SlideShare a Scribd company logo
DON’T LOSE SIGHT!
STAYING SECURE WHEN MOVING TO THE CLOUD
DAVE MILLIER, CEO UZADO, CSO QUICK INTELLIGENCE, CEO MIDAC SOLUTIONS
AUTHOR OF THE SECURITY NOVEL, “BREACHED!”
AGENDA FOR TODAY
• Quick intro to Dave
• Security Challenges Moving to the Cloud
• Visibility Today
• Maintaining Visibility In The Cloud
• Cloud Security Alliance Cloud Controls Matrix
• Call to Action (yes, this means you!)
Staying Secure When Moving to the Cloud - Dave Millier
Staying Secure When Moving to the Cloud - Dave Millier
• Serial Entrepreneur, bought and sold 10+ companies over past 20 years
• Currently owns 3 IT-related Companies: MIDAC, Qi, Uzado
• Sold InfoSec company in 2014 to Robert Herjavec from Shark Tank
• Involved in Networking & InfoSec/Cybersecurity for about 25 years
• Loves tech!
• Loves dirt biking, owns a dirt bike and ATV training school!
ABOUT DAVE
Staying Secure When Moving to the Cloud - Dave Millier
• A lot of people simply don’t understand what the cloud is (or isn’t!)
• More companies moving more services to the cloud every day
• Migration isn’t always done in a coordinated, well thought-out fashion
• Cloud is supposed to streamline things, but getting there isn’t always painless
SOME OF THE BIGGEST CHALLENGES
WHAT ARE THE SECURITY CONSIDERATIONS?
• Managing users access, permissions
• Protecting our data at rest
• Ensuring secure access to data (the right people at the right time)
• Knowing who is accessing what when
• Understanding where our data will reside (data residency issues)
VISIBILITY!!!
WHAT’S THE CORE FOR MANY OF THESE ITEMS?
“You can’t manage what you can’t measure.”
- Peter Drucker, known as the Founder of Modern Management
VISIBILITY TODAY
• Logs from our servers, network devices, security devices
• Logs from our authentication devices / vpn devices
• Real-time network monitoring from security tools on the wire
• Logs from our applications
• Vulnerability scan results from our assets
• Lack of visibility into what’s happening (can’t always get logs)
• Lack of control over users (corporate accounts and permissions don’t usually
carry over)
• Lack of understanding of what data is being stored where
• Data Residency
WHAT DO WE LOSE?
HERE’S ONE SOLUTION – BLOCK ACCESS
HOSTING PROVIDER VISIBILITY
• AWS and other providers give you access to a wealth of security and
operational information (AWS CloudTrail for example)
• Incorporate the information into your existing data sources
• Redesign your incident response process to use these data sources as part of
an investigation
• Figure out what information you have access to now, and map that to “new”
source(s) of information provided by the cloud provider
• Make them part of your incident response process!!!
SECURITY TOOLS VISIBILITY
• Virtual appliances (firewalls, IPS, WAF, etc.) - located elsewhere but use the
information they provide as you would if it was local
• If security is outsourced to hosting provider or to another 3rd party, ensure
they have comparable visibility into your new environment as they had before
• Providers like CloudCheckr have automated and streamlined the visibility into
AWS, leverage the heck out of them!
USER VISIBILITY
• Leverage federated identity management solutions where possible. Less
accounts for users, easier to migrate to cloud (assuming provider supports)
• Make sure that you maintain visibility into encrypted sessions (who’s logging in
from where when, what did they do?)
• Determine current levels of user behaviour visibility and try to maintain that
level of detail when you move the user workloads to the cloud
SERVER AND APPLICATION VISIBILITY
• Hosted servers still generate logs, collect them if at all possible
• Determine what you’re logging on local servers and configure hosted servers
the same
• Make sure your web apps have proper logging!
• Applications need to have proper auditing built in; even if you don’t see the
user activity you can recreate sessions with proper app logging
• Logging invalid activity just as important (don’t just log what was successful,
log what failed!)
CLOUD SECURITY ALLIANCE
• Cloud Controls Matrix
• Control framework based on 13 security and operational domains
• Foundation is mapped to industry recognized standards and frameworks such
as COBIT, ISO 27001/27002, PCI, NIST, NERC CIP, PIPEDA, HIPAA
• Tailors Information Security practices to the cloud
• Helps companies evaluate cloud vendor security
• Helps companies make decisions on their own cloud security requirements
USING THE CSA MATRIX
• Use the matrix to do a self-assessment against your organization, identifying
areas of criticality
• Use the matrix to perform an evaluation against a potential cloud vendor
• Compare results from cloud vendors against your areas of concern/focus
• Use gap analysis results to make educated informed decisions.
• May address findings by augmenting YOUR security, may choose a different
provider, may work with provider to identify potential shortcomings
DEFENSE IN DEPTH
• Don’t rely on a single security solution to protect your cloud deployment
• Many virtual firewalls/security devices have A/V and anti-malware scanners
built into them, use them! Along with host-based protection you now have
multiple controls in place complementing each other, so that even if one of
them fails another one can compensate
• Each layer of defense should support each other and provide an additional
level of protection (“Defense in Depth”)
WHAT DO YOU NEED TO DO NEXT?
• Go back to your office and ask questions
• What type of visibility do we have into our systems, our user activity, our security devices, and our
applications today? (same question whether locally hosted or already in the cloud)
• Have we used the CSA Cloud Controls Matrix to evaluate our vendors/partners?
• How do we ensure we keep the same level of visibility we have today in the cloud?
• How well do we understand our data, where it resides and what we are doing to protect it?
• There are a lot more questions that could be asked, but hopefully this helps get you
started!
FINAL THOUGHT
Secure it before you regret it!
Questions?
Dave Millier
www.davemillier.com
dmillier@Uzado.com

