๐ฉ๐ซ๐จ๐ฉ๐ž๐ซ ๐œ๐ฅ๐จ๐ฎ๐ ๐ฌ๐ž๐ซ๐ฏ๐ข๐œ๐ž๐ฌ ๐ญ๐ก๐ซ๐จ๐ฎ๐ ๐ก ๐‚๐‚๐’๐Š & ๐‚๐‚๐Œ

A presentation at SysAdminDay 2022 in July 2022 in by Tanat Tonguthaisri

Slide 1

Slide 1

Slide 2

Slide 2

How CSA help shaping proper cloud services through CCSK and CCM Tanat Tonguthaisri https://LinkedIn.com/in/epicure/

Slide 3

Slide 3

How CSA help shaping properly secured cloud services through CCSK and CCM Tanat Tonguthaisri https://LinkedIn.com/in/epicure/

Slide 4

Slide 4

Agenda (1) In your current role at xxxx, as a xxxx, you do xxx (insert your job description). Can you tell us about what your job involves? (2) Can you share with us some complexities in managing cloud computing projects? (3) In managing (outsourced) cloud projects, what are useful tips you could share with IT professionals to avoid common pitfalls? (4) What made you decide to earn your CCSK? What part of the material from the CCSK has been the most relevant in your work and why? (5) How does CCM help communicate with customers? (6) Whatโ€™s the value in a vendor-neutral certificate like the CCSK or CCSP versus getting certified by AWS? In what scenario are the different certificates important? (7) Would you encourage your staff and/or colleagues to obtain CCSK or other CSA qualifications? Why? (8) What is the best advice you will give to IT professionals in order for them to scale new heights in their careers?

Slide 5

Slide 5

Slide 6

Slide 6

Days of Future Past (1) In your current role at xxxx, as a xxxx, you do xxx (insert your job description). Can you tell us about what your job involves?

Slide 7

Slide 7

Next Endeavour (1) In your current role at xxxx, as a xxxx, you do xxx (insert your job description). Can you tell us about what your job involves?

Slide 8

Slide 8

(2) Can you share with us some complexities in managing cloud computing projects? Contractor controls access to applications and data on cloud. Monitoring is not easy for Thai cloud.

Slide 9

Slide 9

(3) In managing (outsourced) cloud projects, what are useful tips you could share with IT professionals to avoid common pitfalls? As contracting office, designated officers should have at least read access to cloud resources.

Slide 10

Slide 10

Motivation What made you decide to earn your CCSK?

Slide 11

Slide 11

CCSK Plus #1, November 2014

Slide 12

Slide 12

Nantawan Wongkachonkitti, Ph.D. CIO & Deputy Manager General of Student Loan Funds, first CCSK passer in Thailand

Slide 13

Slide 13

Slide 14

Slide 14

Two attempts per CCSK exam token

Slide 15

Slide 15

Preparation What part of the material from the CCSK has been the most relevant in your work and why? DEPA program KMITL

Slide 16

Slide 16

CCSK, CCSP & vendor specific cert Whatโ€™s the value in a vendor-neutral certificate like the CCSK or CCSP versus getting certified by AWS? In what scenario are the different certificates important? Broad and general knowledge, plus overall best practices. AWS, Azure, GCP, Alibaba, Huawei, Tencent

Slide 17

Slide 17

Certificate vs Certification A certificate recognizes a candidateโ€™s knowledge, skills and abilities typically as framed by a job role. A certificate scope is narrower, and only provides proof of a training course completion.

Slide 18

Slide 18

Certificate vs Certification A certification grants a candidate access to a membership organization, and almost always requires an annual continuing professional education (CPE) commitment to maintain the certification. But a certificate does not often associate one with any membership organization, and the body of knowledge gained does not evolve over time or require a CPE.

Slide 19

Slide 19

CCSP Domain 1. Cloud Concepts, Architecture and Design Domain 2. Cloud Data Security Domain 3. Cloud Platform and Infrastructure Security Domain 4. Cloud Application Security Domain 5. Cloud Security Operations Domain 6. Legal, Risk and Compliance

Slide 20

Slide 20

CCSK

Slide 21

Slide 21

CCSK

Slide 22

Slide 22

Slide 23

Slide 23

Slide 24

Slide 24

Slide 25

Slide 25

On-demand self-service A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider.

Slide 26

Slide 26

Rapid elasticity Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be appropriated in any quantity at any time.

Slide 27

Slide 27

Without essential characteristics, it can never be a โ€œproperโ€ cloud service, but rather a Virtual Private Server (VPS).

