Security Considerations Cloud Computing
Security Considerations Cloud Computing
ISBN 978-60420-263-2
Security Considerations for Cloud Computing
Acknowledgments 3
Acknowledgments
ISACA wishes to recognize:
Development Team
Stefanie Grijp, PwC, Belgium
Chris Kappler, PwC, Belgium
Bart Peeters, CISA, PwC, Belgium
Tomas Clemente Sanchez, PwC, Belgium
Work Group
Yves Marcel Le Roux, CISM, CISSP, CA Technologies, France
Alan Mayer, USA
Perry Menezes, CISM, CRISC, CIPP, CISSP, Deutsche Bank, USA
Yogendra Rajput, India
Paras Shah, CISA, CGEIT, CRISC, CA, Transpire Pty Ltd., Australia
Brett Smith, CISSP, ISSAP, Deutsche Bank, USA
Expert Reviewers
Muhammad Amir, CISA, CISM, CRISC, CEH, CISSP, MCSE Security, Security+,
NetSol Technologies Ltd., Pakistan
Mark E.S. Bernard, CISA, CSIM, CGEIT, CRISC, CISSP, PM, ISO 27001, SABSA-F2,
TechSecure Holdings Inc., Canada
Roberta Donaldson Caraglia, EMCIS, ITIL V3, EMC Consulting, USA
Christos K. Dimitriadis, Ph.D., CISA, CISM, CRISC, INTRALOT S.A., Greece
Meenu Gupta, CISA, CISM, CBP, CIPP, CISPP, Mittal Technologies, USA
Masatoshi Kajimoto, CISA, CRISC, Independent Consultant, Japan
Hesham Moussa, CISM, Lumension Security, USA
Jo Stewart-Rattray, CISA, CISM, CGEIT, CRISC, CSEPS, RSM Bird Cameron, Australia
Lou Tinto, CISA, CRISC, CFE, CIA, NYLB, USA
Sukhwinder Wadhwa, ITIL V3, Infosys Ltd, India
Justin Williams, CA (SA), Transnet, South Africa
ISACA Board of Directors
Gregory T. Grocholski, CISA, The Dow Chemical Co., USA, International President
Allan Boardman, CISA, CISM, CGEIT, CRISC, ACA, CA (SA), CISSP, Morgan Stanley, UK,
Vice President
Juan Luis Carselle, CISA, CGEIT, CRISC, Wal-Mart, Mexico, Vice President
Christos K. Dimitriadis, Ph.D., CISA, CISM, CRISC, INTRALOT S.A., Greece, Vice President
Ramses Gallego, CISM, CGEIT, CCSK, CISSP, SCPM, 6 Sigma, Quest Software, Spain,
Vice President
Tony Hayes, CGEIT, AFCHSE, CHE, FACS, FCPA, FIIA, Queensland Government, Australia,
Vice President
Jeff Spivey, CRISC, CPP, PSP, Security Risk Management Inc., USA, Vice President
Marc Vael, Ph.D., CISA, CISM, CGEIT, CRISC, CISSP, Valuendo, Belgium, Vice President
Kenneth L. Vander Wal, CISA, CPA, Ernst & Young LLP (retired), USA, Past International President
Emil DAngelo, CISA, CISM, Bank of Tokyo-Mitsubishi UFJ Ltd., (retired), USA,
Past International President
John Ho Chi, CISA, CISM, CRISC, CBCP, CFE, Ernst & Young LLP, Singapore, Director
Krysten McCabe, CISA, The Home Depot, USA, Director
Jo Stewart-Rattray, CISA, CISM, CGEIT, CRISC, CSEPS, RSM Bird Cameron, Australia, Director
Knowledge Board
Marc Vael, Ph.D., CISA, CISM, CGEIT, CRISC, CISSP, Valuendo, Belgium, Chairman
Steven A. Babb, CGEIT, CRISC, Betfair, UK
Thomas E. Borton, CISA, CISM, CRISC, CISSP, Cost Plus, USA
Phillip J. Lageschulte, CGEIT, CPA, KPMG LLP, USA
Salomon Rico, CISA, CISM, CGEIT, Deloitte, Mexico
Steven E. Sizemore, CISA, CIA, CGAP, Texas Health and Human Services Commission, USA
Acknowledgments (cont.)