More Related Content

PDF
The New Normal - Eric Gales, AWS Canada
TriNimbus
 
PPTX
Eric_Gales_Amazon_June_9_2017_presentation
TriNimbus
 
PPTX
Virtual Desktops on AWS by Mike Burke, Farm Credit Canada
TriNimbus
 
PPTX
Justin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentation
TriNimbus
 
PPTX
Dan Crawford - Canadian Executive Cloud & DevOps Summit Presentation
TriNimbus
 
PPTX
Darin Briskman_Amazon_June_9_2017_Presentation
TriNimbus
 
PPTX
Agility and Control from AWS [FutureStack16]
New Relic
 
PPTX
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
CA Technologies
 
The New Normal - Eric Gales, AWS Canada
TriNimbus
 
Eric_Gales_Amazon_June_9_2017_presentation
TriNimbus
 
Virtual Desktops on AWS by Mike Burke, Farm Credit Canada
TriNimbus
 
Justin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentation
TriNimbus
 
Dan Crawford - Canadian Executive Cloud & DevOps Summit Presentation
TriNimbus
 
Darin Briskman_Amazon_June_9_2017_Presentation
TriNimbus
 
Agility and Control from AWS [FutureStack16]
New Relic
 
DevOps and Cloud Tips and Techniques to Revolutionize Your SDLC
CA Technologies
 

What's hot (13)

PDF
Security at the Speed of Software Development
DevOps.com
 
PDF
Patterns of Cloud Native Architecture
Andrew Shafer
 
PDF
DevOps in the Cloud with Microsoft Azure
gjuljo
 
PPTX
ITLCHN 18 - Automation & DevOps - Automic
IT Expert Club
 
PPTX
Azure Security Center
Udaiappa Ramachandran
 
PDF
devops, microservices, and platforms, oh my!
Andrew Shafer
 
PPTX
DevOps in the Cloud
Eran Stiller
 
PPTX
Microsoft Azure Cloud and DevOps
Ravikanth Chaganti
 
PDF
Devops the Microsoft Way
Patrick Chanezon
 
PDF
Your Journey to Cloud-Native Begins with DevOps, Microservices, and Containers
Atlassian
 
