21
1 Analysing the Current Data Protection Legal Framework: challenges and ways forward Privacy policies for the cloud Prof David Wallom

Privacy and Security policies in the cloud

Embed Size (px)

Citation preview

Page 1: Privacy and Security policies in the cloud

1

Analysing the Current Data Protection Legal Framework: challenges and ways forwardPrivacy policies for the cloud Prof David Wallom

Page 2: Privacy and Security policies in the cloud

2

Overview

• Worried? should you be?• Its all about trust• Bolster trust or make it so we don’t need it…

Page 3: Privacy and Security policies in the cloud

3

Why all this worry?

Page 4: Privacy and Security policies in the cloud

4

Why all this worry?

– Cloud computing is pervasive in modern society

Page 5: Privacy and Security policies in the cloud

5

Cats, Kids and fun…

Page 6: Privacy and Security policies in the cloud

6

Its not just all about cats and kids…

Page 7: Privacy and Security policies in the cloud

7

Page 8: Privacy and Security policies in the cloud

8

Why all this worry?

– Cloud computing is pervasive in modern society– Limited market penetration from EU cloud provider -> vast majority of cloud providers based outside EU

Page 9: Privacy and Security policies in the cloud

9

Who are the cloud providers?

Page 10: Privacy and Security policies in the cloud

10

Why all this worry?

– Cloud computing is pervasive in modern society– Limited market penetration from EU cloud provider -> vast majority of cloud providers based outside EU– Pace of service development and nefarious capability outstrips that of the regulatory environment

Page 11: Privacy and Security policies in the cloud

11

What should you think about when…

Who are you entering into a contract with?What protections does your contract give you?Who can make changes to the T&C?Where is the data?On whom is the liability?

Page 12: Privacy and Security policies in the cloud

12

7 Cloud Computing security risks

Page 13: Privacy and Security policies in the cloud

13

Trust at the Last Mile

• Problem for high value instantly usable data and services– Critical data or keys are still exposed inside the cloud at the final steps– Still require customers unconditional trust of their CSP

Page 14: Privacy and Security policies in the cloud

14

“What is really going on inside the cloud?”

Page 15: Privacy and Security policies in the cloud

15

Building trust through brands

Page 16: Privacy and Security policies in the cloud

16

New Industries Around Security and Trust

Page 17: Privacy and Security policies in the cloud

17

Building trust through regulation

Page 18: Privacy and Security policies in the cloud

18

United Kingdom: G-Cloud

Approach: Government procurement framework

Highlights:• Based on ISO 27001• Most data is “official”• Reusable certification

Australia:InfoSecurity Manual

United States:FedRAMP

European Union:ENISA CCSL and CCSMApproach: Procurement guidance

Highlights:• Maps certification

regimes relevant to cloud customers

Notable strength:• Flexible

Notable strength:• Standards-based

Notable strength:• Transparent

Notable strength:• Risk-based

Public sector approaches to cloud security

Approach: Government procurement framework

Highlights:• Based on NIST 800-

53v4• Moderate and High

baseline controls

Approach: Government procurement guidance

Highlights:• Risk-based approach

encouraged• 5 control levels

Trustworthy Cloud Principles

Page 19: Privacy and Security policies in the cloud

19

Over-regulation can stifle innovation

Page 20: Privacy and Security policies in the cloud

20

Conclusions from a recent workshop on Cloud Security and certification

• Trust and security are key to the successful adoption of cloud computing and its ability to drive European economic expansion, 

• Urgently gain clarity in the implementation of newly introduced regulatory regimes• Promote the use of existing certification schemes and standards • Raise awareness of cloud security and ensure understanding of what cloud security means• Support the Free Flow of Data

Page 21: Privacy and Security policies in the cloud

21

To end…

• Recommendations for Future Policy Action– What does cloud mean? – automation– What would destroy cloud – over regulation and interruptions in automated interactions– Flexibility to allow innovative services to develop– Where possible use open standards and approaches more generally to allow transparency

• Technology solutions including the unification of trusted and cloud computing may break the need to trust you provider

– May end up with no-one able to see inside though…