Guidance and Practices Committee
Phillip J. Lageschulte, CGEIT, CPA, KPMG LLP, USA, Chairman
Dan Haley, CISA, CGEIT, CRISC, MCP, Johnson & Johnson, USA
Yves Marcel Le Roux, CISM, CISSP, CA Technologies, France
Aureo Monteiro Tavares Da Silva, CISM, CGEIT, Pelissari, Brazil
Jotham Nyamari, CISA, Deloitte, USA
Connie Lynn Spinelli, CISA, CRISC, CFE, CGMA, CIA, CISSP, CMA, CPA, GRC Solutions LLC, USA
John William Walker, CISM, CRISC, FBCS CITP, ITPC Secure Bastion Limited, UK
Siang Jun Julia Yeo, CISA, CPA (Australia), Visa Worldwide Pte. Limited, Singapore
Nikolaos Zacharopoulos, CISA, CISSP, DeutschePostDHL, Germany
ISACA and IT Governance Institute (ITGI) Affiliates and Sponsors
Information Security Forum
Institute of Management Accountants Inc.
ISACA chapters
ITGI France
ITGI Japan
Norwich University
Socitum Performance Management Group
Solvay Brussels School of Economics and Management
Strategic Technology Management Institute (STMI) of the National University of Singapore
University of Antwerp Management School
ASIS International
Hewlett-Packard
IBM
Symantec Corp.
TruArx Inc.
Table of Contents
Table of Contents
1. Introduction................................................................................................................. 7
Background.................................................................................................................... 7
Purpose of This Document........................................................................................... 7
Who Should Use This Guide?..................................................................................... 7
Scope and Approach..................................................................................................... 7
2. Cloud Computing........................................................................................................ 9
Essential Characteristics............................................................................................... 9
Cloud Service Models.................................................................................................. 9
Cloud Deployment Models........................................................................................ 10
The Key Element of Trust.......................................................................................... 10
3. Overview of Security Risk and Threats Related to
Operating in the Cloud............................................................................................ 13
Visibility as a Critical Factor..................................................................................... 13
Information Assets and Risk...................................................................................... 14
Cost Considerations (or Cost as a Risk Event)................................................. 15
Privacy Considerations...................................................................................... 15
Risk Assessment When Migrating to the Cloud............................................... 16
Risk Factors by Service Model.................................................................................. 17
S1. IaaS.............................................................................................................. 17
S2. PaaS............................................................................................................. 19
S3. SaaS............................................................................................................. 20
Risk Factors by Deployment Model.......................................................................... 21
D1. Public Cloud............................................................................................... 22
D2. Community Cloud...................................................................................... 22
D3. Private Cloud.............................................................................................. 23
D4. Hybrid Cloud.............................................................................................. 24
Overview of Threats and Mitigating Actions........................................................... 24
Technical........................................................................................................... 25
Regulatory ......................................................................................................... 29
Information Security Governance..................................................................... 30
4. The Path to the Decision and Beyond................................................................... 35
Step 1. Preparation of the Internal Environment...................................................... 35
Step 2. Selection of the Cloud Service Model......................................................... 36
Breakdown of Cloud Service Model Decision Tree......................................... 38
Step 3. Selection of the Cloud Deployment Model................................................. 40
Breakdown of Cloud Deployment Decision Tree............................................. 42
Step 4. Selection of the Cloud Service Provider...................................................... 51
1. Introduction
1. Introduction
Background
In recent years cloud computing has become more than a just another IT buzzword.
