The Cloud Security Rules
•The Roer Group: 1994
•Author & blogger
•Consulting, training and
  speaking worldwide

•Information security
  and Risk Management
The Cloud Security Rules
•Risk management
•Compliance and legal matters
•Humans
•Technology
•Business models
The Cloud Security Rules
Source: http://en.wikipedia.org/wiki/Risk_management, 3rd June 2012
Risk is defined in ISO 31000 as the effect of
uncertainty on objectives, whether positive
or negative

Risk management is the identification,
assessment, and prioritization of risks
followed by coordinated and economical
application of resources to minimize,
monitor, and control the probability and /or
impact of unfortunate events or to maximize
the realization of opportunities.

         Source: http://en.wikipedia.org/wiki/Risk_management, 3rd June 2012
The Cloud Security Rules
Risk management requires
Risk management requires

•competence
Risk management requires

•competence
•resources
Risk management requires

•competence
•resources

  Something most SME’s don’t have
• What are our risks when buying this service
 from this vendor?
• Can we accept those risks?
• How will our cloud supplier(s) impact our
 business contingency plan?
• What if the cloud fail?
Plan for Cloud Fail!
The Cloud Security Rules
• HIPAA             • Gramm-Leach-Bliley
• SOx               • Breach Notification
                      Legislation
• PCI-DSS
• The Patriot Act   • Data Protection
                      Directive

• Basel I           • The new EU Data
                      Regulations
• Basel II
• Basel III         • FISMA
Data Protection Directive (Directive 95/46/EC)

Personal data are defined as
“any information relating to an identified or identifiable natural person ("data subject");
an identifiable person is one who can be identified, directly or indirectly, in particular by
reference to an identification number or to one or more factors specific to his physical,
physiological, mental, economic, cultural or social identity;" (art. 2 a)




                 Any information connected to a person.
•Most laws and regulations fail to
  recognize the service providers role, and
  assume that the owner of the data also
  controls the infrastructure.
•Where (country) do you store the data?
•Which jurisdiction controls your data?
•What and who have access to the data?
•Privacy regulations in EU != USA
The Cloud Security Rules
The Cloud Security Rules
The Cloud Security Rules
The Cloud Security Rules
• What training will our users need in order to
  successfully use the cloud service?

• How does the cloud service impact our
  policies?

• Are we ready for cloud? What will need to be
  changed to prepare us?
The Cloud Security Rules
The Cloud Security Rules
The Cloud Security Rules
• What alternative cloud services are available
  to us?

• What impact will the cloud implementation
  have on our IT-department?

• Who is in charge of support?
The Cloud Security Rules
The Cloud Security Rules
The Cloud Security Rules
The Cloud Security Rules
The Cloud Security Rules
The Cloud Security Rules
•99% of companies in EU are SME
•most lack knowledge, understanding and
  competence for maintaining their own
  systems

•Cloud provides a more secure and cost-
  efficient solution to most of these
  companies
The Cloud Security Rules
• How will the cloud provider sustain
  themselves and stay in business?

• How important is price vs customation to us?



• What kind of impact will the use of this service
  have on our business model?

• What can we change in our current business
  model to benefit from the cloud possibilities?
The Cloud Security Rules
?
Kai Roer
  kai@roer.com
 http://roer.com
Twitter: @kairoer

More Related Content

PDF
Cyber Security and Cloud Computing
PDF
Cloud Security Engineering - Tools and Techniques
PDF
Cloud Security: What you need to know about IBM SmartCloud Security
PPTX
Cloud Security
PPTX
cloud security ppt
PPTX
Tsc2021 cyber-issues
PPTX
Security on Cloud Computing
PPTX
Cloud security comparisons between aws and azure
Cyber Security and Cloud Computing
Cloud Security Engineering - Tools and Techniques
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security
cloud security ppt
Tsc2021 cyber-issues
Security on Cloud Computing
Cloud security comparisons between aws and azure

What's hot (20)