PPT
The eBay Architecture: Striking a Balance between Site Stability, Feature Ve...
Randy Shoup
 
PPTX
Why AvePoint chose Azure for its Office 365 solutions
nj-azure
 
PPTX
Resilience and Security @ Scale: Lessons Learned
Jason Chan
 
Security at the Speed of Software Development
DevOps.com
 
Patterns of Cloud Native Architecture
Andrew Shafer
 
DevOps in the Cloud with Microsoft Azure
gjuljo
 
ITLCHN 18 - Automation & DevOps - Automic
IT Expert Club
 
Azure Security Center
Udaiappa Ramachandran
 
devops, microservices, and platforms, oh my!
Andrew Shafer
 
DevOps in the Cloud
Eran Stiller
 
Microsoft Azure Cloud and DevOps
Ravikanth Chaganti
 
Devops the Microsoft Way
Patrick Chanezon
 
Your Journey to Cloud-Native Begins with DevOps, Microservices, and Containers
Atlassian
 
The eBay Architecture: Striking a Balance between Site Stability, Feature Ve...
Randy Shoup
 
Why AvePoint chose Azure for its Office 365 solutions
nj-azure
 
Resilience and Security @ Scale: Lessons Learned
Jason Chan
 
Ad

Viewers also liked (14)

PPTX
Security in cloud computing
veena venugopal
 
PPTX
Choosing the Right Clouds for your Business
Mike Kavis
 
PDF
Distinguishing, Evaluating, and Selecting Cloud Service Providers
GartnerJessica
 
PDF
5 Points to Consider - Enterprise Road Map to AWS Cloud
Blazeclan Technologies Private Limited
 
DOC
Cloud security
Mohamed Shalash
 
PDF
The New Economics of Cloud Security
Alert Logic
 
PPTX
Introduction to cloud computing
Vipin Batra
 
PPT
Cloud Computing Security Issues
Discover Cloud Computing
 
PDF
Cloud Security - Security Aspects of Cloud Computing
Jim Geovedi
 
PPTX
Cloud security ppt
Venkatesh Chary
 
PPTX
Cloud computing security issues and challenges
Dheeraj Negi
 
PPTX
Cloud Computing Security
Ninh Nguyen
 
PPTX
Cloud security and security architecture
Vladimir Jirasek
 
Security in cloud computing
veena venugopal
 
Choosing the Right Clouds for your Business
Mike Kavis
 
Distinguishing, Evaluating, and Selecting Cloud Service Providers
GartnerJessica
 
5 Points to Consider - Enterprise Road Map to AWS Cloud
Blazeclan Technologies Private Limited
 
Cloud security
Mohamed Shalash
 
The New Economics of Cloud Security
Alert Logic
 
Introduction to cloud computing
Vipin Batra
 
Cloud Computing Security Issues
Discover Cloud Computing
 
Cloud Security - Security Aspects of Cloud Computing
Jim Geovedi
 
Cloud security ppt
Venkatesh Chary
 
Cloud computing security issues and challenges
Dheeraj Negi
 
Cloud Computing Security
Ninh Nguyen
 
Cloud security and security architecture
Vladimir Jirasek
 
Ad

Similar to Staying Secure When Moving to the Cloud - Dave Millier (20)

PPTX
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 
PDF
110307 cloud security requirements gourley
GovCloud Network
 
PPTX
I am sharing 'Unit-2' with youuuuuu.PPTX
padhaipadhai639
 
PPTX
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Himani Singh
 
PPTX
Cloud Analytics and VDI
Dr Neelesh Jain
 
PPTX
Cloud Security Zen: Principles to Meditate On
Samuel Reed
 
PPTX
Cloud Security: A matter of trust?
Mark Williams
 
PPTX
I am sharing 'unit 4' with youuuuuu.PPTX
padhaipadhai639
 
PPTX
I am sharing 'unit 4' with youuuuuu.PPTX
padhaipadhai639
 
PDF
The do's and dont's of cloud computing - StatPro Cloud Summit 2012
StatPro Group
 
