SlideShare una empresa de Scribd logo
1 de 33
©2014 LinkedIn Corporation. All Rights Reserved.
Chris Niggel, CISSP CCSK
Charles Nwatu, GSLC
November 2014
Creating a Cloud Security Policy
©2014 LinkedIn Corporation. All Rights Reserved.
About LinkedIn
Our mission is to connect the world’s
professionals to make them more
productive and successful
LinkedIn currently has over 332 million
members worldwide
Over 6,000 full-time employees in 30
cities worldwide
©2014 LinkedIn Corporation. All Rights Reserved.
New Security Challenges
New enterprise applications can be bought
with a corporate card, no need for
procurement cycles
Corporate data is now unmanaged
Corporate security is still expected to provide
Confidentiality, Integrity, and Availability
IT can’t control what
applications
employees use, but
we can make the
approved apps more
attractive than the
alternatives
©2014 LinkedIn Corporation. All Rights Reserved.
Proposal to Create A Policy
Existing policy not enforceable
Not scalable to new cloud business needs
Made executive management aware of shortcomings
Develop plans to identify and resolve gaps
©2014 LinkedIn Corporation. All Rights Reserved.
Policy Timeline
Q4 ‘13 Q1 ‘14 Q2 ‘14 Q3 ‘14 Q4 ‘14 Q1 ‘15
Review of New Applications
Existing Application Gap Analysis
Policy Initial Release
Solution POC
Vendor Selection
Solution Deployment
Vendor Demos
Policy Review 12 Month Review
Security Assurance
Corporate IT
Policy Authoring Team
©2014 LinkedIn Corporation. All Rights Reserved.
Resourcing
Cloud
Security
Incident
Response
IT App
Owner
Security Corp IT
Director, Security Director,
IT
VP, Security
VP,
Engineering
Legal
Review
HR
Review
PMO
Support
©2014 LinkedIn Corporation. All Rights Reserved.
AUTHORING THE POLICY
©2014 LinkedIn Corporation. All Rights Reserved.
10,000 Foot Strategy
©2014 LinkedIn Corporation. All Rights Reserved.
Sample Data Types
Resources: US NIST FIPS 199, NIST 800-60 Vol. 2
Customer Company Personal
Limited Potential impact of release is limited
Confidential Potential impact of release is serious
Highly
Confidential
Potential impact of release is severe
©2014 LinkedIn Corporation. All Rights Reserved.
Level Mapping
A tiered approach enables the creation of security controls that are
appropriate for the types of content handled
Consider the most restrictive requirements for each level
Some content may not be allowed onto the cloud
Define “Cloud” for your organization
ComplexityRisk
Level 1
Level 2
Level 3
DurationEffort
©2014 LinkedIn Corporation. All Rights Reserved.
Sample Assurance Levels
Level 1 Data Classification
Applications that handle data in the following categories are classified as Level 1
Personal Limited
Company Limited
Level 2 Data Classification
Applications that handle data in the following categories are classified as Level 2
Personal Confidential
Company Confidential
Customer Confidential
Level 3 Data Classification
Applications that handle data in the following categories are classified as Level 3
Personal Highly Confidential
Company Highly Confidential
Customer Highly Confidential
Not Classified
We do not have any data in the following categories
Customer Limited
*These levels are not representative of LinkedIn policy
©2014 LinkedIn Corporation. All Rights Reserved.
Identify controls for Data Types
CSA Security Guidelines
PCI-DSS v3.0
AWS Security Whitepaper Google Security Whitepaper
NIST SP 800-61
©2014 LinkedIn Corporation. All Rights Reserved.
Get From Here to There
Domain 2: Governance and Enterprise Risk
Domain 3: Legal Issues: Contracts and Electronic Discovery
Domain 4: Compliance and Audit Management
Domain 6: Interoperability and Portability
Domain 7: Traditional Security, Business Continuity, & Disaster Recovery
Domain 8: Data Center Operations
Domain 9: Incident Response
Domain 10: Application Security
We focused on using the following domains to create categories important to LinkedIn.
Authentication & Administration
Auditing
Business Continuity
Data Security
Communication Security
Vendor Governance
Brand Reputation
©2014 LinkedIn Corporation. All Rights Reserved.
Structure of a Domain
5. Communication Security
Network Security Testing
Application Security Testing
Thick-Client or Physical Appliance Security
Mobile Client Security
Transport Layer Protection
Data Loss Prevention
3rd Party Application Interoperability
