Create
* Data Created Remotely
* What is PKI
* TLS vs SSL
* Data Created within the Cloud
Create
* Data Created Remotely - data should be encrypted (FIPS 140-2) before uploading to cloud and protect against attacks (i.e. MiTM, insider threat); Upload connection should also be secure (TLS 1.2 or higher or IPsec)
* PKI - deals with keys and managing them; enables secure communication
* TLS replaces SSL, however SSL is still used;
* Data Created within the Cloud - data should be encrypted during creation
Storing data in cloud
Store will happen as data is Created; Encyprtion at rest and encryption in transit to mitigate exposure to threats while data is being moved to cloud data center
Using Data in cloud
On the Provider Side:
* CSP must ensure data on virtualized host cannot be read or detected by other virtual hosts on the same device
* CSP will have to implement personnel and administrative controls so that data center personnel cannot access any raw customer data
Sharing Data in Cloud
Export and Import Restrictions
Export Restrictions
* International Traffic in Arms Regulations (ITAR) (USA) - state department prohibitions on defense-related exports; can include cryptography systems
* Export Administration Regulations (EAR) (USA) - DoC prohibitions on dual-use items (technologies that could be used for both commercial and military purposes)
Import Restrictions
* Cryptography - many countries have restrictions on importing cryptosystems or material that has been encrypted;
* The Wassenaar Arrangement - a group of 41 countries have agreed to inform each other about military shipments to nonmember countries; not a treaty and therefore not legally binding, but may require your organization to notify your govt in order ot stay compliant
Archiving Data in the Cloud
Elliptical Curve Cryptography (ECC)
Uses smaller keys to provide same level of security as traditional cryptography; uses algbraic elliptical curves
Destroying data in the cloud
Types of Cloud Storage Architectures (4)
Cloud Data Security Foundational Strategies - Encryption
Encryption
Encryption
* Reasons to do this are:
1. Test environments - new SW should be tested in sandboxed environments before being deployed to the production environment; When this type of testing occurs, actual production data should not be used, however data that closely approximates the same traits and characteristics should be used;
2. Enforcing Least Privilege - giving access to elements of a data set without revealing its entirety; i.e. showing paritial credit card #
3. Secure Remote Access - when a customer logs onto a web service, the customer’s account might not have their account data displayed out in the open to avoid risks such as hijacked session, stolen credentials, or shoulder surfing*
Security Information and Event Management (SIEM)
* Define and what are goals of SIEM
Egress monitoring / DLP
* Define and what are goals of SIEM
* Implementing DLP in cloud