOps, but a
key defining characteristic is the use of
Review continuous integration and/or continuous
delivery (CI/CD).
269
Module 5 // Unit 5
270
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
135
Secure Operations
• Lock down the management plane very tightly for production
• Actively monitor for changes at both cloud and app stack
levels
• Don’t neglect ongoing testing
• Cloud configuration is now within scope of change
management
• WAF: Must auto scale, be embedded in the workload, or be
cloud-hosted (filter traffic before it hits your application)
• RASP (Realtime Application Security Protection) an emerging
option
• RASP, one variant resembles a WAF inside the application
271
271
Increased Use
Segregation Immutable Paas And
Of
By Default Infrastructure Serverless
Microservices
272
272
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
136
PAAS/Serverless & Security
273
273
274
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
137
Application Security • Use software-defined security
Recommendations to automate security controls.
• Use event-driven security,
when available, to automate
• Understand the new detection and remediation of
architectural options and security issues.
requirements in the cloud.
Update your security policies • Use different cloud
and standards to support environments to better
them, and don’t merely segregate management plane
attempt to enforce existing access and provide developers
standards on an entirely the freedom they need to
different computing model. configure development
environments, while also
• Integrate security testing into locking down production
the deployment process. environments.
275
275
276
276
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
138
Identity & Access
Management Definitions
Module 5 // Unit 6
277
278
278
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
139
Intro To CSA Identity Terms (Cont’d)
A U TH O RITA TIV E • The " root " s ourc e f or an id ent it y , s uc h as a
SO U RC E d irec t ory s erv er
279
279
280
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
140
1 It is important to understand the foundational
terminology for identity and access
Review management (IAM).
2
At the heart is an entity, which is a person,
device, or other "thing" that will be given
access.
3 An identity is the expression of that entity
within a namespace, such as an email address
or username for a given system.
4 Entities prove their identity by providing
identifiers during authentication.
5
After being authenticated, users may be
granted access to objects or actions. This is
called an authorization, and an entitlement is
a specific approval.
6 Federated identity is critical for cloud
computing because it allows us to manage
identities across different systems.
281
281
IAM Standards
Module 5 // Unit 7
282
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
141
How IAM Is Different
For Cloud Management
plane/metastructure
integration
283
283
IAM Standards
For Cloud
284
284
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
142
OPENID EXAMPLE
285
285
286
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
143
IAM Practice
Module 5 // Unit 8
287
288
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
144
Additional Identity
Decisions
• Provisioning and supporting
various cloud
• How to manage identities for
providers/platforms
systems/code/devices/services
• Mapping attributes
• Defining the identity provisioning
process and how to integrate with • Enabling monitoring/logging
cloud.
• Building entitlement matrices
• Often a good time to review and
update your process • Documenting break/fix for
federation outages
• IR for account takeovers and other
IAM incidents
• Deprovisioning
289
289
290
290
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
145
Moving From RBAC To ABAC
ABAC
• Attribute Based Access
Controls
• Decision based on more
RBAC attributes than just role
• Role Based Access Controls • Far more granular and
• Very familiar flexible
• Decisions based on assigned • Best model for cloud
role in that context
291
291
292
292
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
146
Identity Management
• Consider the use of identity
Recommendations brokers where appropriate.
• Organizations should develop • Cloud consumers are
a comprehensive and responsible for maintaining
formalized plan and processes the identity provider and
for managing identities and defining identities and
authorizations with cloud attributes.
services. • These should be based on an
• When connecting to external authoritative source.
cloud providers, use • Distributed organizations
federation, if possible, to should consider using cloud-
extend existing identity hosted directory servers when
management. Try to minimize on-premises options either
silos of identities in cloud aren’t available or do not meet
providers that are not tied to requirements.
internal identities.
293
293
Identity Management
Recommendations • Translate entitlement matrices
• Cloud consumers should into technical policies when
prefer MFA for all external supported by the cloud
cloud accounts and send MFA provider or platform.
status as an attribute when • Prefer ABAC over RBAC for
using federated cloud computing.
authentication. • Cloud providers should offer
• Privileged identities should both hosted identities and
always use MFA. federation using open
• Develop an entitlement matrix standards.
for each cloud provider and • There are no magic protocols:
project, with an emphasis on pick your use cases and
access to the metastructure constraints first and find the
and/or management plane. right protocol second.
294
294
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
147
1 Due to the complexity of managing multiple
directory servers and cloud providers, a hub
Review and spoke model using a federated identity
broker is often preferred.