It refers to a business trend that is expected to haveand for some enterprises
already hasa significant impact on the way enterprises operate. It is likely that
cloud computing will gain even more importance as both the cloud and cloud
service provider markets mature. In times of cost optimization and economic
downturn the cloud can be perceived as a way to realize a more cost-effective
approach to technological support of the enterprise. However, security and data
privacy concerns are frequently seen as critical issues or even barriers for adopting
cloud computing services.
2. Cloud Computing
2. Cloud Computing
Cloud computing is defined by the US National Institute of Standards and
Technology (NIST) as a model for enabling ubiquitous, convenient, on-demand
network access to a shared pool of configurable computing resources (e.g., networks,
servers, storage, applications, and services) that can be rapidly provisioned and
released with minimal management effort or service provider interaction.1
There are five essential characteristics, three types of service models and four major
deployment models to be taken into account relative to cloud computing. To ensure
a common understanding of these models, the characteristics of each are described
in the following sections.
Essential Characteristics
The essential characteristics of cloud computing are:
On-demand self-serviceComputing capabilities can be provisioned without
human interaction from the service provider.
Broad network accessComputing capabilities are available over the network
and can be accessed by diverse client platforms.
Resource poolingComputer resources are pooled to support a multitenant model.
Rapid elasticityResources can scale up or down rapidly and in some cases
automatically in response to business demands.
Measured serviceResource utilization can be optimized by leveraging
charge-per-use capabilities.
ell, Peter; Timothy Grance; The NIST Definition of Cloud Computing, US National Institute of
M
Standards and Technology (NIST) Special Publication (SP) 800-145, USA, 2011
10
2. Cloud Computing
The answer to the question How can I rely on a CSP to protect my data? will be
influenced by a number of aspects:
The possibility for auditing and the verification of controls. Does the cloud user
have a view of the CSPs mitigating controls to handle riskcontrols related to
security, availability, processing integrity, confidentiality and privacy? In this
context, several standards or best practices are available for CSPs to report on
their security status. The American Institute of Certified Public Accountants
(AICPA) SOC 2 report or any security certification (International Organization
for Standardization [ISO 2700x]) can be used to evaluate the security practices
of a possible CSP. Guidance on how to fully understand and use AICPA SOC
2 reports can be found in ISACAs SOC 2SM User Guide, scheduled to be
available by the end of September 2012. The enterprise must identify compliance
requirements or select a recognized security framework (e.g., ISO, Statements on
Standards for Attestation Agreements [SSAE] 16, Payment Card Industry Data
Security Standard [PCI DSS], Health Insurance Portability and Accountability Act
[HIPAA], US Sarbanes-OxleyAct [SOX]) and request proof of compliance from
the CSP.
The CSP financial position and market recognition
Is the CSP certified or recognized by one or more security standards authorities
(e.g., the National Information Assurance Partnership [NIAP], which is a
US government body operated by the National Security Agency [NSA], and NIST)?
The availability of business continuity plans (BCPs), disaster recovery plans
(DRPs) and robust backup procedures, taking into account multifacility,
multicountry CSPs
The quality of the users own data and data classification; policies, principles and
frameworks; processes; organizational structures; culture, ethics and behaviour;
services, infrastructure and applications; people, skills and competencies; and risk
appetite (see chapter 4)
General negotiations and relationship with the service provider: contracts, SLAs,
communication processes, roles and responsibilities matrices, etc.
11
12
13
14
Software as a Service
Client Assumes
All Data and Application
Security Risk
Presentation
Modality
Applications
Abstraction
Hardware
Facilities
Data
APIs
Core Connectivity
and Delivery
Abstraction
Hardware
Facilities
APIs
Core Connectivity
and Delivery
Infrastructure as a Service
Platform as a Service
Metadata
Content
APIs
Core Connectivity
and Delivery
Abstraction
Hardware
Facilities
PaaS
IaaS
Presentation
Platform
APIs
I SACAs Risk IT framework considers the following risk events: interruption, destruction, theft and
disclosure. However, the terms unavailability (interruption) and loss (destruction) are found to be
more suitable for the assets presented in this context.
paralyzing the systems has direct, negative effects on the data. Disclosure of details
about how applications handle critical information or about internal enterprise
processes could pave the way to more selective attacks with greater consequences.
