Cloud Security
For auditors
Moshe Ferber,
CCSK, CCSP, CCAK
Onlinecloudsec.com
When the winds of change blow, some people
build walls and others build windmills.
- Chinese Proverb
#About
 Information security professional for over 20 years
 Founder, partner and investor at various cyber initiatives and startups
 Popular industry speaker & lecturer (DEFCON, RSA, BLACKHAT, INFOSEC and more)
 Co-hosting the Silverlining podcast – lean about security engineering
 Founding committee member for ISC2 CCSP and CSA CCSK, CCAK certification
 Member of the board at Macshava Tova – Narrowing societal gaps
 Chairman of the Board, Cloud Security Alliance, Israeli Chapter
Cloud Security Course Schedule can be found at:
http://www.onlinecloudsec.com/course-schedule
So, what is cloud computing?
Actually, cloud does have a definition…
Cloud characteristics:
• Cloud computing characteristics distinguish
cloud from other forms of compute
(i.e. hosting, outsourcing , static virtualization)
• Mostly relevant for certain regulations
‫מזה‬ ‫זה‬ ‫שונים‬ ‫מאוד‬ ‫הענן‬ ‫שירותי‬
....
SaaS
PaaS
IaaS
Private Hybrid Public
The Share responsibility model
Physical Security
Network & Data Center
Security
Hypervisors Security
Virtual Machines & OS
security
Data layer & development
platform
Application
Identity Management
DATA
Audit & Monitoring
IaaS PaaS SaaS
Consumer
responsibility
Provider
responsibility
The CISO Challenge
SaaS
PaaS
IaaS
Gain the
expertise for
building
secure
applications
Evaluate
providers
correctly
Very hard to
provide best
practices
Governance tools
Cloud
policy
Cloud
audit
Contract
Cloud security Policy
Building a cloud strategy: relevant steps
Guidelines
for which
data/app can
migrate
Threats &
Risks to
consider
Identifying
key
Stakeholders
Evaluating
the provider
maturity and
security
controls.
Additional
controls that
should be
implemented
in the
service.
Cloud Policy: Balancing the requirements
Laws (i.e. Privacy laws)
Regulations (sector specific)
Standards (PCI, ISO)
Contracts
Data classification is mandatory
Data that can be
migrated
Data that can not
be migrated
Data that can only
migrate to certain
providers
Data that can only
migrated to
certain jurisdiction
Data that can only
migrated if
encrypted /
anonymized
UK gov data
classification:
• Official
• Secret
• Top secret
Official is allowed
at public cloud
Dealing with risk and threats
Identifying key stakeholders
Internal stakeholder
• IT department
• Business owners
• R&D department
• Legal Department
• GRC Department
• Procurement
department
External Stakeholder
• Integration &
Implementation
partners
• Brokers
• Software
development
companies
• Auditors
• Security consultant
Often internal stakeholder will form sort of Cloud Computing Center of Excellence
Stakeholder responsibilities
•Monitor Shadow IT
•Authorized providers list
•Budget management - IaaS/PaaS
•SaaS license management
Procurement
•Building cloud architecture
•Integrating new tools
•Vision and roadmap
Architecture
•Guidelines for compliance program
•Provider screening process
•Specific controls
GRC/CRO
•Automation
•Monitoring
•Security (secdevops)
Operations/devops
Specific controls examples
Cloud
migration
committee
Mandatory
provider
certifications
MFA usage
Data
encryption at
rest
Security
assessments
Evaluating providers (cloud assessments)
Hi diversity in the market (specially in SaaS)
• Could you do an audit?
• Should you do an audit?
In many cases you must settle for 3rd party
attestation.
Cloud provider A Cloud provider B
Provider evaluation
Is the service
adequate?
How mature is
the provider?
Are the
provider
responsibilities
clear?
Are customer
responsibilities
clear?
Are there
gaps?
Provider evaluation – what do I really looking for?
Trust
Accountability
Is the provider
accountable for
his
responsibilities?
Transparency
Is the information
I am receiving
accurate and
actionable?
Assurance
Wil the provider
perform as
planned?
Provider evaluation (mostly on SaaS)
Reviewing
security policy
Evaluating the
provider
Evaluating the
service
Evaluating the
supply chain
Analyzing
gaps
Setting special
requirements
Contract
signing
Ongoing
monitoring
Tools for provider evaluation
https://cloudsecurityalliance.org/star/registry/
SaaS services – security foundation
Encryption
• Encrypting data
at the cloud
provider (who
has the keys)?
Identity
Management
• Who control the
user store?
• Who is
responsible for
authentication?
Governance &
Audit
• Who does
what?
• Suspicious
events
detection
IaaS/PaaS – performing security testing
Security assessment
• Usually assessing the
cloud infrastructure
• Require knowledge in
the cloud platform
• Usually made against a
checklist
• Evaluating the security
posture of the
environment
Penetration testing
• Usually cover the
application layer
• Mostly black box
• Require coordination
with the provider
• Assessing the application
resilience
Assessing with a security framework
Security framework (non
cloud specific)
• ISO27001
• SOC 2/3
• COBIT
• EU-Sec
Security framework (cloud
specific)
• ISO27017 / 27018 (Cloud
Security & privacy)
• CSA STAR
• BSI C5
• NIST 800-53
• PCI DSS cloud guidelines
• CIS benchmark
Considuration: Cloud Native vs. Migrated to the cloud
Contract management
Usually made from 3
parts:
• Agreement
• SLA
• ToS
Usually not negotiable
Must address the
shared responsibility
model
Must address sub-
processors
Cloud specific
• Location of services
• Conflict resolution
• Breach notification
Must address end-of-
service and migration
Privacy considerations
Data privacy laws are
turning the world into
privacy islands
Important topics:
• Data residency
• Processor vs. controller roles
• Data subject's rights
• Breach notifications
Check put the CSA Privacy Level Agreement:
https://cloudsecurityalliance.org/research/working-groups/privacy-level-agreement/
Summary
 The word cloud describes many different types of services, with different
security considerations.
 Pick your battles –
• Large mature IaaS/PaaS providers – focus on customer maturity
• SaaS services – Choose your partners wisely
• Practical cloud policy is the place to begin, everything else will follow
Cloud Security Course Schedule can be found at: ty Course
http://www.onlinecloudsec.com/course-schedule
KEEP IN TOUCH
Cloud Security Course Schedule can be found at:
http://www.onlinecloudsec.com/course-schedule
Questions?

