Security and Privacy Services Cloud computing point of view October 2012 Cloud Opportunities Beyond apparent security and risk challenges, Cloud computing will lead to… New Security Opportunities Leverage Cloud solutions to realize better efficiency within security management program Privacy Regulatory Cyber Threat Resiliency and Availability Opportunity to implement stronger security than legacy on premise security models 1 Disposable environment turn it off when not in use to keep security efficiency high Cloud Security Strategy Security Operations Identity, and Access Mgmt ERP App Development Reduce vulnerabilities by ‘rightsizing’ resources in use through dynamic provisioning capability Copyright © 2012 Deloitte Development LLC. All rights reserved. Regulations Using integrated frameworks to help comply with regulatory requirements WHAT YOU NEED TO KNOW: CHALLENGES: Some regulations have not been updated Since cloud computing is relatively new, many regulatory agencies have not updated the requirements for the cloud. As regulations change, companies may not know each of the requirements needed to comply before they use cloud computing. Often, the regulatory and security requirements come after the fact. There are strategies for managing multiple requirements Companies are at different levels of maturity, requiring strategies for prioritization and remediation. Companies are concerned with various unknowns, including the rapid development of many new products, technologies, and services available for the cloud. Standards and leading practices are too new Cloud computing does not yet have an established “standard” and many leading practices are still evolving. Depending on the cloud computing solution, using certain cloud service providers may actually increase or change the regulatory requirements that a company traditionally needs to comply with. Security operations Resiliency and availability App development Cloud Security Strategy ERP Identity, and access mgmt • Identifying the current and upcoming regulatory requirements should be part of the design and selection of the cloud solution. • Use an integrated framework that rationalizes the various regulatory requirements as the assessment and tracking mechanism for the various regulatory requirements. • Create strategies for managing and prioritizing remediation efforts. • Use a risk-based approach for managing risk. What to include in your regulatory strategy 2 SOLUTION: Cyber threat Privacy Regulatory • Perform a regulatory analysis of your cloud computing adoptions to understand what requirements are needed. • Establish an integrated framework for the current and even upcoming requirements. • Consider a GRC (Governance, Risk and Compliance) strategy that allows an “Assess Once, Test Once, Satisfy Many” model. Next steps Copyright © 2012 Deloitte Development LLC. All rights reserved. Application Security How to enable secure application development WHAT YOU NEED TO KNOW: CHALLENGES: Operation Software Development Life Cycle SaaS applications should follow a specific Software Development Lifecycle (SDLC) model and operational release management process (e.g., security-focused user acceptance testing). Operational SDLC for SaaS services may not mature. CSP’s SDLC process may not include operational testing, throughput put, and data transfer/failover capabilities via PaaS/IaaS. Secure Configuration and Vulnerability Testing SaaS applications need be configured in accordance to a published common configuration management guide as well as use common security benchmarks (e.g., OWASP Top 10 , CIS Configuration Benchmarks, and NIST SCAPs). Cloud application hosting can involve several outsourced services (e.g., PaaS and IaaS), which can create difficulties for aligning security practices, response and patch, and vulnerability management capabilities throughout the service offering. Migrating Legacy Applications Many companies are recognizing the value of migrating legacy applications to a PaaS model to reduce cost and avoid expensive hardware costs for the upkeep of less active applications. Application release cycle and patch and vulnerability management can be difficult based on CSP capabilities, terms, and service operations. The cycle of version changes may not always be known and sometimes can change without warning. • Create and define application security requirements and regulatory expectations for moving to the cloud. • Define SDLC approach and expectation for use of an operational software application hosted by a CSP. • Update and document patch and vulnerability management expectations for hosted applications to include support services. • Create a data and application access strategy, which aligns to existing data access security policies. What to include in your App Development strategy 3 SOLUTION: Privacy Regulatory Cyber Threat Cloud Security Strategy Resiliency and availability Security operations Identity, and access mgmt. ERP App development • Create an application deployment roadmap for moving to a CSP based on risk exposure, reduction, and deployment capability. • Develop a security evaluation criterion to evaluate application environments to include evaluations for support PaaS and IaaS. • Outline service-level expectation within SLA along with an ISA, which outlines security expectation (e.g., uptime, upgrades, and response capabilities). Next steps Copyright © 2012 Deloitte Development LLC. All rights reserved.
© Copyright 2026 Paperzz