Figure 2 explains at a high level the possible impact of the four risk events on assets.
Figure 2Impact of Risk Events on Assets
Type
Unavailability
Loss
Data
Disruption of
activities; lack of
resources to keep
on with business
as usual;
possibility of data
poisoning
Applications/
processes
Disruption of
activities; lack of
resources to keep
on with business
as usual
Disruption of
activities; required
activation of
backup restore
procedures (DRP);
possibility of partial
loss of the asset
(depending on
the recovery point
objective [RPO]);
financial loss
associated with
recovery efforts
Theft
Business
competitive
disadvantage;
possibility of
blackmail; loss
of credibility with
customers/clients
Disclosure
Damage to
company
reputation or
image; possibility
of regulatory
sanctions;
financial impact
15
16
17
18
S1.L
Cloud provider authenticityAlthough communications between the
enterprise and the cloud provider can be secured with technical means
(encryption, virtual private network [VPN], mutual authentication, etc.) it is
the consumers responsibility to check the identity of the cloud provider to
ensure that it is not an imposter.
Risk affectedUnavailability, loss, theft, disclosure
S2. PaaS
PaaS adds a layer to IaaS by providing the capability to deploy applications in
a cloud infrastructure. The applications are developed using the programming
languages and tools supported by the CSP. Thus, physical support, OS and
programming tools are the responsibility of the CSP, while the applications and the
data remain under the control of the enterprise. This service model entails the same
impacts on risk as IaaS, plus the following factors.
Risk-decreasing factor:
S2.A
Short development timeUsing the service oriented architecture (SOA)
library provided by the CSP, applications can be developed and tested within
a reduced time frame because SOA provides a common framework for
application development.
Risk affectedUnavailability, loss
Risk-increasing factors:
S2.B
Application mappingIf current applications are not perfectly aligned with
the capabilities provided by the CSP, additional undesirable features (and
vulnerabilities) could be introduced.
Risk affectedTheft, disclosure
S2.C
SOA-related vulnerabilitiesSecurity for SOA presents new challenges
because vulnerabilities arise not only from the individual elements, but
also from their mutual interaction. Because the SOA libraries are under the
responsibility of the CSP and are not completely visible to the enterprise,
there may exist unnoticed application vulnerabilities.
Risk affectedUnavailability, loss, theft, disclosure
S2.D
Application disposalWhen applications are developed in a PaaS
environment, originals and backups should always be available. In the event
of a contract termination, the details of the application could be disclosed
and used to create more selective attacks on applications.
Risk affectedTheft, disclosure
19
20
S3.G
Exit strategyCurrently, there is very little available in terms of tools,
procedures or other offerings to facilitate data or service portability from
CSP to CSP. This can make it very difficult for the enterprise to migrate
from one CSP to another or to bring services back in-house. It can also result
in serious business disruption or failure should the CSP go bankrupt, face
legal action, or be the potential target for an acquisition (with the likelihood
of sudden changes in CSP policies and any agreements in place). If the
customer-CSP relationship goes sour and the enterprise wants to bring the
data back in-house, the question of how to securely render the data becomes
critical because the in-house applications may have been decommissioned or
sunsetted and there is no application available to render the data.
Risk affectedUnavailability, loss
S3.H
Broad exposure of applicationsIn a cloud environment, the applications
offered by the CSP have broader exposure which increases the attack space.
Additionally, it is quite common that those applications still need to integrate
back to other noncloud applications within the boundaries of the enterprise.
Standard network firewalls and access controls are sometimes insufficient to
protect the applications and their external interactions. Additional security
measures may be required.
Risk affectedUnavailability, loss, disclosure
S3.I
Ease to contract SaaSBusiness organizations may contract cloud
applications without proper procurement and approval oversight, thus
bypassing compliance with internal enterprise policies.