PPTX
Evaluating the Cloud
SociusPartner
 
PPT
Cloud Security: Make Your CISO Successful
CloudPassage
 
PPTX
The most trusted, proven enterprise-class Cloud:Closer than you think
Uni Systems S.M.S.A.
 
PDF
Security Spotlight: The Coca Cola Company - CSS ATX 2017
Alert Logic
 
PPTX
Security as an Enabler – Cloud Security
Tom Laszewski
 
PPTX
Infrastructure for SaaS Applications
Ejaz Siddiqui
 
PPTX
Transforming cloud security into an advantage
Moshe Ferber
 
PDF
Security - A Digital Transformation Enabler
Alexander Akinjayeju. MSc, CISM, Prince2
 
PPT
Cloud Computing and Data Center Futures
Martin Hingley
 
PPTX
Cloud computing and Cloud security fundamentals
Viresh Suri
 
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 
110307 cloud security requirements gourley
GovCloud Network
 
I am sharing 'Unit-2' with youuuuuu.PPTX
padhaipadhai639
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Himani Singh
 
Cloud Analytics and VDI
Dr Neelesh Jain
 
Cloud Security Zen: Principles to Meditate On
Samuel Reed
 
Cloud Security: A matter of trust?
Mark Williams
 
I am sharing 'unit 4' with youuuuuu.PPTX
padhaipadhai639
 
I am sharing 'unit 4' with youuuuuu.PPTX
padhaipadhai639
 
The do's and dont's of cloud computing - StatPro Cloud Summit 2012
StatPro Group
 
Evaluating the Cloud
SociusPartner
 
Cloud Security: Make Your CISO Successful
CloudPassage
 
The most trusted, proven enterprise-class Cloud:Closer than you think
Uni Systems S.M.S.A.
 
Security Spotlight: The Coca Cola Company - CSS ATX 2017
Alert Logic
 
Security as an Enabler – Cloud Security
Tom Laszewski
 
Infrastructure for SaaS Applications
Ejaz Siddiqui
 
Transforming cloud security into an advantage
Moshe Ferber
 
Security - A Digital Transformation Enabler
Alexander Akinjayeju. MSc, CISM, Prince2
 
Cloud Computing and Data Center Futures
Martin Hingley
 
Cloud computing and Cloud security fundamentals
Viresh Suri
 

More from TriNimbus (16)

PDF
Convergence of Containers and Serverless by Mency Woo
TriNimbus
 
PPTX
Juni_Mukherjee_The_DevSecOps_Journey_AntiPatterns_Analytics_and_Insights
TriNimbus
 
PPTX
Teri_Radichel_Top_5_Priorities_for_Cloud_Security
TriNimbus
 
PPTX
Peter_Smith_PhD_ACL_10000_Foot_View_of_Big_Data
TriNimbus
 
PPTX
Darin_Briskman_AWS_Machine_Learning_Beyond_the_Hype
TriNimbus
 
PDF
Amazon Elastic Container Service for Kubernetes (EKS), AWS Fargate and Beyond
TriNimbus
 
PDF
Using Active Directory in AWS
TriNimbus
 
PDF
AWS 2017 re:Invent re:Cap - TriNimbus Presentation Slides
TriNimbus
 
PPTX
Performance Optimization of Cloud Based Applications by Peter Smith, ACL
TriNimbus
 
PPTX
Building and Operating AI Services at Scale by Randall Hunt, Amazon Web Services
TriNimbus
 