Storage at Rest
Virtualization
PCI-DSS 2.2.1
AWS Whitepaper
Google Security
Whitepaper
LinkedIn Security
Standards
CSA 10.6.3
CSA 10.1.3
CSA 5.6.5
PCI-DSS 11.3
©2014 LinkedIn Corporation. All Rights Reserved.
Structure of a Control
ISC2
PCI
2.2.1
CSA
13.1.8
©2014 LinkedIn Corporation. All Rights Reserved.
Policy Challenges - OAuth
When reviewing applications, consider 3rd party integrations
What applications are people using?
What permissions do those applications have?
How will you whitelist or blacklist apps?
©2014 LinkedIn Corporation. All Rights Reserved.
More Policy Challenges
Off Site Backups
Key Management
Drive Destruction
David Gard/Star Ledger/Corbis
©2014 LinkedIn Corporation. All Rights Reserved.
SSO Integration Classes
Class 0: Saved Password
Class 1: SSO, with Username / Password Backdoor
Class 2: SSO Access Only
Class 3: SSO Access Only, with automatic
account deprovisioning
©2014 LinkedIn Corporation. All Rights Reserved.
PRESENTING THE POLICY
©2014 LinkedIn Corporation. All Rights Reserved.
Execution
Business Owner
Corporate IT
New Projects Team
Corporate IT Support
Security Assurance
Legal / Procurement
Identify
New
Solution
Review
Define Support
Pilot
Contract Negotiation
Validate Production
Develop Production Req’s
Deployment PM Support
©2014 LinkedIn Corporation. All Rights Reserved.
Understanding your Audience
Employees / End-Users
Incident Response Teams
Application Support Teams
Security Assurance Team
Legal
©2014 LinkedIn Corporation. All Rights Reserved.
End Users - Service Catalog
Employees want to know where they can store their data, and how to
access those tools when they need them
©2014 LinkedIn Corporation. All Rights Reserved.
CSIRT Teams
Incident Response Teams need access to application assignment,
ownership, and data type information quickly. They do not need configuration
information
©2014 LinkedIn Corporation. All Rights Reserved.
Application Support Teams
Application Support teams need to know
how to recover applications quickly if there is
a SSO platform failure, and who to contact
during an outage
©2014 LinkedIn Corporation. All Rights Reserved.
Assurance Team - Worksheets
Assurance teams need tools to quickly
evaluate new applications
©2014 LinkedIn Corporation. All Rights Reserved.
Legal Documentation
Part of our security controls are enforced
through legal documents. Streamline this
by adding requirements into the MSA
This means defining terminology
throughout the policy and documentation
and being specific
Help your legal team by making a
playbook and offering flexibility
©2014 LinkedIn Corporation. All Rights Reserved.
LESSONS LEARNED
©2014 LinkedIn Corporation. All Rights Reserved.
Cloud Security Solutions
©2014 LinkedIn Corporation. All Rights Reserved.
Gap Analysis
Priority Control Type
1 Platform Usage and Incident Response Security and Operational
2 Content Inspection and Compliance Security
3 Administration and Automation Operational
4 Availability and Performance Monitoring Operational
5 Content Encryption Security
6 Application Inventory Process Security and Operational
©2014 LinkedIn Corporation. All Rights Reserved.
Policy Review and Feedback
Our data model was too limiting, had to soften Level 2 applications
Level 3 applications are very challenging, but we haven’t done enough to
fully evaluate
A more hands-on approach was needed to guide
customers through the process
The review process is ongoing & will transition to annual
©2014 LinkedIn Corporation. All Rights Reserved.
Variance Process
Considering the variance process at the outset will reduce the likelihood that
you’re caught needing to push an app through unprepared
Capture the compensating controls used for your next policy review
When reviewing existing applications, track what are existing risks versus
new risks
©2014 LinkedIn Corporation. All Rights Reserved.
Takeaways
Start with a top-down approach and understand your data model
The Cloud Security App space is very young. IAM is a quick win, followed by
monitoring, but your requirements may be different
Be flexible, this isn’t an HR policy – the business can and will roll over you.
Make the process easy, and the corporate-supported apps easier
©2014 LinkedIn Corporation. All Rights Reserved.©2014 LinkedIn Corporation. All Rights Reserved.©2014 LinkedIn Corporation. All Rights Reserved.

