SlideShare a Scribd company logo
Cloud Computing -
understanding security risk
and management
The aim of this paper is to make cloud service consumer aware about cloud
computing fundamentals, its essential services, service models and
deployment options. This also through light on security and risk
management piece of CSA trusted cloud reference architecture, cloud
control matrix and notorious nine threats and ENISAs top risks to cloud
computing. At the end it talks about certifications and attestation part.
Author –
Shamsundar
Machale (CISSP)
Fig.1 NIST Visual Model of Cloud Computing Definition
Any cloud should demonstrate the certain essential characteristics to
get full benefits of cloud. Any missing essential characteristic would
not give you 100% benefit from cloud computing.
Whatever is not your core, outsource it. Similarly maintaining capex IT
infrastructure, information is not your core so outsource it to some
specialized agency i.e. Cloud Service Provider (CSP)
Multi-tenancy is the fundamental used in resource pooling but keep in
mind that resource pooling is not limited to your server and storage, it
is extended to network connectivity, physical security, administration
of cloud services and last but not least is your facility space. CSP uses
the same infrastructure to provide services to multiple clients from
same or different geographies. This provides great benefit to Cloud
consumer (CC) by not having direct capital investment and pay per use
model of cloud. Only required amount of compute, storage etc. are
provisioned and no extra investment is done by CC. At the same time
resource pooling might become huge risk if attacker uses shared
pooled resource to steal sensitive information processed by CC. this is
possible through attacks such as guest hopping attack or side channel
attack to capture cryptographic keys.
Second essential characteristic is on-demand self-service. The CC
should be able to do the provisioning / de-provisioning of computing
What is definition of Cloud
Computing?
Cloud computing is model for
enabling continent, on-demand
network access to a shared pool
of configuration computing
resources (e.g. networks,
servers, storage, applications,
and services) that can be rapidly
provisioned and released with
minimal management efforts or
services provider interaction
The above NIST definition
defines in what way you can
deploy cloud, what service
offerings you can make available
and what are the essential
characteristics of cloud
Fig. 1 represents the visual
model of above NIST cloud
computing definition.
Let’s take a deeper look into the
definition.
resources by themselves with minimum administrative involvement from CSP. The lead time required
doing the provisioning and de-provisioning should be reduced significantly.
Rapid elasticity means CC should be able to do expansion and contraction of services as per their
requirements with immediate effect and it will be charged on pay per usages policy. There should not be
any locking CSP side while reducing the required level of resources.
As there is trend of BYOD and consumerization, people want to access applications locations and end
device independent which essentially means there should not be any restriction on your work location,
it can be work from office, home or cafe and how do you access it, is it through your desktop, laptop,
smartphone or tablet.
Lastly CC should be able to measure services offered by CSP through SLA.
Let’s take a look at service offering models; there are typically three kind of service offering models as
below
IaaS (Infrastructure as a Service) – Here you will get only infrastructure like compute and storage. This is
nothing but plain vanilla virtual machine with operating system e.g. Amazon EC2 and S3, Rackspace etc.
PaaS (Platform as a Service) – Here you expect little bit more from CP which will help in development of
applications on provided infrastructure. It includes development tools, configuration management and
deployment platforms such as Microsoft Azure, Force and Google App engine.
SaaS (Software as a Service) – this is full package of application, CC has to just use it and don’t worry
how and where it is running, who is managing the show? It is pure service such as online CRM system
(Salesforce.com), online office tools (Office 365), online content filtering and messaging etc.
As you move from IaaS to SaaS CC loses control on the services whereas CSP gains more control which is
depicted in below figure.
Fig-2
Now we will look at third tier of cloud computing definition which is nothing but deployment options. As
you seen in the above visual model there are four ways in which cloud services can be deployed.
Public Cloud – Available publicly, multiple customers can avail same services with different SLA
commitments
Private Cloud – Build specifically for single customer and available to only one customer
Community Cloud – Services can be offered to same of customers which are forming community such as
cloud services for power generation companies, cloud services for manufacturing industry etc.
Hybrid Cloud – Combination of any of the above
Below table provides more information about the deployment models
Fig.3
As mentioned above security of cloud services is joint responsibility
of CC and CSP which purely depends on the service offering.
As per CSA’s “ Trusted cloud Reference Architecture version 2.0 “,
Security and Risk Management is one of the key building block to
