Assessment and Authorization for Cloud Computing

Download Report

Transcript Assessment and Authorization for Cloud Computing

Assessment and Authorization for
Cloud Computing
Dr. Sarbari Gupta
[email protected]
703-437-9451 ext 12
Third Workshop on Cyber Security & Global Affairs
May 31 – June 2, 2011
Overview
 US Mandates and Programs affecting
Cloud Computing
 Government-wide Risk and
Authorization of Cloud Computing
 Challenges faced with Cloud Computing
Assessment and Authorization
Page 2
US Mandates and Programs
 FISMA – Federal Information Security
Management Act or 2002
 Defines a compliance framework for
securing government systems
 NIST responsible for standards & guidelines
 FedRAMP – Federal Risk Management
and Authorization Program
 Designed to solve the security authorization
problems highlighted by cloud computing
 “authorize once, use many”
Page 3
Challenges with FISMA
Measures security planning and not
information security
Interpretation of FISMA requirements and
NIST guidelines varies greatly
Same system is not compatible across
agencies
Continuous Monitoring Inadequate
Page 4
GSA IaaS Cloud Computing
Environment
 Cloud Storage Services
 Storage for Files, Data and Data Objects
 Well-defined Storage & Bandwidth Tiers
 Virtual Machines
 CPU (RAM, Disk space, Data transfer Bandwidth)
 Operating System
 Persistence
 Cloud Web Hosting
 CPU, OS, Software
Page 5
GSA IaaS – Separation of Duties
Page 6
FISMA / FedRAMP Details
Page 7
FISMA / FedRAMP Details
Page 8
Control Tailoring Workbook
CNTL
No.
Control Name
Organization Defined
Settings
controls where 800-53R3
requires an organizational
defined setting)
(for
Control:
AC1: [Assignment:
organization-defined frequency]
AC-1
Access Control Policy
and Procedures
AC-2
AC-3
AC-4
AC-5
Control:
AC2j: [Assignment:
organization-defined frequency]
Enhancements:
(2): [Assignment: organizationdefined time period for each
type of account].
(3): [Assignment: organizationAccount Management defined time period].
Access Enforcement
Information Flow
Separation of Duties
AC-6
Least Privilege
Enhancements:
(1): [Assignment: organizationdefined list of security functions
(deployed in hardware, software,
and firmware) and securityrelevant information].
(2): [Assignment: organizationdefined list of security functions
or security-relevant information].
GSA Defined Settings
(for controls where 800-53R3
requires an organizational
defined setting)
Contractor Implemented Settings
(Enter contractor implemented
settings where the setting is different
from the GSA Defined Setting (in
column D) and where the GSA
Defined setting allows a contractor
determined setting)
Control:
AC1: Biennial
Control:
AC2j: Annually
Enhancements:
(2): No more than 90 days.
(3): 90 Days for User Level
Accounts - as per contractor
system determination for nonuser level accounts (device,
token, smart cards, etc)
Enhancements:
(1): As per contractor system
determination.
(2): All Security Functions
(Examples of security functions
include but are not limited to:
establishing system accounts,
configuring access
authorizations (i.e.,
Page 9
Fill this
column
out if the
system
setting is
different
than the
GSA
defined
setting in
the
previous
column
FISMA / FedRAMP Details
Page 10
FISMA / FedRAMP Details
Page 11
FedRAMP Challenges
 Continuous monitoring not adequate
 SLA’s not validated in real-time
 Manual processes prone to error
 Security Control testing may be done too far
apart
 Security Management not adequate
 Data collection for analysis inadequate
 Corrective action hard to negotiate
Can outsource responsibility but not accountability
Page 12
End-user Visibility is Key
Page 13
A&A Process for Cloud Computing
Questions?
[email protected]
Page 14