Más contenido relacionado

La actualidad más candente

Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015RAVI PRAKASH
 
Getting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSGetting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSSoftchoice Corporation
 
10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app control10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app controlAneel Mitra
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutionsijccsa
 
Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Perficient, Inc.
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your OrganizationRaffa Learning Community
 
EveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceEveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidencePaul Richards
 
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...Microsoft Österreich
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIOSR Journals
 
Packt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementPackt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementGluu
 
DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017
DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017
DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017Activo Consulting
 
Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm IJECEIAES
 
McMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy PaperMcMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy PaperMatthew J McMahon
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloudkairostech
 
Cloud service providers in pune
Cloud service providers in puneCloud service providers in pune
Cloud service providers in puneAnshita Dixit
 
Research challenges and issues in web security
Research challenges and issues in web securityResearch challenges and issues in web security
Research challenges and issues in web securityIAEME Publication
 
Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New BlockSean Dickson
 

La actualidad más candente (19)

Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015Beyond Security Article_Cyber Security_April_2015
Beyond Security Article_Cyber Security_April_2015
 
Getting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMSGetting secure in a mobile-first world with EMS
Getting secure in a mobile-first world with EMS
 
10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app control10 alternatives to heavy handed cloud app control
10 alternatives to heavy handed cloud app control
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
 
Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work Utilizing Microsoft 365 Security for Remote Work
Utilizing Microsoft 365 Security for Remote Work
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
EveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceEveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidence
 
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
 
Packt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementPackt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access management
 
DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017
DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017
DALIM SOFTWARE GmbH Keynote TechLab DAM NY 2017
 
Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm
 
McMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy PaperMcMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy Paper
 
SECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKESSECURING THE CLOUD DATA LAKES
SECURING THE CLOUD DATA LAKES
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud
 
Cloud service providers in pune
Cloud service providers in puneCloud service providers in pune
Cloud service providers in pune
 
Research challenges and issues in web security
Research challenges and issues in web securityResearch challenges and issues in web security
Research challenges and issues in web security
 
Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New Block
 

Similar a LinkedIn - Creating a Cloud Security Policy

Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Group of company MUK
 
CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCipherCloud
 
Securing The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StorySecuring The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StoryCloudLock
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Oddscentralohioissa
 
The Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security BreachThe Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security BreachCloudLock
 
Cloud cpr uncc cloud computing conference 2013
Cloud cpr   uncc cloud computing conference 2013Cloud cpr   uncc cloud computing conference 2013
Cloud cpr uncc cloud computing conference 2013C5_LUCK
 
3 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 20153 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 2015ObserveIT
 
Cloud - Everyone is doing it, But is it safe?
Cloud - Everyone is doing it, But is it safe?Cloud - Everyone is doing it, But is it safe?
Cloud - Everyone is doing it, But is it safe?Jean-Marie Abi-Ghanem
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Securing the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicySecuring the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicyAllot Communications
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use CasesNetskope
 
4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint Governance4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint GovernanceImperva
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure
 
How is Your AppSec Program Doing Compared to Others
How is Your AppSec Program Doing Compared to OthersHow is Your AppSec Program Doing Compared to Others
How is Your AppSec Program Doing Compared to OthersDenim Group
 

Similar a LinkedIn - Creating a Cloud Security Policy (20)

Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint
 
CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud Adoption
 
Securing The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's StorySecuring The Reality of Multiple Cloud Apps: Pandora's Story
Securing The Reality of Multiple Cloud Apps: Pandora's Story
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
 
The Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security BreachThe Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security Breach
 
Cloud cpr uncc cloud computing conference 2013
Cloud cpr   uncc cloud computing conference 2013Cloud cpr   uncc cloud computing conference 2013
Cloud cpr uncc cloud computing conference 2013
 
3 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 20153 Tips for Managing Risky User Activity in 2015
3 Tips for Managing Risky User Activity in 2015
 
Cloud - Everyone is doing it, But is it safe?
Cloud - Everyone is doing it, But is it safe?Cloud - Everyone is doing it, But is it safe?
Cloud - Everyone is doing it, But is it safe?
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Developing Secure Apps
Developing Secure AppsDeveloping Secure Apps
Developing Secure Apps
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Securing the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicySecuring the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use Policy
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases
 
4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint Governance4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint Governance
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
 
How is Your AppSec Program Doing Compared to Others
How is Your AppSec Program Doing Compared to OthersHow is Your AppSec Program Doing Compared to Others
How is Your AppSec Program Doing Compared to Others
 