Slide 28

Slide 28

Slide 29

Slide 29

Slide 30

Slide 30

Slide 31

Slide 31

Slide 32

Slide 32

Slide 33

Slide 33

Slide 34

Slide 34

Slide 35

Slide 35

Data Security Lifecycle

Slide 36

Slide 36

Slide 37

Slide 37

Slide 38

Slide 38

Slide 39

Slide 39

Common networks underlying IaaS

Slide 40

Slide 40

Software Defined Perimeter

Slide 41

Slide 41

deployment pipeline for creating images for immutable VMs or containers.

Slide 42

Slide 42

Slide 43

Slide 43

Virtual networks move packets in software and monitoring canโ€™t rely on sniffing the physical network connections.

Slide 44

Slide 44

Slide 45

Slide 45

Incident Response Lifecycle

Slide 46

Slide 46

Slide 47

Slide 47

Secure application design and development phases

Slide 48

Slide 48

continuous deployment pipeline

Slide 49

Slide 49

Slide 50

Slide 50

Managing data migrations to the cloud.

Slide 51

Slide 51

Slide 52

Slide 52

Slide 53

Slide 53

Slide 54

Slide 54

SECaaS https://cloudsecurityalliance.org/research/artifacts/?term=security-as-a-service 1. 2. 3. 4. 5. Identity and Access Management Data Loss Prevention Web Security Email Security Security Assessments 6. 7. 8. 9. 10. Intrusion Management Security, Information and Event Management Encryption BC/DR Network Security

Slide 55

Slide 55

Slide 56

Slide 56

The current list of Related Tech includes: โ€ข Big Data โ€ข Internet of Things (IoT) โ€ข Mobile devices โ€ข Serverless computing

Slide 57

Slide 57

(5) How does CCM help communicate with customers? https://downloads.cloudsecurityalliance.org/initiatives/ccm/CSA_CCM_v3.0.xlsx https://docs.google.com/presentation/d/1qFr9Mm8jiCzfm2roGsfhTR8GaUKwudfgw-t JLYOwnfg/edit?usp=sharing

Slide 58

Slide 58

CCMโ€™s Control Domains 1. 2. 3. 4. 5. 6. 7. 8. Application & Interface Security Audit Assurance & Compliance Business Continuity Management & Operational Resilience Change Control & Configuration Management Data Security & Information Lifecycle Management Datacenter Security Encryption & Key Management Governance and Risk Management 9. 10. 11. 12. 13. 14. 15. 16. Human Resources Identity & Access Management Infrastructure & Virtualization Security Interoperability & Portability Mobile Security Security Incident Management, E-Discovery & Cloud Forensics Supply Chain Management, Transparency and Accountability Threat and Vulnerability Management

Slide 59

Slide 59

Application & Interface Security

Application Security Customer Access Requirements Data Integrity Data Security / Integrity

Slide 60

Slide 60

Audit Assurance & Compliance

  1. Audit Planning 2. Independent Audits 3. Information System Regulatory Mapping

Slide 61

Slide 61

Business Continuity Management & Operational Resilience 1. 2. 3. 4. 5. 6. Business Continuity Planning 7. Equipment Maintenance Business Continuity Testing 8. Equipment Power Failures Datacenter Utilities / Environmental Conditions 9. Impact Analysis Documentation 10. Management Program Environmental Risks 11. Policy Equipment Location 12. Retention Policy

Slide 62

Slide 62

Change Control & Configuration Management 1. 2. 3. 4. 5. New Development / Acquisition Outsourced Development Quality Testing Unauthorized Software Installations Production Changes

Slide 63

Slide 63

Data Security & Information Lifecycle Management 1. 2. 3. 4. Classification Data Inventory / Flows eCommerce Transactions Handling / Labeling / Security Policy 5. 6. 7. 8. Information Leakage Non-Production Data Ownership / Stewardship Secure Disposal

Slide 64

Slide 64

Datacenter Security 1. 2. 3. 4. 5. Asset Management Controlled Access Points Equipment Identification Off-Site Authorization Off-Site Equipment 6. 7. 8. 9. Policy Datacenter Security - Secure Area Authorization Unauthorized Persons Entry User Access

Slide 65

Slide 65

Encryption & Key Management

Entitlement Key Generation Sensitive Data Protection Storage and Access

Slide 66

Slide 66

Governance and Risk Management 1. 2. 3. 4. 5. 6. Baseline Requirements Data Focus Risk Assessments Management Oversight Management Program Management Support/Involvement Policy 7. 8. 9. 10. 11. 12. Policy Enforcement Policy Impact on Risk Assessments Policy Reviews Risk Assessments Risk Management Framework Risk Mitigation / Acceptance