focus if you want to build trusted cloud
Fig.4 CSA Trusted cloud security reference arcthitecture
This block basically talks about below domains.
Governance Risk and Compliance - how are you going to manage
governance, risk, audit, vendor, policy and awareness around CSP
support staff?
InfoSec Management – capability management, risk portfolio, risk
dashboard, and residual risk management
Privilege Management Infrastructure – This purely focuses around
how effectively you manage the identities in the cloud. How secure
is your authentication service? How do you manage authorization
and accountability of identities in the cloud? How privilege identities
are handled?
Threat and Vulnerability Management - How do you keep
environment vulnerability free, up to date with latest patches and
assurance on compliance testing to CC.
What is Security for Cloud
Computing?
As per CSA, Security
controls in cloud
computing are, for the
most part, no different
than security controls in
any IT environment.
However, because of the
cloud service models
employed, the operational
models, and the
technologies used to
enable cloud services,
cloud computing may
present different risks to
an organization than
traditional IT solutions.
This means we have to
focus on defense in depth
approach for security in
cloud computing
The focus of defense in
depth approach is always a
data at center and
different type of controls
such as Administrative,
Technical and Physical are
wrapped around data.
For example physical
security has the same
importance in both
traditional data center and
cloud based datacenter.
Infrastructure Protection Services - How do you protect your applications, operating systems on
servers, databases, network and end points. What kind of technical controls are put around these? Do
you have perimeter firewall at network level, whether servers are locked down as per hardening
guidelines, do you have Anti-virus, HIPS / HIDS installed at the end points, logging and monitoring
enabled, application level firewall and web content filtering
Data Protection – how well are you managing the data lifecycle, what controls are placed to prevent the
Data loss, how are you protecting your intellectual properties and how effective is your cryptographic
service management.
Policies and Standards – Have you defined information security policies, guidelines based on different
industry standards like ISO 27001. Whether operational security baseline and standard operating
procedures defined and followed within the organization. Whether asset / data classification guidelines
are defined and practiced within team.
CSA has defined the Cloud Controls Matrix which provides fundamental security principles to guide
cloud vendors and to assist cloud customers in assessing the overall security risk of a cloud provider. The
latest version of Cloud Controls Matrix is CCM v3.0.1
As per this control matrix there are 133 controls divided into 16 domains of CSA cloud security.
Fig.5 CCMv3.0.2 Domains
Risk Management is one of the important aspect of cloud computing. There is no different strategy for
management of risk in the cloud. You have to follow the conventional approach of performing the risk
assessment based on certain framework and management of these risk either through risk mitigation by
use of certain controls, transfer, avoid or accept the risk. As per ENISA’s “ Cloud Computing Benefits,
risks and recommendations for information security Rev.B-2012 ” document cloud risks are classified
into three categories “Policy and Organizational Risks”, “Technical Risks”, and “Legal Risks”
Below figure represents the top rated risk identified by ENISA based on the probability and impact of the
risk.
Fig.6 ENISA top security risks to cloud computing
If you refer to below table which list down “ The Notorious Nine – Cloud Computing Top Threats in
2013” you will find certain risk / threats are common in both the documents such as Malicious Insider /
Cloud Provider Malicious Insider, shared technology issue / isolation failure, insecure APIs /
Management interface compromise
Fig.7 – Notorious Nine Threats to Cloud Computing
Data Breaches Data Loss
Account
Hijacking
Insecure APIs
Denial of
Service
Malicious
Insiders
Abuse of
Cloud Services
Insufficient
Due Diligence
Shared
Technology
Issues
Security Certification and Attestations – CSPcan provide the assurance to CC on current compliance level
with respect to different standards, legal and regulatory requirements through certain security
certifications and attestations.
Below figure provides the security certifications obtained by different CSPs. This is just a reference and
CC is kidnly reuquested to obtain list of current certifications during evaluation of CSP
Fig.8 – Security Certifications and Attestations
Conclusion - Cloud computing is double edged sword which provides good amount of
benefits but only if implemented properly considering all security, governance, privacy and
legal requirements. Risk assessment and due diligence would be the key for cloud
consumers to make their case as success story.
References –
“CSA Trusted cloud Reference Architecture version 2.0”
“CSA Cloud Controls Matrix, CCM v3.0.1”
“The Notorious Nine – Cloud Computing Top Threats in 2013”
ENISA’s “Cloud Computing Benefits, risks and recommendations for information security Rev.B-2012”
The Forrester Wave™: Public Cloud Platform Service Providers’ Security, Q4 2014
END OF DOCUMENT