PDF
Cloud security
PDF
Cloud Security & Cloud Encryption Explained
PDF
Cloud Security Demystified
PDF
Know Your Attacker - Core Security
PDF
Security issue in Cloud computing
PDF
Cloud Security - Kloudlearn
PPTX
7 Ways To Cyberattack And Hack Azure
PDF
Cloud Security Introduction
PPTX
Guide to Cybersecurity Compliance in China
PPTX
Top 10 AWS Security and Compliance best practices
PDF
SOC-as-a-Service - comSpark 2019
PDF
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
PDF
Cloud Security Governance
PPTX
How to Overcome Network Access Control Limitations for Better Network Security
PPTX
Threat Modeling - Locking the Door to Vulnerabilities
PPTX
Cyber security fundamentals
PDF
Crush Common Cybersecurity Threats with Privilege Access Management
PDF
Extending Your Network Cloud Security to AWS
PPTX
Assessing System Risk the Smart Way
PPTX
Cloud security
Cloud security
Cloud Security & Cloud Encryption Explained
Cloud Security Demystified
Know Your Attacker - Core Security
Security issue in Cloud computing
Cloud Security - Kloudlearn
7 Ways To Cyberattack And Hack Azure
Cloud Security Introduction
Guide to Cybersecurity Compliance in China
Top 10 AWS Security and Compliance best practices
SOC-as-a-Service - comSpark 2019
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Cloud Security Governance
How to Overcome Network Access Control Limitations for Better Network Security
Threat Modeling - Locking the Door to Vulnerabilities
Cyber security fundamentals
Crush Common Cybersecurity Threats with Privilege Access Management
Extending Your Network Cloud Security to AWS
Assessing System Risk the Smart Way
Cloud security
Ad

Similar to The Cloud Security Rules (20)

PPT
Accounting
PPTX
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
PPTX
The Need for Information Security (powerpoint)
PDF
Legal issues in the cloud renzo marchini & gene landy
PDF
Data security in cloud
PPTX
A practical data privacy and security approach to ffiec, gdpr and ccpa
PDF
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
ODP
GDPR and ISO 27001 - how to be compliant
PDF
12 02-14 information security managers - unannotated
ODP
IISP NW branch meeting 15 nov 2012 security through governance, compliance…
ODP
IT Security through governance, compliance and risk
PDF
Where in the world is your PII and other sensitive data? by @druva inc
PDF
Data Privacy Compliance
PDF
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
PPTX
A guide to Sustainable Cyber Security
PDF
Protect your confidential information while improving services
PPTX
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PDF
Cloud Auditing
PPTX
The need for a comprehensive breach plan - Ahmore Burger-Smidt
PDF
Emerging Trends in Information Privacy and Security
Accounting
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
The Need for Information Security (powerpoint)
Legal issues in the cloud renzo marchini & gene landy
Data security in cloud
A practical data privacy and security approach to ffiec, gdpr and ccpa
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
GDPR and ISO 27001 - how to be compliant
12 02-14 information security managers - unannotated
IISP NW branch meeting 15 nov 2012 security through governance, compliance…
IT Security through governance, compliance and risk
Where in the world is your PII and other sensitive data? by @druva inc
Data Privacy Compliance
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
A guide to Sustainable Cyber Security
Protect your confidential information while improving services
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Cloud Auditing
The need for a comprehensive breach plan - Ahmore Burger-Smidt
Emerging Trends in Information Privacy and Security
Ad

More from Kai Roer (9)

PDF
Measuring security culture is different from counting employees
PDF
GDPR and Security Culture: Measuring effectiveness
PDF
The Security Culture Conference 2016
PDF
Hacking You Mind - How you are being exploited by hackers of all sorts!
PPTX
An overview of the Security Culture Framework, and the services around it
PPTX
The Security culture campaign explained in 5 minutes
PPT
Selling security - understanding how mental patterns and bias impacts your me...
PDF
The Active Listening Cheat Sheet
PPT
Jci Viking Weekend 2009
Measuring security culture is different from counting employees
GDPR and Security Culture: Measuring effectiveness
The Security Culture Conference 2016
Hacking You Mind - How you are being exploited by hackers of all sorts!
An overview of the Security Culture Framework, and the services around it
The Security culture campaign explained in 5 minutes
Selling security - understanding how mental patterns and bias impacts your me...
The Active Listening Cheat Sheet
Jci Viking Weekend 2009

Recently uploaded (20)