295
295
Secure Software
Development Life Cycle
(SSDLC)
Module 5 // Unit 2
296
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
148
Cloud Security Operations
Module 6
297
Module Contents
Module 6 //
Cloud Security Operations
Maps to the following domains in the
Security Guidance:
Domain 9 // Incident Response
298
298
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
149
Module Structure
Unit 1 // Module Intro
Unit 2 // Selecting A Cloud
Provider
Unit 3 // Incident Response
Unit 4 // SECaaS Fundamentals
Unit 5 // SECaaS Categories &
Recommendations
Unit 6 // Related Technologies
Unit 7 // CCSK Exam Prep
299
299
300
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
150
Selecting A Cloud Provider
Module 6 // Unit 2
301
302
302
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
151
Or In Other Words…
303
303
And…
304
304
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
152
THINGS TO LOOK FOR IN A CLOUD PROVIDER
PART 1
COMPARTMENTALIZATION OF JOB ROLES
REVIEWABLE AUDITS
305
305
PRIORITIZATION OF SECURITY
306
306
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
153
Things To Look For
In A Cloud Provider
Reviewable More is often
Audits better
Scope and
Time
307
307
308
308
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
154
SaaS Provider Critical Security Capabilities
• Robust external security and compliance
These are not
assessments available for customers to review
directly stated in
• Granular IAM entitlements within the SaaS the Guidance
application
• SAML support
• Logging of administrator activity
• External log feeds or API access to logs
• Strong internal controls to limit admin access to
customer data
• These should be externally validated and clearly
documented
309
309
310
310
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
155
1 The critical security capabilities for cloud
providers are a list of features required in a
Review cloud platform to fully enable customers to
build a comprehensive cloud security
program.
2 When evaluating cloud providers, consumers
should also look at all available
documentation, and pay particular attention
to internal security controls that ensure a
strong baseline level of security over time.
3 Individual security features are not as
indicative as strong programmatic controls.
4 Cloud providers should also offer a wide
array of reviewable third-party audits and
assessments to validate their security
program and control.
5 The Cloud Security Alliance provides the
CAIQ. CCM, STAR, and STARWatch to help
both cloud providers and consumers in
communicating security posture.
311
311
Incident Response
Module 6 // Unit 3
312
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
156
Incidents Change
• Likelihood of some kinds of • You and the provider will likely
incidents goes up, others go have different priorities
down – it’s a different • Your processes will certainly
environment change
• The metastructure is the biggest
• Don’t wait until the first incident
difference
to figure this all out
• Consider attacks targeted at
the Cloud Provider and how
that affects your systems
313
313
IR Lifecycle
CONTAINMENT,
DETECTION & ERADICATION,
PREPARATION ANALYSIS POST-MORTEM
RECOVERY
314
314
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
157
CONTAINMENT,
DETECTION & ERADICATION,
PREPARATION ANALYSIS POST-MORTEM
RECOVERY
315
315
CONTAINMENT,
DETECTION & ERADICATION,
PREPARATION ANALYSIS POST-MORTEM
RECOVERY
316
316
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
158
CONTAINMENT,
DETECTION & ERADICATION,
PREPARATION ANALYSIS POST-MORTEM
RECOVERY
317
317
CONTAINMENT,
DETECTION & ERADICATION,
PREPARATION ANALYSIS POST-MORTEM
RECOVERY
318
318
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
159
Incident Response Recommendations
• SLAs and setting expectations around content and format of data that the
what the customer does versus what the cloud provider will supply for analysis
provider does are the most important purposes and evaluate whether the
aspect of incident response for cloud- available forensics data satisfies legal
based resources. chain of custody requirements.
• Clear communication of • Cloud customers should also embrace
roles/responsibilities and practicing the continuous and serverless monitoring of
response and hand-offs are critical. cloud-based resources to detect potential
issues earlier than in traditional data
• Cloud customers must set up proper
centers.
communication paths with the provider
• Data sources should be stored or copied into
that can be utilized in the event of an locations that maintain availability during
incident. Existing open standards can incidents.
facilitate incident communication. • If needed and possible, they should also be
handled to maintain a proper chain of custody.
• Cloud customers must understand the
319
319
320
320
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
160
1 The fundamental nature of cloud changes
the likelihood and nature of incidents. It is
Review important to adjust your incident response
process to account for these.
2 Cloud consumers and cloud providers will
have different priorities in an incident.
These may conflict when a provider needs to
contain a consumer.
3 Focus on preparation, especially
communications with cloud providers,
adjusting IR plans, and building tool or
"jump" kits to more-rapidly respond.
4 When available, infrastructure as code can
allow isolation of a compromised
environment while rebuilding a functional
environment in parallel to reduce downtime.
5 But don't forget, this will carry over any
active vulnerabilities and configuration
errors in the templates.
321
321
SECaaS Fundamentals
Module 6 // Unit 4
322
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
161
Defining SECaaS
323
323
SECaaS
Characteristics
• Security products
or services
delivered as a
cloud service
• Meets the NIST
essential
characteristics
324
324
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
162
SECaaS Potential Benefits
325
325
Regulation Handling Of
Lack Of Visibility
Differences Regulated Data
Changing Migrating to
Data Leakage
Providers SECaaS
326
326
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
163
ALWAYS KEEP IN MIND…
An organization cannot
outsource accountability…
Ever.
327
327
328
328
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
164
SECaaS Categories
Module 6 // Unit 5
329
SECaaS //
IAM Services
Identity, Entitlement And Access
Management Services
• Federated Identity Brokers
• Strong Authentication
• Cloud-Based Directories
• Other emerging options
330
330
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
165
SECaas // CASB
331
331
SECaas // Gateways
332
332
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
166
SECaas // Email
Email Security
• Filters inbound and outbound
email to block spam, phishing,
and malware.