PDF
Web App Security Presentation by Ryan Holland - 05-31-2017
TriNimbus
 
PDF
VMware + Amazon Web Services
TriNimbus
 
PDF
DevOps in the Amazon Warehouse - Shawn Gandhi
TriNimbus
 
PDF
Goran (Kima) Kimovski, Beyond Virtualization: IT In a World of Software Defin...
TriNimbus
 
PDF
Darragh Kennedy, Build Products Not Data Centres
TriNimbus
 
PDF
Chris Munns, DevOps @ Amazon: Microservices, 2 Pizza Teams, & 50 Million Depl...
TriNimbus
 
Convergence of Containers and Serverless by Mency Woo
TriNimbus
 
Juni_Mukherjee_The_DevSecOps_Journey_AntiPatterns_Analytics_and_Insights
TriNimbus
 
Teri_Radichel_Top_5_Priorities_for_Cloud_Security
TriNimbus
 
Peter_Smith_PhD_ACL_10000_Foot_View_of_Big_Data
TriNimbus
 
Darin_Briskman_AWS_Machine_Learning_Beyond_the_Hype
TriNimbus
 
Amazon Elastic Container Service for Kubernetes (EKS), AWS Fargate and Beyond
TriNimbus
 
Using Active Directory in AWS
TriNimbus
 
AWS 2017 re:Invent re:Cap - TriNimbus Presentation Slides
TriNimbus
 
Performance Optimization of Cloud Based Applications by Peter Smith, ACL
TriNimbus
 
Building and Operating AI Services at Scale by Randall Hunt, Amazon Web Services
TriNimbus
 
Web App Security Presentation by Ryan Holland - 05-31-2017
TriNimbus
 
VMware + Amazon Web Services
TriNimbus
 
DevOps in the Amazon Warehouse - Shawn Gandhi
TriNimbus
 
Goran (Kima) Kimovski, Beyond Virtualization: IT In a World of Software Defin...
TriNimbus
 
Darragh Kennedy, Build Products Not Data Centres
TriNimbus
 
Chris Munns, DevOps @ Amazon: Microservices, 2 Pizza Teams, & 50 Million Depl...
TriNimbus
 

Recently uploaded (20)

PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Simple and concise overview about Quantum computing..pptx
mughal641
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
The Future of Artificial Intelligence (AI)
Mukul
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 

