Protect the Cloud
How do organizations know how to handle risks - security decisions, like risk assessments, need to be based off business requirements.
Use the info below to develop information to drive security decisions - like risk analysis
Tangible - hardware, software, networks,
Intangible - knowledge, information, intellectual property, and others
Build list of - number, location, and type of assets
Understand what the true cost is in price
or
BIA - asset is essential for business functions
Senior management determines criticality
Is the asset a SPOF?
Risk for organization that they find acceptable
How to handle risk
Accept
Avoid
Transfer
Mitigate
IAAS
Highly regulated industries need to determine how they will audit cloud IAAS environment, how often
Adapt security policy for the cloud
Customer can still collect event logs for environment
PAAS
Customer will want to monitor events for software
Customer can't monitor infrastructure or OS
SAAS
Customer will want to build policy for the data
CSP maintains access and control
General Considerations
Physical Access is all on CSP
Customer has to relinquish control but may want to understand these:
Background checks
SubProcessor/Subcontractor checks
Data Center Security
Contract
Encryption
Hardening Devices
Encryption
Layered Defenses