More Related Content

PDF
Cloud Computing Risk Management (Multi Venue)
Brian K. Dickard
 
PDF
Cloud computing security
Antonio Sanz Alcober
 
PPTX
Cloud computing and its security issues
Jyoti Srivastava
 
PDF
Cloud Security - Security Aspects of Cloud Computing
Jim Geovedi
 
PDF
What is SASE
Adi Ruppin
 
PPTX
Cloud security and security architecture
Vladimir Jirasek
 
PPTX
Cloud computing and Cloud security fundamentals
Viresh Suri
 
PDF
VULNERABILITY ( CYBER SECURITY )
Kashyap Mandaliya
 
Cloud Computing Risk Management (Multi Venue)
Brian K. Dickard
 
Cloud computing security
Antonio Sanz Alcober
 
Cloud computing and its security issues
Jyoti Srivastava
 
Cloud Security - Security Aspects of Cloud Computing
Jim Geovedi
 
What is SASE
Adi Ruppin
 
Cloud security and security architecture
Vladimir Jirasek
 
Cloud computing and Cloud security fundamentals
Viresh Suri
 
VULNERABILITY ( CYBER SECURITY )
Kashyap Mandaliya
 

What's hot (20)

PPT
Cloud computing-security-issues
Aleem Mohammed
 
PPTX
Cloud Security Architecture.pptx
Moshe Ferber
 
PPTX
Security in Cloud Computing
Rohit Buddabathina
 
PPT
Fog computing provide security to data in cloud ppt
priyanka reddy
 
PPTX
Cloud security Presentation
Ajay p
 
PPTX
Why Zero Trust Architecture Will Become the New Normal in 2021
Cloudflare
 
PPT
security Issues of cloud computing
prachupanchal
 
PPTX
Cloud computing
kanchu17
 
PPTX
Cloud computing security issues and challenges
Dheeraj Negi
 
PDF
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Seccuris Inc.
 
PDF
Understanding SASE
Haris Chughtai
 
PPTX
Firewall presentation
yogendrasinghchahar
 
PDF
Cloud Security
Pyingkodi Maran
 
PPT
Cloud Computing Security Challenges
Yateesh Yadav
 
PPTX
Cloud computing and data security
Mohammed Fazuluddin
 
PPTX
Cloud computing presentation
Muhammad Usama Zuberi
 
PPT
Cloud computing
Aditya Dwivedi
 
PPTX
Introduction to CloudStack
CloudStack - Open Source Cloud Computing Project
 
PPTX
Cloud Computing Presentation
Vivek Ravindran
 
PPTX
firewall and its types
Mohammed Maajidh
 
Cloud computing-security-issues
Aleem Mohammed
 
Cloud Security Architecture.pptx
Moshe Ferber
 
Security in Cloud Computing
Rohit Buddabathina
 
Fog computing provide security to data in cloud ppt
priyanka reddy
 
Cloud security Presentation
Ajay p
 
Why Zero Trust Architecture Will Become the New Normal in 2021
Cloudflare
 
security Issues of cloud computing
prachupanchal
 
Cloud computing
kanchu17
 
Cloud computing security issues and challenges
Dheeraj Negi
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Seccuris Inc.
 
