Department of
Computer Science & Engineering
1
Security Management in Cloud
Computing
Security Management
2
• With the adoption of public cloud services, a large part of your
network, system, applications, and data will move under third-party
provider control.
For this :
• What security controls must the customer provide over and above the
controls inherent in the cloud platform, and
• How must an enterprise’s security management tools and processes
adapt to manage security in the cloud.
Security Management…
Security Management
and monitoring
services:-
• Monitoring- health,
security event,
threat.
• Management- ACL,
Vulnerability, Patch,
Configuration.
Information Security-
data:-
• Encryption
• Data masking
• Content protection.
Information Security-
infrastructure:-
• Application Level
• Network Level
• Host Level.
3
Security Management Standards
4
• ISO/IEC 27001 formally defines the mandatory requirements for an Information Security
Management System (ISMS).
• ISO/IEC 27002 is merely a code of practice/guideline rather than a certification
standard, organizations are free to select and implement controls as they see fit.
It answers two questions
• How does one ensure that the current security levels are appropriate for ones needs?
• How does one apply a security baseline throughout his operation?
ISO/IEC 27001/27002
Security Management in the Cloud
5
What is Privacy?
6
6/34
• The concept of privacy varies widely among (and sometimes within) countries, cultures, and
jurisdictions.
• It is shaped by public expectations and legal interpretations; as such, a concise definition is
elusive if not impossible.
• Privacy rights or obligations are related to the collection, use, disclosure, storage, and
destruction of personal data (or Personally Identifiable Information—PII).
• Any information relating to an identified or identifiable individual (data subject).At the end of
the day, privacy is about the accountability of organizations to data subjects, as well as the
transparency to an organization’s practice around personal information.
• The rights and obligations of individuals and organizations with respect to the collection, use,
retention, and disclosure of personal information.
Privacy Issues
7
What Are the Key Privacy Concerns?
8
Auditing, monitoring and risk
management
Privacy Breaches
Retention Destruction
Some considerations to be aware of:-
Access Compliance Storage
What is data retention policy?
It is asset of guidelines that help organizations to keep track of how long information must be kept
and how to dispose of that information when its no longer needed.
• How long is personal information (that is transferred to the cloud) retained?
• How long can we keep personal data for archiving, research or statistical purpose?
• Why is retention important?
• Which retention policy governs the data?
• Does the organization own the data, or the CSP?
Who is responsible for protecting
privacy?
• Data breaches have a cascading effect
• Full reliance on a third party to protect personal data?
• In-depth understanding of responsible data stewardship
• Organizations can transfer liability, but not accountability
• Risk assessment and mitigation throughout the data life cycle is critical.
• Many new risks and unknowns
• The overall complexity of privacy protection in the cloud represents a bigger
challenge.
What is the data life cycle?
• Personal information should be managed as part of the data used by the organization
• Protection of personal information should consider the impact of the cloud on each
phase
Generation of the information
Data is typically created by an organization in one of the three ways-
Use
13
During this phase, Data is used to support activities in the organization.
• Internal versus external:
Is PII used only within the collecting organization, or is it used outside the organization (e.g., in a public cloud)?
• Third party:
Is the information shared with third parties (e.g., subcontractors or CSPs)?
• Appropriateness:
Is the use of the information consistent with the purpose for which it was collected?
• Discovery/subpoena:
Is the information managed in the cloud in a way that will enable the organization to comply with legal requirements
in case of legal proceedings?
Data usage can even be a product service that your enterprise offers. This is where governance & compliance
challenges arise.
14
• Public versus private networks:
When information is transferred to a cloud is the organization using public networks, and is it protected
appropriately?
(PII should always be protected to address the risk level and legal requirements.)
• Encryption requirements:
Some laws require that PII will be encrypted when transmitted via a public network (and this will be the
case when the organization is using a public cloud).
• Access control:
Are there appropriate access controls over PII when it is in the cloud?
Transformation
 Derivation:
Are the original protection and use limitations maintained when data is transformed or
further processed in the cloud?
 Aggregation:
Is data in the cloud aggregated so that it is no longer related to an identifiable individual
(and hence is no longer considered PII)?
 Integrity:
Is the integrity of PII maintained when it is in the cloud?
Storage
 Access control: Are there appropriate controls over access to PII when stored in
the cloud so that only individuals with a need to know will be able to access it?
• Structured versus unstructured: How is the data stored to enable the organization to
access and manage the data in the future?
• Integrity/availability/confidentiality: How are data integrity, availability, and
confidentiality maintained in the cloud?
• Encryption: Several laws and regulations require that certain types of PII should be
stored only when encrypted. Is this requirement supported by the CSP?
Archival
 Legal and compliance: PII may have specific requirements that dictate how long it should be stored
and archived. Are these requirements supported by the CSP?
 Off-site considerations: Does the CSP provide the ability for long-term off-site storage that supports
archival requirements?
 Media concerns: Is the information stored on media that will be accessible in the future? Is the
information stored on portable media that may be more susceptible to loss? Who controls the media
and what is the organization’s ability to recover such media from the CSP if needed?
 Retention: For how long will the data be retained by the CSP? Is the retention period consistent
with the organization’s retention period?
Destruction
 Secure:
Does the CSP destroy PII obtained by customers in a secure manner to
avoid potential breach of the information?
 Complete:
Is the information completely destroyed? Does the destruction
completely erase the data, or can it be recovered?
Cloud Computing Risks
Changes to the Privacy Risk Management &
Compliance in relation to Cloud Computing
Aravali College of Engineering And Management
Jasana, Tigoan Road, Neharpar, Faridabad, Delhi NCR
Toll Free Number : 91- 8527538785
Website : www.acem.edu.in
21