• Protects users from email
floods and provides business
continuity.
• May include encryption.
333
333
SECaas //
Assessment
Security Assessment
• Using cloud-based tools for
assessment on either cloud
services or on-premise
resources.
• Main Types:
• Traditional VA
• Application Security
• Cloud Platform Assessment
334
334
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
167
Web Application Firewalls
Public Traffic
From W
ecord A F O n ly
DNS r ) (S S L )
(S L
S “Hidden”
IP
CLOUD WAF
internet APP
SERVER
Management
panel restricted
to proxy IP
VPN Proxy
Private Traffic
335
335
SECaas // Encryption
336
336
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
168
SECaas // SIEM
337
337
SECaas // BC/DR
338
338
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
169
SECaaS // Misc.
Additional Categories
• DDoS Protection
• Security Management
• Managed Network or Endpoint
Security (e.g. IDS)
339
339
SECaaS Recommendations
• Before engaging a SECaaS • Understand your data
provider, be sure to retention needs and select a
understand any security- provider that can support data
specific requirements for data- feeds that don’t create a lock-
handling (and availability), in situation.
investigative, and compliance • Ensure that the SECaaS service
support. is compatible with your current
• Pay particular attention to and future plans, such as its
handling of regulated data, supported cloud (and on-
like PII. premises) platforms, the
workstation and mobile
operating systems it
accommodates, and so on.
340
340
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
170
1 Security as a Service offerings include a wide
range of categories that span most, if not
Review all, major security domains.
341
Related Technologies
Module 6 // Unit 6
342
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
171
Related Technologies
343
343
High Distributed
Velocity Storage
High Distributed
Variety Processing
344
344
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
172
Big Data Cloud Security
Securing All The Storage Encryption Key
• Including Intermediary Management
Storage Like Containers • No Change To The
Or Storage Volumes For Fundamentals, But BYOK
VMS Performing Most Likely Required If
Processing PaaS Involved.
345
Encrypted
Data Collection Communications
346
346
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
173
Mobile & Cloud
347
347
Serverless
• Includes PaaS and Function as a
Service
• New frameworks being released at a
rapid pace
• IAM and logging are key security
issues for serverless apps
• Often provides more security
benefits than downside due to
pushing more security
responsibility onto the cloud
provider (in the shared
responsibilities model)
348
348
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
174
1 Related technologies are key technologies often
seen with, and used by, cloud deployments. They
Review include Big Data, the Internet of Things, mobile
computing, and serverless computing.
2 Big Data platforms tend to have low inherent
security, so using the cloud for isolation is
important. It's also critical to understand where and
how data is stored and, often, to protect it with
distributed encryption.
3 The Internet of Things often uses cloud computing
for back end processing, application logic, and data
storage. Security concerns tend to focus on device
and user authentication and authorization, secure
communications, and data storage.
4 Mobile issues are often very similar to those of IoT
when it comes to cloud as the cloud becomes the
back-end for many mobile apps.
5 Serverless is a cloud-native technology and used in
most modern deployments to some degree. IAM
and logging tend to be a security focus since they
are so different compared to on-premise or even
virtualized workloads.
349
349
Module 6 // Unit 8
350
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
175
Preparing For The CCSK Exam
Study The Guidance And ENISA • CAIQ:
https://cloudsecurityalliance.org/gro
Documents
up/consensus-
• CSA Guidance:
assessments/#_overview
https://cloudsecurityalliance.org/do
• CCM:
wnload/security-guidance-v4/
https://cloudsecurityalliance.org/group/c
• ENISA:
loud-controls-matrix/#_overview
https://www.enisa.europa.eu/publica
tions/cloud-computing-risk-
Review The CCSK Prep Kit At:
• https://cloudsecurityalliance.org/educati
assessment/at_download/fullReport
on/ccsk/#_prepare
351
351
352
352
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
176
Hints
• Read the Guidance 3-4 times • Don’t wait too long after
and have it with you. taking this class… your tokens
• As with any test, the wording may take a week or two to
is weird, but if you are familiar arrive, which is a good time to
with the material and know take the test.
where to check in the • If you have technical issues,
Guidance, you should be fine. email:
[email protected]
353
353
354
354
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
177
CSA Guidance
Security Guidance
• 87% of test
• Majority of the class
• Domain mappings at beginning of
module 1
• Vendor agnostic
• Concepts reinforced by labs
• https://cloudsecurityalliance.org/
download/security-guidance-v4/
355
355
356
356
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
178
Consensus Assessment Initiative
Questionnaire
CAIQ
• 7% of test
• 295 Questions
• Direct alignment to CCM
• STARwatch input
• STAR Registry
• https://cloudsecurityalliance.org/
group/consensus-
assessments/#_overview
357
357
358
358
Copyright 20192019
Copyright Cloud Security
Cloud Alliance
Security andSecurosis,
Alliance and Securosis, LLC
LLC
179
HOORAY!
359
180