19 February 2012

UNDERSTANDING CLOUD SECURITY: FINDING THE BOUNDARIES...

Google
It seems that my previous post on compliance and third parties struck a chord with a few of you... So I guess it’s about time I dedicated some time to “The Cloud” specifically! Over the past couple of years, we have seen a lot of hype and confusion as to what The Cloud really means and what it can do for you. I think we have now reached the stage where there is perhaps a bit of disappointment that The Cloud, due to inflated expectations, is perhaps not a miracle...
Undeniably, the key opportunity for service providers is to differentiate themselves by becoming cloud service providers and major efforts are still being invested to attain a recognised position in the new clouds. The key issues for businesses when determining cloud adoption still revolve around security and control, capacity or scale flexibility and availability of skilled workforce.
Evidently, there are a lot of exciting opportunities in the Cloud, where organisations can see the potential to reduce capital costs and become more agile by divesting themselves of infrastructure and application management to concentrate on their core competencies. As with any technology, it creates risks as well as opportunities. In some cases, moving to the cloud provides an opportunity to re-architect older applications and infrastructure to meet or exceed modern security requirements. At other times, the risk of moving sensitive data and applications to an emerging infrastructure might exceed tolerance levels.
The fact remains: Cloud Computing isn’t necessarily more or less secure than your current environment. Unfortunately, misconceptions still abound, not only about what The Cloud really is but also about security in The Cloud. I guess the limitations on cloud computing growth will include issues of data custody, control, security, privacy, and jurisdiction and portability standards as highlighted on my previous post on EU Data Protection Laws. Adopting cloud computing is a complex decision that will involve many factors, including not only desktop applications, e-mail, collaboration and enterprise resource planning but potentially any application and the infrastructure they require. It is therefore not surprising that enterprises are grappling with the dichotomy of how to lose control gracefully whilst maintaining accountability when operational responsibilities for handling and securing their assets rests with one or more third parties.
At this point, I have to thank the Cloud Security Alliance for their tireless efforts in promoting best practice for not only securing the cloud but also all other forms of computing. Today’s post attempts to provide some definitions and takes its inspiration from their Cloud Security Alliance: Security Guidance for Critical Areas of Focus in Cloud Computing v3.0 (November 2011)
One of the fundamental considerations when trying to assess cloud computing security risks is understanding the relationship between Cloud Service Models, commonly referred to as SPI (Software as a Service, Platform as a Service, Infrastructure as a Service) as defined by NIST:
IaaS is the foundation of all cloud services, and is the lowest level infrastructure resource stack. It gives the capability, if required, to abstract resources and provides physical and logical connectivity to those resources as well as a set of APIs which allows “consumers” to interact with the infrastructure.
PaaS builds on IaaS and provides an additional integration layer with application development frameworks, middleware, programming languages and tools supported by the stack as well as functions allowing developers to build applications on the platform.
SaaS in turn builds on PaaS and is a self-contained operating environment to deliver the entire user experience.
The key consideration for security is that the lower down the stack the cloud service provider stops, the more organisations will be responsible themselves for managing and implementing security for their assets, as summarised by the figure below:


This means that organisations should adopt a risk-based approach when considering moving assets to the cloud. This will involve risk assessments and some elements of threat scenario modelling:
  • What enterprise asset (data or applications/ functions/ processes) is being considered for a potential move to the Cloud and how sensitive is that asset?
  • What would be the impact of the asset being made public?
  • What would be the impact of the asset being changed unexpectedly?
  • What would be the impact of the asset being unavailable?
  • What would be the impact of cloud service provider employee accessing the asset?
  • What would be the impact of a process or function being manipulated by an outsider?
  • What would be the impact of a process or function failing to provide the expected results?
In other words, the first step in determining a Cloud migration “posture” is to categorise and evaluate the asset for confidentiality, integrity and availability and how these will be affected if the asset is handled in the cloud. And finally, it would be remiss of me not to mention that when it comes to cardholder information related assets (either cardholder data or payment applications) or other personally identifiable information (PII), the process is the same, and the PCI DSS controls fit neatly with the security control model to be applied to a cloud model.
My next post will look at how cloud deployment models and location will affect security considerations and hopefully give you some tips on contractual matters. In the meantime, you can also read this very interesting article from The Metropolitan Corporate Counsel.
Until next time...

7 comments:

  1. Hi Neira - Just thought I'd mention that NAVIGATING THROUGH THE CLOUD is a registered trademark of my organisation. Regards Rob Livingstone ( http://www.navigatingthroughthecloud.com/ )

    ReplyDelete
  2. Hi Rob, many thanks for letting me know. Great website!
    Kind regards,
    Neira

    ReplyDelete
  3. No Problem - Also, happy to collaborate in any way that you think may be of value. I'm absolutely vendor agnostic, technology independent and my mission is to help everyone avoid crashing into the metaphorical mountain as they hurtle through the clouds, so to speak. My approach is to challenge perceptions, opinions and assumptions to help others become better self-informed, then sensible commercial decisions get made! Also, I Love your writings - clear, no nonsense and just like a cruise missile - bang on target! Feel free to keep in touch All the best, Rob

    ReplyDelete
  4. so you might even be able to save money and get more cleaning coverage by having someone come in once a week instead of monthly. security system provider

    ReplyDelete
  5. Remarkable article, it is particularly useful! I quietly began in this, and I'm becoming more acquainted with it better! Delights, keep doing more and extra impressive! cassaforte ufficio

    ReplyDelete
  6. Most users perceive a web hosting provider as a company who offers server space, bandwidth and maximum uptime for websites. This is basically due to the lack of necessary knowledge or may be due to lack of research. Actually,there are many more responsibilities that a web hosting company needs to play on a day to day basis. And, a web host who successfully fulfills all these responsibilities is awarded as The Best Web Hosting. wordpress hosting

    ReplyDelete