More Related Content

PPTX
Securing ever growing and complex business systems v1 1
PDF
Security Industry Association Privacy Framework
PPTX
Domain 2 - Asset Security
PPTX
what is data security full ppt
PPTX
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
PPTX
Cloud and Data Privacy
PPTX
Sensitive data
PDF
Winning the war on data breaches in a changing data landscape
Securing ever growing and complex business systems v1 1
Security Industry Association Privacy Framework
Domain 2 - Asset Security
what is data security full ppt
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Cloud and Data Privacy
Sensitive data
Winning the war on data breaches in a changing data landscape

What's hot (20)

PPTX
Data lake protection ft 3119 -ver1.0
PPTX
Domain 5 - Identity and Access Management
PPTX
Information security: importance of having defined policy & process
PPTX
GDPR Part 2: Quest Relevance
PPTX
Digital IQ in managing risk and cyber threats
PPTX
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
PDF
DocuClassify - AutoClassification at its best
PPTX
Insider Threat Protection | Seclore
PPTX
HIPAA Compliance: Simple Steps to the Healthcare Cloud
PPTX
Cloud Data Security
PDF
How To Eliminate Security Exposures in Office 365 Webinar
PPTX
Securing Remote Workforce | Seclore
DOCX
Classifying Data to Help Secure Business Information - Template fromMicrosoft
PPTX
Managing Data Breach Communication on The Social Web
PDF
Security and privacy of cloud data: what you need to know (Interop)
PDF
Cyber Security Management | Cyber Security Consultant | JST Business Solution...
PDF
Five Elements of Effective Data Access Governance
PPT
Developing an Information Security Program
PPSX
Mbm Hipaa Hitech Ss Compliance Risk Assessment
PPTX
Make a case for Data Classification in your organization
Data lake protection ft 3119 -ver1.0
Domain 5 - Identity and Access Management
Information security: importance of having defined policy & process
GDPR Part 2: Quest Relevance
Digital IQ in managing risk and cyber threats
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
DocuClassify - AutoClassification at its best
Insider Threat Protection | Seclore
HIPAA Compliance: Simple Steps to the Healthcare Cloud
Cloud Data Security
How To Eliminate Security Exposures in Office 365 Webinar
Securing Remote Workforce | Seclore
Classifying Data to Help Secure Business Information - Template fromMicrosoft
Managing Data Breach Communication on The Social Web
Security and privacy of cloud data: what you need to know (Interop)
Cyber Security Management | Cyber Security Consultant | JST Business Solution...
Five Elements of Effective Data Access Governance
Developing an Information Security Program
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Make a case for Data Classification in your organization
Ad