Staying Secure When Moving to the Cloud - Dave Millier

  • 1. DON’T LOSE SIGHT! STAYING SECURE WHEN MOVING TO THE CLOUD DAVE MILLIER, CEO UZADO, CSO QUICK INTELLIGENCE, CEO MIDAC SOLUTIONS AUTHOR OF THE SECURITY NOVEL, “BREACHED!”
  • 2. AGENDA FOR TODAY • Quick intro to Dave • Security Challenges Moving to the Cloud • Visibility Today • Maintaining Visibility In The Cloud • Cloud Security Alliance Cloud Controls Matrix • Call to Action (yes, this means you!)
  • 5. • Serial Entrepreneur, bought and sold 10+ companies over past 20 years • Currently owns 3 IT-related Companies: MIDAC, Qi, Uzado • Sold InfoSec company in 2014 to Robert Herjavec from Shark Tank • Involved in Networking & InfoSec/Cybersecurity for about 25 years • Loves tech! • Loves dirt biking, owns a dirt bike and ATV training school! ABOUT DAVE
  • 7. • A lot of people simply don’t understand what the cloud is (or isn’t!) • More companies moving more services to the cloud every day • Migration isn’t always done in a coordinated, well thought-out fashion • Cloud is supposed to streamline things, but getting there isn’t always painless SOME OF THE BIGGEST CHALLENGES
  • 8. WHAT ARE THE SECURITY CONSIDERATIONS? • Managing users access, permissions • Protecting our data at rest • Ensuring secure access to data (the right people at the right time) • Knowing who is accessing what when • Understanding where our data will reside (data residency issues)
  • 9. VISIBILITY!!! WHAT’S THE CORE FOR MANY OF THESE ITEMS?
  • 10. “You can’t manage what you can’t measure.” - Peter Drucker, known as the Founder of Modern Management
  • 11. VISIBILITY TODAY • Logs from our servers, network devices, security devices • Logs from our authentication devices / vpn devices • Real-time network monitoring from security tools on the wire • Logs from our applications • Vulnerability scan results from our assets
  • 12. • Lack of visibility into what’s happening (can’t always get logs) • Lack of control over users (corporate accounts and permissions don’t usually carry over) • Lack of understanding of what data is being stored where • Data Residency WHAT DO WE LOSE?
  • 13. HERE’S ONE SOLUTION – BLOCK ACCESS
  • 14. HOSTING PROVIDER VISIBILITY • AWS and other providers give you access to a wealth of security and operational information (AWS CloudTrail for example) • Incorporate the information into your existing data sources • Redesign your incident response process to use these data sources as part of an investigation • Figure out what information you have access to now, and map that to “new” source(s) of information provided by the cloud provider • Make them part of your incident response process!!!
  • 15. SECURITY TOOLS VISIBILITY • Virtual appliances (firewalls, IPS, WAF, etc.) - located elsewhere but use the information they provide as you would if it was local • If security is outsourced to hosting provider or to another 3rd party, ensure they have comparable visibility into your new environment as they had before • Providers like CloudCheckr have automated and streamlined the visibility into AWS, leverage the heck out of them!
  • 16. USER VISIBILITY • Leverage federated identity management solutions where possible. Less accounts for users, easier to migrate to cloud (assuming provider supports) • Make sure that you maintain visibility into encrypted sessions (who’s logging in from where when, what did they do?) • Determine current levels of user behaviour visibility and try to maintain that level of detail when you move the user workloads to the cloud
  • 17. SERVER AND APPLICATION VISIBILITY • Hosted servers still generate logs, collect them if at all possible • Determine what you’re logging on local servers and configure hosted servers the same • Make sure your web apps have proper logging! • Applications need to have proper auditing built in; even if you don’t see the user activity you can recreate sessions with proper app logging • Logging invalid activity just as important (don’t just log what was successful, log what failed!)
  • 18. CLOUD SECURITY ALLIANCE • Cloud Controls Matrix • Control framework based on 13 security and operational domains • Foundation is mapped to industry recognized standards and frameworks such as COBIT, ISO 27001/27002, PCI, NIST, NERC CIP, PIPEDA, HIPAA • Tailors Information Security practices to the cloud • Helps companies evaluate cloud vendor security • Helps companies make decisions on their own cloud security requirements
  • 19. USING THE CSA MATRIX • Use the matrix to do a self-assessment against your organization, identifying areas of criticality • Use the matrix to perform an evaluation against a potential cloud vendor • Compare results from cloud vendors against your areas of concern/focus • Use gap analysis results to make educated informed decisions. • May address findings by augmenting YOUR security, may choose a different provider, may work with provider to identify potential shortcomings
  • 20. DEFENSE IN DEPTH • Don’t rely on a single security solution to protect your cloud deployment • Many virtual firewalls/security devices have A/V and anti-malware scanners built into them, use them! Along with host-based protection you now have multiple controls in place complementing each other, so that even if one of them fails another one can compensate • Each layer of defense should support each other and provide an additional level of protection (“Defense in Depth”)
  • 21. WHAT DO YOU NEED TO DO NEXT? • Go back to your office and ask questions • What type of visibility do we have into our systems, our user activity, our security devices, and our applications today? (same question whether locally hosted or already in the cloud) • Have we used the CSA Cloud Controls Matrix to evaluate our vendors/partners? • How do we ensure we keep the same level of visibility we have today in the cloud? • How well do we understand our data, where it resides and what we are doing to protect it? • There are a lot more questions that could be asked, but hopefully this helps get you started!
  • 22. FINAL THOUGHT Secure it before you regret it!