Último

20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptxAsmae Rabhi
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxgalaxypingy
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoilmeghakumariji156
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 

Último (20)

20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 

LinkedIn - Creating a Cloud Security Policy

  • 1. ©2014 LinkedIn Corporation. All Rights Reserved. Chris Niggel, CISSP CCSK Charles Nwatu, GSLC November 2014 Creating a Cloud Security Policy
  • 2. ©2014 LinkedIn Corporation. All Rights Reserved. About LinkedIn Our mission is to connect the world’s professionals to make them more productive and successful LinkedIn currently has over 332 million members worldwide Over 6,000 full-time employees in 30 cities worldwide
  • 3. ©2014 LinkedIn Corporation. All Rights Reserved. New Security Challenges New enterprise applications can be bought with a corporate card, no need for procurement cycles Corporate data is now unmanaged Corporate security is still expected to provide Confidentiality, Integrity, and Availability IT can’t control what applications employees use, but we can make the approved apps more attractive than the alternatives
  • 4. ©2014 LinkedIn Corporation. All Rights Reserved. Proposal to Create A Policy Existing policy not enforceable Not scalable to new cloud business needs Made executive management aware of shortcomings Develop plans to identify and resolve gaps
  • 5. ©2014 LinkedIn Corporation. All Rights Reserved. Policy Timeline Q4 ‘13 Q1 ‘14 Q2 ‘14 Q3 ‘14 Q4 ‘14 Q1 ‘15 Review of New Applications Existing Application Gap Analysis Policy Initial Release Solution POC Vendor Selection Solution Deployment Vendor Demos Policy Review 12 Month Review Security Assurance Corporate IT Policy Authoring Team
  • 6. ©2014 LinkedIn Corporation. All Rights Reserved. Resourcing Cloud Security Incident Response IT App Owner Security Corp IT Director, Security Director, IT VP, Security VP, Engineering Legal Review HR Review PMO Support
  • 7. ©2014 LinkedIn Corporation. All Rights Reserved. AUTHORING THE POLICY
  • 8. ©2014 LinkedIn Corporation. All Rights Reserved. 10,000 Foot Strategy
  • 9. ©2014 LinkedIn Corporation. All Rights Reserved. Sample Data Types Resources: US NIST FIPS 199, NIST 800-60 Vol. 2 Customer Company Personal Limited Potential impact of release is limited Confidential Potential impact of release is serious Highly Confidential Potential impact of release is severe
  • 10. ©2014 LinkedIn Corporation. All Rights Reserved. Level Mapping A tiered approach enables the creation of security controls that are appropriate for the types of content handled Consider the most restrictive requirements for each level Some content may not be allowed onto the cloud Define “Cloud” for your organization ComplexityRisk Level 1 Level 2 Level 3 DurationEffort
  • 11. ©2014 LinkedIn Corporation. All Rights Reserved. Sample Assurance Levels Level 1 Data Classification Applications that handle data in the following categories are classified as Level 1 Personal Limited Company Limited Level 2 Data Classification Applications that handle data in the following categories are classified as Level 2 Personal Confidential Company Confidential Customer Confidential Level 3 Data Classification Applications that handle data in the following categories are classified as Level 3 Personal Highly Confidential Company Highly Confidential Customer Highly Confidential Not Classified We do not have any data in the following categories Customer Limited *These levels are not representative of LinkedIn policy
  • 12. ©2014 LinkedIn Corporation. All Rights Reserved. Identify controls for Data Types CSA Security Guidelines PCI-DSS v3.0 AWS Security Whitepaper Google Security Whitepaper NIST SP 800-61
  • 13. ©2014 LinkedIn Corporation. All Rights Reserved. Get From Here to There Domain 2: Governance and Enterprise Risk Domain 3: Legal Issues: Contracts and Electronic Discovery Domain 4: Compliance and Audit Management Domain 6: Interoperability and Portability Domain 7: Traditional Security, Business Continuity, & Disaster Recovery Domain 8: Data Center Operations Domain 9: Incident Response Domain 10: Application Security We focused on using the following domains to create categories important to LinkedIn. Authentication & Administration Auditing Business Continuity Data Security Communication Security Vendor Governance Brand Reputation