PDF
Kishore Vora - Best CFO in India to watch in 2025.pdf
PDF
the role of manager in strategic alliances
PPTX
003 seven PARTS OF SPEECH english subject.pptx
PDF
Second Hand Fashion Call to Action March 2025
PPT
Retail Management and Retail Markets and Concepts
PPTX
IITM - FINAL Option - 01 - 12.08.25.pptx
PDF
533158074-Saudi-Arabia-Companies-List-Contact.pdf
PPTX
Transportation in Logistics management.pptx
PDF
income tax laws notes important pakistan
PPTX
Supply Chain under WAR (Managing Supply Chain Amid Political Conflict).pptx
PPT
BCG内部幻灯片撰写. slide template BCG.slide template
PDF
Cross-Cultural Leadership Practices in Education (www.kiu.ac.ug)
PDF
HQ #118 / 'Building Resilience While Climbing the Event Mountain
DOCX
80 DE ÔN VÀO 10 NĂM 2023vhkkkjjhhhhjjjj
PPTX
IMM marketing mix of four ps give fjcb jjb
PDF
Immigration Law and Communication: Challenges and Solutions {www.kiu.ac.ug)
PPTX
chapter 2 entrepreneurship full lecture ppt
PDF
Comments on Clouds that Assimilate Parts I&II.pdf
PDF
Middle East's Most Impactful Business Leaders to Follow in 2025
PDF
Consumer Behavior in the Digital Age (www.kiu.ac.ug)
Kishore Vora - Best CFO in India to watch in 2025.pdf
the role of manager in strategic alliances
003 seven PARTS OF SPEECH english subject.pptx
Second Hand Fashion Call to Action March 2025
Retail Management and Retail Markets and Concepts
IITM - FINAL Option - 01 - 12.08.25.pptx
533158074-Saudi-Arabia-Companies-List-Contact.pdf
Transportation in Logistics management.pptx
income tax laws notes important pakistan
Supply Chain under WAR (Managing Supply Chain Amid Political Conflict).pptx
BCG内部幻灯片撰写. slide template BCG.slide template
Cross-Cultural Leadership Practices in Education (www.kiu.ac.ug)
HQ #118 / 'Building Resilience While Climbing the Event Mountain
80 DE ÔN VÀO 10 NĂM 2023vhkkkjjhhhhjjjj
IMM marketing mix of four ps give fjcb jjb
Immigration Law and Communication: Challenges and Solutions {www.kiu.ac.ug)
chapter 2 entrepreneurship full lecture ppt
Comments on Clouds that Assimilate Parts I&II.pdf
Middle East's Most Impactful Business Leaders to Follow in 2025
Consumer Behavior in the Digital Age (www.kiu.ac.ug)

The Cloud Security Rules

  • 2. •The Roer Group: 1994 •Author & blogger •Consulting, training and speaking worldwide •Information security and Risk Management
  • 4. •Risk management •Compliance and legal matters •Humans •Technology •Business models
  • 7. Risk is defined in ISO 31000 as the effect of uncertainty on objectives, whether positive or negative Risk management is the identification, assessment, and prioritization of risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability and /or impact of unfortunate events or to maximize the realization of opportunities. Source: http://en.wikipedia.org/wiki/Risk_management, 3rd June 2012
  • 12. Risk management requires •competence •resources Something most SME’s don’t have
  • 13. • What are our risks when buying this service from this vendor? • Can we accept those risks? • How will our cloud supplier(s) impact our business contingency plan? • What if the cloud fail?
  • 14. Plan for Cloud Fail!
  • 16. • HIPAA • Gramm-Leach-Bliley • SOx • Breach Notification Legislation • PCI-DSS • The Patriot Act • Data Protection Directive • Basel I • The new EU Data Regulations • Basel II • Basel III • FISMA
  • 17. Data Protection Directive (Directive 95/46/EC) Personal data are defined as “any information relating to an identified or identifiable natural person ("data subject"); an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity;" (art. 2 a) Any information connected to a person.
  • 18. •Most laws and regulations fail to recognize the service providers role, and assume that the owner of the data also controls the infrastructure.
  • 19. •Where (country) do you store the data? •Which jurisdiction controls your data? •What and who have access to the data? •Privacy regulations in EU != USA
  • 24. • What training will our users need in order to successfully use the cloud service? • How does the cloud service impact our policies? • Are we ready for cloud? What will need to be changed to prepare us?
  • 28. • What alternative cloud services are available to us? • What impact will the cloud implementation have on our IT-department? • Who is in charge of support?
  • 35. •99% of companies in EU are SME •most lack knowledge, understanding and competence for maintaining their own systems •Cloud provides a more secure and cost- efficient solution to most of these companies
  • 37. • How will the cloud provider sustain themselves and stay in business? • How important is price vs customation to us? • What kind of impact will the use of this service have on our business model? • What can we change in our current business model to benefit from the cloud possibilities?
  • 39. ?
  • 40. Kai Roer [email protected] http://roer.com Twitter: @kairoer

Editor's Notes