D320 - Managing Cloud Security
Last updated: May 4th, 2023
Cloud Security Information
Cloud Customer Liability
The cloud customer is always ultimately legally liable for any loss of data. This is true even if the cloud provider demonstrates negligence or malice.
Data Lifecycle
Data Lifecycle
- Create
- Store
- Use
- Share
- Archive
- Destroy
Data categorization and classification are up to the responsibility of the data owner, which takes place in the create phase.
Preferred Upload Method and Key Management
Preferred upload method to the cloud is with an IPSec or TLS (1.2 or higher) VPN solution.
Recommended NOT to store crypto keys with the cloud provider whether the cloud customer chooses to use a CASB (Cloud Access Security Broker) or other means of key management.
Regulators and Data Transference
Regulators are involved in cloud service arrangements.
Transference is one of the main ways organizations address risks.
Critique, Anonymization, and Risks by Service Model
Critique falls under the exceptions category for “fair-use” copyrighted material.
Anonymization is a technique used to obscure data in the cloud.
Risks by Service Model
- IaaS
- Personnel Threats
- External Threats
- Lack of Specific Skillsets
- PaaS
- Interoperability Issues
- Persistent Backdoors
- Virtualization
- Resource Sharing
- SaaS
- Proprietary Formats
- Virtualization
- Web Application Security
Audits and SOC Report Types
New dependencies are a potential emergent business impact analysis (BIA) concern.
Audits
- Internal Audit – performed by employees of the organization
- External Audit – performed by auditors outside of the organization
- Audit Preparation – parameters that are discussed and negotiated prior to the start of the audit
SOC Report Types
- SOC 1 - Strictly for auditing the financial reporting instruments of a corporation
- SOC 2 - Intended to report audits of any controls on an organization’s security, availability, processing integrity, confidentiality, and privacy.
- Type 1 - Reviews the design of controls, not how they are implemented or maintained.
- Type 2 - Used for getting a true assessment of an organization’s security posture
- SOC 3 - Designed to be shared with the public. Seal of approval. Does not contain any actual data about the security controls of the audit target.
Secure Logical Framework and Data Encryption
Secure Logical Framework is a part of the operating requirements.
Data at rest should be encrypted.
Cloud-Secure Software Deployment Lifecycle (SDLC)
Defining
Focused on identifying the business requirements of the application, such as accounting, database, or customer relationship management.
Designing
Begin to develop user stories (what the user will want to accomplish, what interface will look like and whether it will require the use or development of any APIs).
Development
Where the code is written.
Testing
Activities such as initial penetration testing and vulnerability scanning against the application is performed. Will use both dynamic and static testing or DSAT (Dynamic Application Security Testing) or SAST (Static Application Security Testing).
Secure Operations
After testing, the application is deemed secure.
Disposal
Once it’s reached the end of life or has been replaced with a newer or different application.
Threat Modeling and STRIDE
Threat Modeling
STRIDE – Created by Microsoft. Describes threats by their attributes.
- S (Spoofing)
- T (Tampering)
- R (Repudiation)
- I (Information Disclosure)
- D (Denial of Service)
- E (Elevation of Privilege)
Industry Standard Uptime and Uptime Institute (UI)
Industry Standard 5 9’s 99.999% uptime
Uptime Institute (UI)
- Tier 1
- UPS
- Sufficient Cooling
- Power Generator w. minimum 12hours fuel
- WILL CAUSE DOWNTIME
- Tier 2
- Critical operations do not have to be interrupted for scheduled replacement or downtime
- MAY CAUSE DOWNTIME
- Tier 3
- Dual Power Supplies for all IT Systems
- Can continue with a single component or power element
- Tier 4
- Redundancy of both IT and electrical
Security Training, US Laws, and International Regulations
Initial training is a security training delivery category
US Laws
- Electronic Communications Privacy Act (ECPA)
- Graham-Leach-Bliley Act (GLBA) – allow banks to merge and own insurance companies
- Sarbanes-Oxley Act (SOX) – increase transparency into publicly traded corporations’ financial activities
- HIPPA (1996)– protect patient records and data (ePHI)
- FERPA – prevent academic institutions from sharing student data other than parents or student
- DMCA – protect owned data on the internet
- CLOUD Act – Allows US law enforcement and courts to compel American companies to disclose data stored in foreign data centers
International Regulations
FedRAMP – US federal program that mandates a standardized approach to security assessments, authorization, and continuous monitoring of cloud products and services.
EU General Data Protection Regulation (GDPR) – most significant, powerful personal privacy law in the world. Describes the appropriate handling of personal and private information of all EU citizens.
GDRP has 7 principals:
- Notice
- Choice
- Purpose
- Access
- Integrity
- Security
- Enforcement
Canada’s Personal Information Protection and Electronic Document Act (PIPEDA)
Asia-Pacific Economic Cooperation (APEC) Privacy Framework
Australian Privacy Act of 1988
ISO Standards and Network Design Model
ISO 31000:2018 specifically focuses on design implementation and management
ISO/IEC 27017:2015 – set of standards regarding the guidelines of information security controls applicable to the provision and use of cloud services and cloud service customers
ISO 27017 is about cloud-specific security controls
ISO 27001 is probably the most well-recognized security program standard globally
NIST 800-92 is about log management
Gap Analysis Identifies and reports on any risks that may affect the AIC of key information assets
service provider is a component of the “Hub and Spoke” network design model.