Neko

D320 - Managing Cloud Security


Last updated: May 4th, 2023

Cloud Security Information

Cloud Customer Liability

The cloud customer is always ultimately legally liable for any loss of data. This is true even if the cloud provider demonstrates negligence or malice.

Data Lifecycle

Data Lifecycle

  • Create
  • Store
  • Use
  • Share
  • Archive
  • Destroy

Data categorization and classification are up to the responsibility of the data owner, which takes place in the create phase.

Preferred Upload Method and Key Management

Preferred upload method to the cloud is with an IPSec or TLS (1.2 or higher) VPN solution.

Recommended NOT to store crypto keys with the cloud provider whether the cloud customer chooses to use a CASB (Cloud Access Security Broker) or other means of key management.

Regulators and Data Transference

Regulators are involved in cloud service arrangements.

Transference is one of the main ways organizations address risks.

Critique, Anonymization, and Risks by Service Model

Critique falls under the exceptions category for “fair-use” copyrighted material.

Anonymization is a technique used to obscure data in the cloud.

Risks by Service Model

  • IaaS
    • Personnel Threats
    • External Threats
    • Lack of Specific Skillsets
  • PaaS
    • Interoperability Issues
    • Persistent Backdoors
    • Virtualization
    • Resource Sharing
  • SaaS
    • Proprietary Formats
    • Virtualization
    • Web Application Security

Audits and SOC Report Types

New dependencies are a potential emergent business impact analysis (BIA) concern.

Audits

  • Internal Audit – performed by employees of the organization
  • External Audit – performed by auditors outside of the organization
  • Audit Preparation – parameters that are discussed and negotiated prior to the start of the audit

SOC Report Types

  • SOC 1 - Strictly for auditing the financial reporting instruments of a corporation
  • SOC 2 - Intended to report audits of any controls on an organization’s security, availability, processing integrity, confidentiality, and privacy.
    • Type 1 - Reviews the design of controls, not how they are implemented or maintained.
    • Type 2 - Used for getting a true assessment of an organization’s security posture
  • SOC 3 - Designed to be shared with the public. Seal of approval. Does not contain any actual data about the security controls of the audit target.

Secure Logical Framework and Data Encryption

Secure Logical Framework is a part of the operating requirements.

Data at rest should be encrypted.

Cloud-Secure Software Deployment Lifecycle (SDLC)

Defining

Focused on identifying the business requirements of the application, such as accounting, database, or customer relationship management.

Designing

Begin to develop user stories (what the user will want to accomplish, what interface will look like and whether it will require the use or development of any APIs).

Development

Where the code is written.

Testing

Activities such as initial penetration testing and vulnerability scanning against the application is performed. Will use both dynamic and static testing or DSAT (Dynamic Application Security Testing) or SAST (Static Application Security Testing).

Secure Operations

After testing, the application is deemed secure.

Disposal

Once it’s reached the end of life or has been replaced with a newer or different application.

Threat Modeling and STRIDE

Threat Modeling

STRIDE – Created by Microsoft. Describes threats by their attributes.

  • S (Spoofing)
  • T (Tampering)
  • R (Repudiation)
  • I (Information Disclosure)
  • D (Denial of Service)
  • E (Elevation of Privilege)

Industry Standard Uptime and Uptime Institute (UI)

Industry Standard 5 9’s 99.999% uptime

Uptime Institute (UI)

  • Tier 1
    • UPS
    • Sufficient Cooling
    • Power Generator w. minimum 12hours fuel
    • WILL CAUSE DOWNTIME
  • Tier 2
    • Critical operations do not have to be interrupted for scheduled replacement or downtime
    • MAY CAUSE DOWNTIME
  • Tier 3
    • Dual Power Supplies for all IT Systems
    • Can continue with a single component or power element
  • Tier 4
    • Redundancy of both IT and electrical

Security Training, US Laws, and International Regulations

Initial training is a security training delivery category

US Laws

  • Electronic Communications Privacy Act (ECPA)
  • Graham-Leach-Bliley Act (GLBA) – allow banks to merge and own insurance companies
  • Sarbanes-Oxley Act (SOX) – increase transparency into publicly traded corporations’ financial activities
  • HIPPA (1996)– protect patient records and data (ePHI)
  • FERPA – prevent academic institutions from sharing student data other than parents or student
  • DMCA – protect owned data on the internet
  • CLOUD Act – Allows US law enforcement and courts to compel American companies to disclose data stored in foreign data centers

International Regulations

FedRAMP – US federal program that mandates a standardized approach to security assessments, authorization, and continuous monitoring of cloud products and services.

EU General Data Protection Regulation (GDPR) – most significant, powerful personal privacy law in the world. Describes the appropriate handling of personal and private information of all EU citizens.

GDRP has 7 principals:

  • Notice
  • Choice
  • Purpose
  • Access
  • Integrity
  • Security
  • Enforcement

Canada’s Personal Information Protection and Electronic Document Act (PIPEDA)

Asia-Pacific Economic Cooperation (APEC) Privacy Framework

Australian Privacy Act of 1988

ISO Standards and Network Design Model

ISO 31000:2018 specifically focuses on design implementation and management

ISO/IEC 27017:2015 – set of standards regarding the guidelines of information security controls applicable to the provision and use of cloud services and cloud service customers

ISO 27017 is about cloud-specific security controls

ISO 27001 is probably the most well-recognized security program standard globally

NIST 800-92 is about log management

Gap Analysis Identifies and reports on any risks that may affect the AIC of key information assets

service provider is a component of the “Hub and Spoke” network design model.