Similar to Security Management in Cloud Computing by Shivani Gogia - Aravali College of Engineering & Managment (20)

PDF
PRIVACY IN CLOUD COMPUTING: A SURVEY
PDF
Where In The World Is Your Sensitive Data?
PPTX
security_and_privacy_in_cloud_computing (1).pptx
PDF
Taking Account of Privacy When Designing Cloud Computing Services
PDF
IT Perspectives in Implementing Privacy Framework
PDF
We Really Don\'t Know Clouds at All: Challenges to Privacy Compliance
PPTX
Security and privacy in cloud computing.pptx
PDF
Where in the world is your PII and other sensitive data? by @druva inc
PPTX
Unit -3.pptx cloud Security unit -3 notes
PPTX
The Impact of Cloud: Cloud Computing Security and Privacy
PPTX
Privacy and Compliance Issues of Cloud Computing.pptx
PPTX
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
PDF
Isaca new delhi india privacy and big data
PPT
Cloud Computing Legal Risks And Best Practices
PDF
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
PDF
Ensuring PCI DSS Compliance in the Cloud
PPTX
Cloud security (domain11 14)
PDF
journal paper
PPTX
093049ov4.pptx
PPTX
Aspects of data security
PRIVACY IN CLOUD COMPUTING: A SURVEY
Where In The World Is Your Sensitive Data?
security_and_privacy_in_cloud_computing (1).pptx
Taking Account of Privacy When Designing Cloud Computing Services
IT Perspectives in Implementing Privacy Framework
We Really Don\'t Know Clouds at All: Challenges to Privacy Compliance
Security and privacy in cloud computing.pptx
Where in the world is your PII and other sensitive data? by @druva inc
Unit -3.pptx cloud Security unit -3 notes
The Impact of Cloud: Cloud Computing Security and Privacy
Privacy and Compliance Issues of Cloud Computing.pptx
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
Isaca new delhi india privacy and big data
Cloud Computing Legal Risks And Best Practices
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Ensuring PCI DSS Compliance in the Cloud
Cloud security (domain11 14)
journal paper
093049ov4.pptx
Aspects of data security
Ad

More from acemindia (13)

PPTX
B.Tech ME.pptx
PPT
Data Models - Department of Computer Science & Engineering
PPTX
SOFTWARE TESTING
PPTX
Artificial Intelligence - An Introduction
PPTX
Artificial Intelligence- An Introduction
PPT
Importance, Impact, Parameters and Impediments in Team Work
PPTX
Introduction To Cloud Computing
PPTX
SCOPE OF CIVIL ENGINEERING
PPTX
Introduction To Cloud Computing
PPTX
Communication skills
PPTX
Aravali College of Engineering and Management
PPTX
Business idea generation in today's economy
PPT
Best College for Electronics & Communication Engineering in Faridabad, Delhi NCR
B.Tech ME.pptx
Data Models - Department of Computer Science & Engineering
SOFTWARE TESTING
Artificial Intelligence - An Introduction
Artificial Intelligence- An Introduction
Importance, Impact, Parameters and Impediments in Team Work
Introduction To Cloud Computing
SCOPE OF CIVIL ENGINEERING
Introduction To Cloud Computing
Communication skills
Aravali College of Engineering and Management
Business idea generation in today's economy
Best College for Electronics & Communication Engineering in Faridabad, Delhi NCR

Recently uploaded (20)