Understanding SASE
Haris Chughtai
 
Firewall presentation
yogendrasinghchahar
 
Cloud Security
Pyingkodi Maran
 
Cloud Computing Security Challenges
Yateesh Yadav
 
Cloud computing and data security
Mohammed Fazuluddin
 
Cloud computing presentation
Muhammad Usama Zuberi
 
Cloud computing
Aditya Dwivedi
 
Cloud Computing Presentation
Vivek Ravindran
 
firewall and its types
Mohammed Maajidh
 
Ad

Viewers also liked (12)

PPTX
Cloud computing Risk management
Padma Jella
 
PPT
Cloud Computing Powerpoint
thomaslipkin
 
PDF
CIO Cloud Security Checklist
Druva
 
PDF
Cloud Computing Risk Management (IIA Webinar)
Brian K. Dickard
 
PPTX
Chapter 05 Digital Safety and Security
xtin101
 
DOC
Cloud security
Mohamed Shalash
 
PPT
3.2.1 computer security risks
hazirma
 
PPTX
Cloud computing presentation
William Mann
 
PPT
Data security in the cloud
IBM Security
 
PPTX
Cloud security ppt
Venkatesh Chary
 
PPTX
Data security in cloud computing
Prince Chandu
 
PPTX
INFORMATION SECURITY
Ahmed Moussa
 
Cloud computing Risk management
Padma Jella
 
Cloud Computing Powerpoint
thomaslipkin
 
CIO Cloud Security Checklist
Druva
 
Cloud Computing Risk Management (IIA Webinar)
Brian K. Dickard
 
Chapter 05 Digital Safety and Security
xtin101
 
Cloud security
Mohamed Shalash
 
3.2.1 computer security risks
hazirma
 
Cloud computing presentation
William Mann
 
Data security in the cloud
IBM Security
 
Cloud security ppt
Venkatesh Chary
 
Data security in cloud computing
Prince Chandu
 
INFORMATION SECURITY
Ahmed Moussa
 
Ad

Similar to Cloud computing understanding security risk and management (20)

PDF
Requirements and Challenges for Securing Cloud Applications and Services
IOSR Journals
 
PDF
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
Shah Sheikh
 
PDF
International journal of computer science and innovation vol 2015-n2-paper4
sophiabelthome
 
PDF
G0314043
iosrjournals
 
PDF
Introduction to cloud security
IAEME Publication
 
PDF
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
iosrjce
 
PDF
A017620123
IOSR Journals
 
PDF
INFORMATION SECURITY IN CLOUD COMPUTING
ijitcs
 
PDF
Cloud computing final format(1)
ahmed elmeghiny
 
PPT
Effectively and Securely Using the Cloud Computing Paradigm
fanc1985
 
PDF
Cloud Computing - A future prerogative
Wayne Poggenpoel
 
PPT
Cloudcomputingoct2009 100301142544-phpapp02
abhisheknayak29
 
PDF
SECURITY ISSUES IN CLOUD COMPUTING
International Journal of Technical Research & Application
 
PPTX
Cloud Computing in Business and facts
Arun Ganesh
 
PPT
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Bill Annibell
 
PPT
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
TT L
 
PDF
Securing The Journey To The Cloud
Niloufer Tamboly CISSP, CPA, CIA, CISA, CFE
 
PDF
A Survey on Cloud Computing Security – Challenges and Trust Issues
IJCSIS Research Publications
 
PDF
Secure Cloud Hosting.paper
jagan339
 
PPTX
Cloud computing
Dulith Kasun
 
Requirements and Challenges for Securing Cloud Applications and Services
IOSR Journals
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
Shah Sheikh
 
International journal of computer science and innovation vol 2015-n2-paper4
sophiabelthome
 
G0314043
iosrjournals
 
Introduction to cloud security
IAEME Publication
 
Design & Development of a Trustworthy and Secure Billing System for Cloud Com...
iosrjce
 
A017620123
IOSR Journals
 
INFORMATION SECURITY IN CLOUD COMPUTING
ijitcs
 
Cloud computing final format(1)
ahmed elmeghiny
 
Effectively and Securely Using the Cloud Computing Paradigm
fanc1985
 
Cloud Computing - A future prerogative
Wayne Poggenpoel
 
Cloudcomputingoct2009 100301142544-phpapp02
abhisheknayak29
 
Cloud Computing in Business and facts
Arun Ganesh
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Bill Annibell
 
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
TT L
 
Securing The Journey To The Cloud
Niloufer Tamboly CISSP, CPA, CIA, CISA, CFE
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
IJCSIS Research Publications
 
Secure Cloud Hosting.paper
jagan339
 
Cloud computing
Dulith Kasun
 

Recently uploaded (20)

PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
The Future of Artificial Intelligence (AI)
Mukul
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 