More Related Content

PDF
PaloAlto Enterprise Security Solution
PDF
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
PPT
SOC presentation- Building a Security Operations Center
PPTX
IT Infrastructure Managed Services and RIMS
PDF
Security architecture
PPTX
Professional Services for Cyber Recovery .pptx
PPTX
CLOUD NATIVE SECURITY
PPTX
cyber-security-reference-architecture
PaloAlto Enterprise Security Solution
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
SOC presentation- Building a Security Operations Center
IT Infrastructure Managed Services and RIMS
Security architecture
Professional Services for Cyber Recovery .pptx
CLOUD NATIVE SECURITY
cyber-security-reference-architecture

What's hot (20)

PPTX
Security Operation Center - Design & Build
PPTX
CISSP-Certified.pptx
PDF
Industrial_Cyber_Security
PDF
CyberOps Associate Modul 21 Cryptography
PPTX
Veeam Solutions for SMB_2022.pptx
PPTX
Cloud Security
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PDF
Forcepoint Dynamic Data Protection
PPTX
NIST CyberSecurity Framework: An Overview
PPTX
Cloud Security Architecture.pptx
PDF
Q radar architecture deep dive
PDF
Tenable Solutions for Enterprise Cloud Security
PPTX
An introduction to SOC (Security Operation Center)
PDF
Cybersecurity roadmap : Global healthcare security architecture
PDF
How To Present Cyber Security To Senior Management Complete Deck
PDF
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
PPT
Computer NW Security - Kizza - ch01 (1).ppt
PPTX
Software defined datacenter SDDC
PPTX
Cloud security and security architecture
PDF
Cloud Security: A New Perspective
Security Operation Center - Design & Build
CISSP-Certified.pptx
Industrial_Cyber_Security
CyberOps Associate Modul 21 Cryptography
Veeam Solutions for SMB_2022.pptx
Cloud Security
Security operations center-SOC Presentation-مرکز عملیات امنیت
Forcepoint Dynamic Data Protection
NIST CyberSecurity Framework: An Overview
Cloud Security Architecture.pptx
Q radar architecture deep dive
Tenable Solutions for Enterprise Cloud Security
An introduction to SOC (Security Operation Center)
Cybersecurity roadmap : Global healthcare security architecture
How To Present Cyber Security To Senior Management Complete Deck
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Computer NW Security - Kizza - ch01 (1).ppt
Software defined datacenter SDDC
Cloud security and security architecture
Cloud Security: A New Perspective
Ad

Similar to What the auditor need to know about cloud computing (20)