PDF
MACCAFERRY GUIA GAVIONES TERRAPLENES EN ESPAÑOL
PPTX
DATA STRCUTURE LABORATORY -BCSL305(PRG1)
PDF
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
PPTX
SE unit 1.pptx aaahshdhajdviwhsiehebeiwheiebeiev
PDF
IAE-V2500 Engine Airbus Family A319/320
DOCX
ENVIRONMENTAL PROTECTION AND MANAGEMENT (18CVL756)
PDF
Engineering Solutions for Ethical Dilemmas in Healthcare (www.kiu.ac.ug)
PDF
Principles of operation, construction, theory, advantages and disadvantages, ...
PPTX
CNS - Unit 1 (Introduction To Computer Networks) - PPT (2).pptx
PPTX
MAD Unit - 3 User Interface and Data Management (Diploma IT)
PPTX
CS6006 - CLOUD COMPUTING - Module - 1.pptx
PPTX
Environmental studies, Moudle 3-Environmental Pollution.pptx
PDF
Software defined netwoks is useful to learn NFV and virtual Lans
PDF
[jvmmeetup] next-gen integration with apache camel and quarkus.pdf
PPTX
AI-Reporting for Emerging Technologies(BS Computer Engineering)
PDF
electrical machines course file-anna university
PPTX
WN UNIT-II CH4_MKaruna_BapatlaEngineeringCollege.pptx
PDF
Cryptography and Network Security-Module-I.pdf
PDF
AIGA 012_04 Cleaning of equipment for oxygen service_reformat Jan 12.pdf
PPT
Programmable Logic Controller PLC and Industrial Automation
MACCAFERRY GUIA GAVIONES TERRAPLENES EN ESPAÑOL
DATA STRCUTURE LABORATORY -BCSL305(PRG1)
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
SE unit 1.pptx aaahshdhajdviwhsiehebeiwheiebeiev
IAE-V2500 Engine Airbus Family A319/320
ENVIRONMENTAL PROTECTION AND MANAGEMENT (18CVL756)
Engineering Solutions for Ethical Dilemmas in Healthcare (www.kiu.ac.ug)
Principles of operation, construction, theory, advantages and disadvantages, ...
CNS - Unit 1 (Introduction To Computer Networks) - PPT (2).pptx
MAD Unit - 3 User Interface and Data Management (Diploma IT)
CS6006 - CLOUD COMPUTING - Module - 1.pptx
Environmental studies, Moudle 3-Environmental Pollution.pptx
Software defined netwoks is useful to learn NFV and virtual Lans
[jvmmeetup] next-gen integration with apache camel and quarkus.pdf
AI-Reporting for Emerging Technologies(BS Computer Engineering)
electrical machines course file-anna university
WN UNIT-II CH4_MKaruna_BapatlaEngineeringCollege.pptx
Cryptography and Network Security-Module-I.pdf
AIGA 012_04 Cleaning of equipment for oxygen service_reformat Jan 12.pdf
Programmable Logic Controller PLC and Industrial Automation

Security Management in Cloud Computing by Shivani Gogia - Aravali College of Engineering & Managment