Cloud computing understanding security risk and management

  • 1. Cloud Computing - understanding security risk and management The aim of this paper is to make cloud service consumer aware about cloud computing fundamentals, its essential services, service models and deployment options. This also through light on security and risk management piece of CSA trusted cloud reference architecture, cloud control matrix and notorious nine threats and ENISAs top risks to cloud computing. At the end it talks about certifications and attestation part. Author – Shamsundar Machale (CISSP)
  • 2. Fig.1 NIST Visual Model of Cloud Computing Definition Any cloud should demonstrate the certain essential characteristics to get full benefits of cloud. Any missing essential characteristic would not give you 100% benefit from cloud computing. Whatever is not your core, outsource it. Similarly maintaining capex IT infrastructure, information is not your core so outsource it to some specialized agency i.e. Cloud Service Provider (CSP) Multi-tenancy is the fundamental used in resource pooling but keep in mind that resource pooling is not limited to your server and storage, it is extended to network connectivity, physical security, administration of cloud services and last but not least is your facility space. CSP uses the same infrastructure to provide services to multiple clients from same or different geographies. This provides great benefit to Cloud consumer (CC) by not having direct capital investment and pay per use model of cloud. Only required amount of compute, storage etc. are provisioned and no extra investment is done by CC. At the same time resource pooling might become huge risk if attacker uses shared pooled resource to steal sensitive information processed by CC. this is possible through attacks such as guest hopping attack or side channel attack to capture cryptographic keys. Second essential characteristic is on-demand self-service. The CC should be able to do the provisioning / de-provisioning of computing What is definition of Cloud Computing? Cloud computing is model for enabling continent, on-demand network access to a shared pool of configuration computing resources (e.g. networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management efforts or services provider interaction The above NIST definition defines in what way you can deploy cloud, what service offerings you can make available and what are the essential characteristics of cloud Fig. 1 represents the visual model of above NIST cloud computing definition. Let’s take a deeper look into the definition.
  • 3. resources by themselves with minimum administrative involvement from CSP. The lead time required doing the provisioning and de-provisioning should be reduced significantly. Rapid elasticity means CC should be able to do expansion and contraction of services as per their requirements with immediate effect and it will be charged on pay per usages policy. There should not be any locking CSP side while reducing the required level of resources. As there is trend of BYOD and consumerization, people want to access applications locations and end device independent which essentially means there should not be any restriction on your work location, it can be work from office, home or cafe and how do you access it, is it through your desktop, laptop, smartphone or tablet. Lastly CC should be able to measure services offered by CSP through SLA. Let’s take a look at service offering models; there are typically three kind of service offering models as below IaaS (Infrastructure as a Service) – Here you will get only infrastructure like compute and storage. This is nothing but plain vanilla virtual machine with operating system e.g. Amazon EC2 and S3, Rackspace etc. PaaS (Platform as a Service) – Here you expect little bit more from CP which will help in development of applications on provided infrastructure. It includes development tools, configuration management and deployment platforms such as Microsoft Azure, Force and Google App engine. SaaS (Software as a Service) – this is full package of application, CC has to just use it and don’t worry how and where it is running, who is managing the show? It is pure service such as online CRM system (Salesforce.com), online office tools (Office 365), online content filtering and messaging etc. As you move from IaaS to SaaS CC loses control on the services whereas CSP gains more control which is depicted in below figure. Fig-2
  • 4. Now we will look at third tier of cloud computing definition which is nothing but deployment options. As you seen in the above visual model there are four ways in which cloud services can be deployed. Public Cloud – Available publicly, multiple customers can avail same services with different SLA commitments Private Cloud – Build specifically for single customer and available to only one customer Community Cloud – Services can be offered to same of customers which are forming community such as cloud services for power generation companies, cloud services for manufacturing industry etc. Hybrid Cloud – Combination of any of the above Below table provides more information about the deployment models Fig.3