  • 14. ©2014 LinkedIn Corporation. All Rights Reserved. Structure of a Domain 5. Communication Security Network Security Testing Application Security Testing Thick-Client or Physical Appliance Security Mobile Client Security Transport Layer Protection Data Loss Prevention 3rd Party Application Interoperability Storage at Rest Virtualization PCI-DSS 2.2.1 AWS Whitepaper Google Security Whitepaper LinkedIn Security Standards CSA 10.6.3 CSA 10.1.3 CSA 5.6.5 PCI-DSS 11.3
  • 15. ©2014 LinkedIn Corporation. All Rights Reserved. Structure of a Control ISC2 PCI 2.2.1 CSA 13.1.8
  • 16. ©2014 LinkedIn Corporation. All Rights Reserved. Policy Challenges - OAuth When reviewing applications, consider 3rd party integrations What applications are people using? What permissions do those applications have? How will you whitelist or blacklist apps?
  • 17. ©2014 LinkedIn Corporation. All Rights Reserved. More Policy Challenges Off Site Backups Key Management Drive Destruction David Gard/Star Ledger/Corbis
  • 18. ©2014 LinkedIn Corporation. All Rights Reserved. SSO Integration Classes Class 0: Saved Password Class 1: SSO, with Username / Password Backdoor Class 2: SSO Access Only Class 3: SSO Access Only, with automatic account deprovisioning
  • 19. ©2014 LinkedIn Corporation. All Rights Reserved. PRESENTING THE POLICY
  • 20. ©2014 LinkedIn Corporation. All Rights Reserved. Execution Business Owner Corporate IT New Projects Team Corporate IT Support Security Assurance Legal / Procurement Identify New Solution Review Define Support Pilot Contract Negotiation Validate Production Develop Production Req’s Deployment PM Support
  • 21. ©2014 LinkedIn Corporation. All Rights Reserved. Understanding your Audience Employees / End-Users Incident Response Teams Application Support Teams Security Assurance Team Legal
  • 22. ©2014 LinkedIn Corporation. All Rights Reserved. End Users - Service Catalog Employees want to know where they can store their data, and how to access those tools when they need them
  • 23. ©2014 LinkedIn Corporation. All Rights Reserved. CSIRT Teams Incident Response Teams need access to application assignment, ownership, and data type information quickly. They do not need configuration information
  • 24. ©2014 LinkedIn Corporation. All Rights Reserved. Application Support Teams Application Support teams need to know how to recover applications quickly if there is a SSO platform failure, and who to contact during an outage
  • 25. ©2014 LinkedIn Corporation. All Rights Reserved. Assurance Team - Worksheets Assurance teams need tools to quickly evaluate new applications
  • 26. ©2014 LinkedIn Corporation. All Rights Reserved. Legal Documentation Part of our security controls are enforced through legal documents. Streamline this by adding requirements into the MSA This means defining terminology throughout the policy and documentation and being specific Help your legal team by making a playbook and offering flexibility
  • 27. ©2014 LinkedIn Corporation. All Rights Reserved. LESSONS LEARNED
  • 28. ©2014 LinkedIn Corporation. All Rights Reserved. Cloud Security Solutions
  • 29. ©2014 LinkedIn Corporation. All Rights Reserved. Gap Analysis Priority Control Type 1 Platform Usage and Incident Response Security and Operational 2 Content Inspection and Compliance Security 3 Administration and Automation Operational 4 Availability and Performance Monitoring Operational 5 Content Encryption Security 6 Application Inventory Process Security and Operational
  • 30. ©2014 LinkedIn Corporation. All Rights Reserved. Policy Review and Feedback Our data model was too limiting, had to soften Level 2 applications Level 3 applications are very challenging, but we haven’t done enough to fully evaluate A more hands-on approach was needed to guide customers through the process The review process is ongoing & will transition to annual
  • 31. ©2014 LinkedIn Corporation. All Rights Reserved. Variance Process Considering the variance process at the outset will reduce the likelihood that you’re caught needing to push an app through unprepared Capture the compensating controls used for your next policy review When reviewing existing applications, track what are existing risks versus new risks
  • 32. ©2014 LinkedIn Corporation. All Rights Reserved. Takeaways Start with a top-down approach and understand your data model The Cloud Security App space is very young. IAM is a quick win, followed by monitoring, but your requirements may be different Be flexible, this isn’t an HR policy – the business can and will roll over you. Make the process easy, and the corporate-supported apps easier
  • 33. ©2014 LinkedIn Corporation. All Rights Reserved.©2014 LinkedIn Corporation. All Rights Reserved.©2014 LinkedIn Corporation. All Rights Reserved.

Notas del editor

  1. s.