  • 1. Department of Computer Science & Engineering 1 Security Management in Cloud Computing
  • 2. Security Management 2 • With the adoption of public cloud services, a large part of your network, system, applications, and data will move under third-party provider control. For this : • What security controls must the customer provide over and above the controls inherent in the cloud platform, and • How must an enterprise’s security management tools and processes adapt to manage security in the cloud.
  • 3. Security Management… Security Management and monitoring services:- • Monitoring- health, security event, threat. • Management- ACL, Vulnerability, Patch, Configuration. Information Security- data:- • Encryption • Data masking • Content protection. Information Security- infrastructure:- • Application Level • Network Level • Host Level. 3
  • 4. Security Management Standards 4 • ISO/IEC 27001 formally defines the mandatory requirements for an Information Security Management System (ISMS). • ISO/IEC 27002 is merely a code of practice/guideline rather than a certification standard, organizations are free to select and implement controls as they see fit. It answers two questions • How does one ensure that the current security levels are appropriate for ones needs? • How does one apply a security baseline throughout his operation? ISO/IEC 27001/27002
  • 6. What is Privacy? 6 6/34 • The concept of privacy varies widely among (and sometimes within) countries, cultures, and jurisdictions. • It is shaped by public expectations and legal interpretations; as such, a concise definition is elusive if not impossible. • Privacy rights or obligations are related to the collection, use, disclosure, storage, and destruction of personal data (or Personally Identifiable Information—PII). • Any information relating to an identified or identifiable individual (data subject).At the end of the day, privacy is about the accountability of organizations to data subjects, as well as the transparency to an organization’s practice around personal information. • The rights and obligations of individuals and organizations with respect to the collection, use, retention, and disclosure of personal information.
  • 8. What Are the Key Privacy Concerns? 8 Auditing, monitoring and risk management Privacy Breaches Retention Destruction Some considerations to be aware of:- Access Compliance Storage
  • 9. What is data retention policy? It is asset of guidelines that help organizations to keep track of how long information must be kept and how to dispose of that information when its no longer needed. • How long is personal information (that is transferred to the cloud) retained? • How long can we keep personal data for archiving, research or statistical purpose? • Why is retention important? • Which retention policy governs the data? • Does the organization own the data, or the CSP?
  • 10. Who is responsible for protecting privacy? • Data breaches have a cascading effect • Full reliance on a third party to protect personal data? • In-depth understanding of responsible data stewardship • Organizations can transfer liability, but not accountability • Risk assessment and mitigation throughout the data life cycle is critical. • Many new risks and unknowns • The overall complexity of privacy protection in the cloud represents a bigger challenge.
  • 11. What is the data life cycle? • Personal information should be managed as part of the data used by the organization • Protection of personal information should consider the impact of the cloud on each phase
  • 12. Generation of the information Data is typically created by an organization in one of the three ways-
  • 13. Use 13 During this phase, Data is used to support activities in the organization. • Internal versus external: Is PII used only within the collecting organization, or is it used outside the organization (e.g., in a public cloud)? • Third party: Is the information shared with third parties (e.g., subcontractors or CSPs)? • Appropriateness: Is the use of the information consistent with the purpose for which it was collected? • Discovery/subpoena: Is the information managed in the cloud in a way that will enable the organization to comply with legal requirements in case of legal proceedings? Data usage can even be a product service that your enterprise offers. This is where governance & compliance challenges arise.
  • 14. 14 • Public versus private networks: When information is transferred to a cloud is the organization using public networks, and is it protected appropriately? (PII should always be protected to address the risk level and legal requirements.) • Encryption requirements: Some laws require that PII will be encrypted when transmitted via a public network (and this will be the case when the organization is using a public cloud). • Access control: Are there appropriate access controls over PII when it is in the cloud?
  • 15. Transformation  Derivation: Are the original protection and use limitations maintained when data is transformed or further processed in the cloud?  Aggregation: Is data in the cloud aggregated so that it is no longer related to an identifiable individual (and hence is no longer considered PII)?  Integrity: Is the integrity of PII maintained when it is in the cloud?
  • 16. Storage  Access control: Are there appropriate controls over access to PII when stored in the cloud so that only individuals with a need to know will be able to access it? • Structured versus unstructured: How is the data stored to enable the organization to access and manage the data in the future? • Integrity/availability/confidentiality: How are data integrity, availability, and confidentiality maintained in the cloud? • Encryption: Several laws and regulations require that certain types of PII should be stored only when encrypted. Is this requirement supported by the CSP?
  • 17. Archival  Legal and compliance: PII may have specific requirements that dictate how long it should be stored and archived. Are these requirements supported by the CSP?  Off-site considerations: Does the CSP provide the ability for long-term off-site storage that supports archival requirements?  Media concerns: Is the information stored on media that will be accessible in the future? Is the information stored on portable media that may be more susceptible to loss? Who controls the media and what is the organization’s ability to recover such media from the CSP if needed?  Retention: For how long will the data be retained by the CSP? Is the retention period consistent with the organization’s retention period?
  • 18. Destruction  Secure: Does the CSP destroy PII obtained by customers in a secure manner to avoid potential breach of the information?  Complete: Is the information completely destroyed? Does the destruction completely erase the data, or can it be recovered?
  • 20. Changes to the Privacy Risk Management & Compliance in relation to Cloud Computing
  • 21. Aravali College of Engineering And Management Jasana, Tigoan Road, Neharpar, Faridabad, Delhi NCR Toll Free Number : 91- 8527538785 Website : www.acem.edu.in 21