PPTX
Cloud security for banks - the central bank of Israel regulations for cloud s...
PPTX
Cloud security for financial services
PPTX
Transforming cloud security into an advantage
PPT
Effectively and Securely Using the Cloud Computing Paradigm
PPT
Cloud computing-security-issues
PPTX
The Cloud & I, The CISO challenges with Cloud Computing
PPT
4831586.ppt
PDF
Best Practices in Cloud Security Standards.pptx.pdf
PPTX
What is Cloud Security, and Can I Have Some?
PPTX
Cloud Computing Security Essentials for beginners
PPTX
The Impact of Cloud: Cloud Computing Security and Privacy
PDF
The Art of Cloud Auditing - ISACA ID
PDF
EuroCACS 2016 There are giants in the sky
PPT
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
PPT
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
PDF
Lecture27 cc-security2
PDF
Cloud services and it security
PDF
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
PPTX
Cloud is not an option, but is security?
ODP
Securing The Cloud
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for financial services
Transforming cloud security into an advantage
Effectively and Securely Using the Cloud Computing Paradigm
Cloud computing-security-issues
The Cloud & I, The CISO challenges with Cloud Computing
4831586.ppt
Best Practices in Cloud Security Standards.pptx.pdf
What is Cloud Security, and Can I Have Some?
Cloud Computing Security Essentials for beginners
The Impact of Cloud: Cloud Computing Security and Privacy
The Art of Cloud Auditing - ISACA ID
EuroCACS 2016 There are giants in the sky
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Lecture27 cc-security2
Cloud services and it security
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
Cloud is not an option, but is security?
Securing The Cloud
Ad

More from Moshe Ferber (11)

PPTX
Cloud Security - the egregious 11 cloud security threats
PPTX
Understanding IaaS/PaaS attack vectors.pptx
PPTX
Foundations of cloud security monitoring
PPTX
Cloud security certifications landscape
PPTX
Architect secure cloud services.
PPTX
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
PPTX
Surviving the lions den - how to sell SaaS services to security oriented cust...
PPTX
Cloud security what to expect (introduction to cloud security)
PPTX
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
PPTX
Aligning Risk with Growth - Cloud Security for startups
PPTX
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Cloud Security - the egregious 11 cloud security threats
Understanding IaaS/PaaS attack vectors.pptx
Foundations of cloud security monitoring
Cloud security certifications landscape
Architect secure cloud services.
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
Surviving the lions den - how to sell SaaS services to security oriented cust...
Cloud security what to expect (introduction to cloud security)
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
Aligning Risk with Growth - Cloud Security for startups
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013

Recently uploaded (20)

PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
Altius execution marketplace concept.pdf
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
The AI Revolution in Customer Service - 2025
PPTX
Build automations faster and more reliably with UiPath ScreenPlay
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
Build Real-Time ML Apps with Python, Feast & NoSQL
PDF
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
PDF
CEH Module 2 Footprinting CEH V13, concepts
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Altius execution marketplace concept.pdf
A symptom-driven medical diagnosis support model based on machine learning te...
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
EIS-Webinar-Regulated-Industries-2025-08.pdf
LMS bot: enhanced learning management systems for improved student learning e...
The AI Revolution in Customer Service - 2025
Build automations faster and more reliably with UiPath ScreenPlay
Introduction to MCP and A2A Protocols: Enabling Agent Communication
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Auditboard EB SOX Playbook 2023 edition.
Build Real-Time ML Apps with Python, Feast & NoSQL
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
CEH Module 2 Footprinting CEH V13, concepts
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
giants, standing on the shoulders of - by Daniel Stenberg
Data Virtualization in Action: Scaling APIs and Apps with FME