  • 5. As mentioned above security of cloud services is joint responsibility of CC and CSP which purely depends on the service offering. As per CSA’s “ Trusted cloud Reference Architecture version 2.0 “, Security and Risk Management is one of the key building block to focus if you want to build trusted cloud Fig.4 CSA Trusted cloud security reference arcthitecture This block basically talks about below domains. Governance Risk and Compliance - how are you going to manage governance, risk, audit, vendor, policy and awareness around CSP support staff? InfoSec Management – capability management, risk portfolio, risk dashboard, and residual risk management Privilege Management Infrastructure – This purely focuses around how effectively you manage the identities in the cloud. How secure is your authentication service? How do you manage authorization and accountability of identities in the cloud? How privilege identities are handled? Threat and Vulnerability Management - How do you keep environment vulnerability free, up to date with latest patches and assurance on compliance testing to CC. What is Security for Cloud Computing? As per CSA, Security controls in cloud computing are, for the most part, no different than security controls in any IT environment. However, because of the cloud service models employed, the operational models, and the technologies used to enable cloud services, cloud computing may present different risks to an organization than traditional IT solutions. This means we have to focus on defense in depth approach for security in cloud computing The focus of defense in depth approach is always a data at center and different type of controls such as Administrative, Technical and Physical are wrapped around data. For example physical security has the same importance in both traditional data center and cloud based datacenter.
  • 6. Infrastructure Protection Services - How do you protect your applications, operating systems on servers, databases, network and end points. What kind of technical controls are put around these? Do you have perimeter firewall at network level, whether servers are locked down as per hardening guidelines, do you have Anti-virus, HIPS / HIDS installed at the end points, logging and monitoring enabled, application level firewall and web content filtering Data Protection – how well are you managing the data lifecycle, what controls are placed to prevent the Data loss, how are you protecting your intellectual properties and how effective is your cryptographic service management. Policies and Standards – Have you defined information security policies, guidelines based on different industry standards like ISO 27001. Whether operational security baseline and standard operating procedures defined and followed within the organization. Whether asset / data classification guidelines are defined and practiced within team. CSA has defined the Cloud Controls Matrix which provides fundamental security principles to guide cloud vendors and to assist cloud customers in assessing the overall security risk of a cloud provider. The latest version of Cloud Controls Matrix is CCM v3.0.1 As per this control matrix there are 133 controls divided into 16 domains of CSA cloud security. Fig.5 CCMv3.0.2 Domains Risk Management is one of the important aspect of cloud computing. There is no different strategy for management of risk in the cloud. You have to follow the conventional approach of performing the risk assessment based on certain framework and management of these risk either through risk mitigation by use of certain controls, transfer, avoid or accept the risk. As per ENISA’s “ Cloud Computing Benefits, risks and recommendations for information security Rev.B-2012 ” document cloud risks are classified into three categories “Policy and Organizational Risks”, “Technical Risks”, and “Legal Risks”
  • 7. Below figure represents the top rated risk identified by ENISA based on the probability and impact of the risk. Fig.6 ENISA top security risks to cloud computing If you refer to below table which list down “ The Notorious Nine – Cloud Computing Top Threats in 2013” you will find certain risk / threats are common in both the documents such as Malicious Insider / Cloud Provider Malicious Insider, shared technology issue / isolation failure, insecure APIs / Management interface compromise Fig.7 – Notorious Nine Threats to Cloud Computing Data Breaches Data Loss Account Hijacking Insecure APIs Denial of Service Malicious Insiders Abuse of Cloud Services Insufficient Due Diligence Shared Technology Issues
  • 8. Security Certification and Attestations – CSPcan provide the assurance to CC on current compliance level with respect to different standards, legal and regulatory requirements through certain security certifications and attestations. Below figure provides the security certifications obtained by different CSPs. This is just a reference and CC is kidnly reuquested to obtain list of current certifications during evaluation of CSP Fig.8 – Security Certifications and Attestations Conclusion - Cloud computing is double edged sword which provides good amount of benefits but only if implemented properly considering all security, governance, privacy and legal requirements. Risk assessment and due diligence would be the key for cloud consumers to make their case as success story.
  • 9. References – “CSA Trusted cloud Reference Architecture version 2.0” “CSA Cloud Controls Matrix, CCM v3.0.1” “The Notorious Nine – Cloud Computing Top Threats in 2013” ENISA’s “Cloud Computing Benefits, risks and recommendations for information security Rev.B-2012” The Forrester Wave™: Public Cloud Platform Service Providers’ Security, Q4 2014 END OF DOCUMENT