Slide 67

Slide 67

Human Resources 1. 2. 3. 4. 5. 6. Asset Returns Background Screening Employment Agreements Employment Termination Industry Knowledge / Benchmarking Mobile Device Management 7. 8. 9. 10. 11. 12. Non-Disclosure Agreements Roles / Responsibilities Technology Acceptable Use Training / Awareness User Responsibility Workspace

Slide 68

Slide 68

Identity & Access Management 1. 2. 3. 4. 5. 6. Audit Tools Access Credential Lifecycle / Provision Management Diagnostic / Configuration Ports Access Policies and Procedures Segregation of Duties Source Code Access Restriction 7. 8. 9. 10. 11. 12. 13. Third Party Access Trusted Sources User Access Authorization User Access Reviews User Access Revocation User ID Credentials Utility Programs Access

Slide 69

Slide 69

Infrastructure & Virtualization Security 1. 2. 3. 4. 5. 6. Audit Logging / Intrusion Detection Change Detection Clock Synchronization Information System Documentation Management - Vulnerability Management Network Security 7. 8. 9. 10. 11. 12. OS Hardening and Base Conrols Production / Non-Production Environments Segmentation VM Security - vMotion Data Protection VMM Security - Hypervisor Hardening Wireless Security

Slide 70

Slide 70

Interoperability & Portability 1. 2. 3. 4. 5. APIs Data Request Policy & Legal Standardized Network Protocols Virtualization

Slide 71

Slide 71

Mobile Security 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Anti-Malware Application Stores Approved Applications Approved Software for BYOD Awareness and Training Cloud Based Services Compatibility Device Eligibility Device Inventory Device Management 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. Encryption Jailbreaking and Rooting Legal Lockout Screen Operating Systems Passwords Policy Remote Wipe Security Patches Users

Slide 72

Slide 72

Security Incident Management, E-Discovery & Cloud Forensics 1. 2. 3. 4. 5. Contact / Authority Maintenance Incident Management Incident Reporting Incident Response Legal Preparation Incident Response Metrics

Slide 73

Slide 73

Supply Chain Management, Transparency and Accountability 1. 2. 3. 4. 5. Data Quality and Integrity Incident Reporting Network / Infrastructure Services Provider Internal Assessments Supply Chain Agreements 6. 7. 8. 9. Supply Chain Governance Reviews Supply Chain Metrics Third Party Assessment Third Party Audits

Slide 74

Slide 74

Threat and Vulnerability Management

  1. Anti-Virus / Malicious Software 2. Vulnerability / Patch Management 3. Mobile Code

Slide 75

Slide 75

Scope Applicability 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. AICPA, TS Map AICPA, Trust Service Criteria (SOC 2SM Report) BITS Shared Assessments, AUP v5.0 BITS Shared Assessments, SIG v6.0 BSI Germany CCM V1.X COBIT 4.1 CSA Enterprise Architecture / Trust Cloud Initiative CSA Guidance V3.0 ENISA IAF 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. FedRAMP Security Controls (Final Release, Jan 2012) โ€”LOW IMPACT LEVEL-FedRAMP Security Controls (Final Release, Jan 2012) โ€”MODERATE IMPACT LEVEL-GAPP (Aug 2009) HIPAA / HITECH Act ISO/IEC 27001-2005 Jericho Forum NERC CIP NIST SP800-53 R3 NZISM PCI DSS v2.0

Slide 76

Slide 76

ENISAโ€™s Cloud Computing Risk Assessment European Network and Information Security Agency European Union Agency for Cybersecurity https://www.enisa.europa.eu/publication s/cloud-computing-risk-assessment

  1. Security benefits of cloud computing 2. Risk assessment 3. Risks 3.1 Policy and organizational risks 3.2 Technical risks 3.3 Legal risks 3.4 Risks not specific to the cloud 4. Vulnerabilities 5. Assets 6. Recommendations and key messages 6.1 Information assurance framework 6.2 Informational assurance requirements 6.3 Research recommendations, e.g. trust in the cloud, data protection, large-scale systems engineering

Slide 77

Slide 77

(7) Would you encourage your staff and/or colleagues to obtain CCSK or other CSA qualifications? Why? CCSK then CCAK to understand how to assess proper cloud services.

Slide 78

Slide 78

(8) What is the best advice you will give to IT professionals in order for them to scale new heights in their careers? In organizations that can never keep up with ever expanding IT resources, cloud is a must. Knowing how to manage cloud resources and maintain reliable & resilient cloud operations, one needs proper cloud certification.