What the auditor need to know about cloud computing

  • 1. Cloud Security For auditors Moshe Ferber, CCSK, CCSP, CCAK Onlinecloudsec.com When the winds of change blow, some people build walls and others build windmills. - Chinese Proverb
  • 2. #About  Information security professional for over 20 years  Founder, partner and investor at various cyber initiatives and startups  Popular industry speaker & lecturer (DEFCON, RSA, BLACKHAT, INFOSEC and more)  Co-hosting the Silverlining podcast – lean about security engineering  Founding committee member for ISC2 CCSP and CSA CCSK, CCAK certification  Member of the board at Macshava Tova – Narrowing societal gaps  Chairman of the Board, Cloud Security Alliance, Israeli Chapter Cloud Security Course Schedule can be found at: http://www.onlinecloudsec.com/course-schedule
  • 3. So, what is cloud computing?
  • 4. Actually, cloud does have a definition…
  • 5. Cloud characteristics: • Cloud computing characteristics distinguish cloud from other forms of compute (i.e. hosting, outsourcing , static virtualization) • Mostly relevant for certain regulations
  • 6. ‫מזה‬ ‫זה‬ ‫שונים‬ ‫מאוד‬ ‫הענן‬ ‫שירותי‬ .... SaaS PaaS IaaS Private Hybrid Public
  • 7. The Share responsibility model Physical Security Network & Data Center Security Hypervisors Security Virtual Machines & OS security Data layer & development platform Application Identity Management DATA Audit & Monitoring IaaS PaaS SaaS Consumer responsibility Provider responsibility
  • 8. The CISO Challenge SaaS PaaS IaaS Gain the expertise for building secure applications Evaluate providers correctly Very hard to provide best practices
  • 11. Building a cloud strategy: relevant steps Guidelines for which data/app can migrate Threats & Risks to consider Identifying key Stakeholders Evaluating the provider maturity and security controls. Additional controls that should be implemented in the service.
  • 12. Cloud Policy: Balancing the requirements Laws (i.e. Privacy laws) Regulations (sector specific) Standards (PCI, ISO) Contracts
  • 13. Data classification is mandatory Data that can be migrated Data that can not be migrated Data that can only migrate to certain providers Data that can only migrated to certain jurisdiction Data that can only migrated if encrypted / anonymized UK gov data classification: • Official • Secret • Top secret Official is allowed at public cloud
  • 14. Dealing with risk and threats
  • 15. Identifying key stakeholders Internal stakeholder • IT department • Business owners • R&D department • Legal Department • GRC Department • Procurement department External Stakeholder • Integration & Implementation partners • Brokers • Software development companies • Auditors • Security consultant Often internal stakeholder will form sort of Cloud Computing Center of Excellence
  • 16. Stakeholder responsibilities •Monitor Shadow IT •Authorized providers list •Budget management - IaaS/PaaS •SaaS license management Procurement •Building cloud architecture •Integrating new tools •Vision and roadmap Architecture •Guidelines for compliance program •Provider screening process •Specific controls GRC/CRO •Automation •Monitoring •Security (secdevops) Operations/devops
  • 19. Hi diversity in the market (specially in SaaS) • Could you do an audit? • Should you do an audit? In many cases you must settle for 3rd party attestation. Cloud provider A Cloud provider B
  • 20. Provider evaluation Is the service adequate? How mature is the provider? Are the provider responsibilities clear? Are customer responsibilities clear? Are there gaps?
  • 21. Provider evaluation – what do I really looking for? Trust Accountability Is the provider accountable for his responsibilities? Transparency Is the information I am receiving accurate and actionable? Assurance Wil the provider perform as planned?
  • 22. Provider evaluation (mostly on SaaS) Reviewing security policy Evaluating the provider Evaluating the service Evaluating the supply chain Analyzing gaps Setting special requirements Contract signing Ongoing monitoring
  • 23. Tools for provider evaluation https://cloudsecurityalliance.org/star/registry/
  • 24. SaaS services – security foundation Encryption • Encrypting data at the cloud provider (who has the keys)? Identity Management • Who control the user store? • Who is responsible for authentication? Governance & Audit • Who does what? • Suspicious events detection
  • 25. IaaS/PaaS – performing security testing Security assessment • Usually assessing the cloud infrastructure • Require knowledge in the cloud platform • Usually made against a checklist • Evaluating the security posture of the environment Penetration testing • Usually cover the application layer • Mostly black box • Require coordination with the provider • Assessing the application resilience
  • 26. Assessing with a security framework Security framework (non cloud specific) • ISO27001 • SOC 2/3 • COBIT • EU-Sec Security framework (cloud specific) • ISO27017 / 27018 (Cloud Security & privacy) • CSA STAR • BSI C5 • NIST 800-53 • PCI DSS cloud guidelines • CIS benchmark Considuration: Cloud Native vs. Migrated to the cloud
  • 27. Contract management Usually made from 3 parts: • Agreement • SLA • ToS Usually not negotiable Must address the shared responsibility model Must address sub- processors Cloud specific • Location of services • Conflict resolution • Breach notification Must address end-of- service and migration
  • 28. Privacy considerations Data privacy laws are turning the world into privacy islands Important topics: • Data residency • Processor vs. controller roles • Data subject's rights • Breach notifications Check put the CSA Privacy Level Agreement: https://cloudsecurityalliance.org/research/working-groups/privacy-level-agreement/
  • 29. Summary  The word cloud describes many different types of services, with different security considerations.  Pick your battles – • Large mature IaaS/PaaS providers – focus on customer maturity • SaaS services – Choose your partners wisely • Practical cloud policy is the place to begin, everything else will follow Cloud Security Course Schedule can be found at: ty Course http://www.onlinecloudsec.com/course-schedule
  • 30. KEEP IN TOUCH Cloud Security Course Schedule can be found at: http://www.onlinecloudsec.com/course-schedule