Risk affectedUnavailability, loss, theft, disclosure
S3.J Lack of control of the release management processAs described before,
CSPs are able to introduce patches in their applications quickly. These
deployments are often done without the approval (or even the knowledge)
of the application users for practical reasons: if an application is used by
hundreds of different enterprises, it would take an extremely long time for
a CSP to look for the formal approval of every customer. In this case, the
enterprise could have no control (or no view) of the release management
process and could be subject to unexpected side effects.
Risk affectedUnavailability, loss
S3.K
Browser vulnerabilitiesAs a common practice, applications offered
by SaaS providers are accessible to customers via secure communication
through a web browser. Web browsers are a common target for malware
and attacks. If the customers browser becomes infected, the access to the
application can be compromised as well.
Risk affectedTheft, disclosure
21
22
Risk-increasing factor:
D2.C
Sharing of the cloudDifferent entities may have different security
measures or security requirements in place, even if they belong to the
same enterprise. This could render an entity at risk because of the faulty
procedures or SLAs of another entity, or simply because of differing security
levels for the same type of data.
Risk affectedLoss, theft, disclosure
D3. Private Cloud
In a private cloud, cloud services are deployed for the exclusive use of one
enterprise. No interaction with other entities is allowed within the cloud. As
described previously, there are on-site and off-site private clouds.
Risk-decreasing factors:
D3.A
Can be built on-premisesPhysical or location-related considerations can
be more closely controlled by the enterprise because the cloud infrastructure
can be located on the enterprises premises. Global enterprise security
policies would apply.
Risk affectedUnavailability, loss, theft, disclosure
D3.B PerformanceAffects on-site private clouds. Because the private cloud is
deployed inside the firewall on the enterprises intranet, transfer rates are
dramatically increased (fewer nodes to cross). Storage capacity can also be
higher; private clouds usually start with a few terabytes and can be increased
by adding disks.
Risk affectedUnavailability, loss
Risk-increasing factors:
D3.C
Application compatibilityWhile applications that have already been confirmed
to be virtualization-friendly are likely to run well in a private cloud environment,
problems can occur with older and/or customized software that assumes direct
access to resources. Larger applications that currently run on dedicated specialized
clusters with hardwiring into proprietary runtime and management environments
may also be questionable candidates for migration, at least until standards settle
and vendors take steps to make their solutions private-cloud-compatible. In the
meantime, compatibility testing and remediation are critical.
Risk affectedUnavailability, loss
D3.D Investments requiredMaking a business case for shared infrastructure
and the necessary training or recruitment to acquire associated skills is
notoriously hard at the best of times. Although the word cloud has a high
profile, messages from vendors and service providers are often confusing
and contradictory, making seeking support from senior stakeholders even
more of an issue. If the head of finance thinks cloud is all about getting rid
of infrastructure, it can be difficult to explain that investments are needed in
new equipment, software and tools. The enterprise must conduct a cost-benefit
analysis and prepare a business case to determine whether the cloud is a viable
solution to meet specific business requirements, and justify any expenses.
Risk affectedCost
23
24
Technical 3
A. Vulnerable access management (infrastructure and application, public cloud):
Related risk factors: S1.D, S3.F, D1.B, D2.C
Description: Information assets could be accessed by unauthorized entities due
to faulty or vulnerable access management measures or processes. This could
result from a forgery/theft of legitimate credentials or a common technical
practice (e.g., administrator permissions override).
Mitigation:
A contractual agreement is necessary to officially clarify who is allowed to
access the enterprises information, naming specific roles for CSP employees
and external partners.
Request that the CSP provide detailed technical specifications of its IAM
system for the enterprises CISO (or equivalent authority) to review and
approve. If necessary, include additional controls to ensure robustness of the
CSPs IAM system. Most CSPs will not provide such details due to internal
security policies, but the enterprise can request controls and benchmarks as
an alternative (e.g., result of penetration testing on the CSPs IAM systems).
Use corporate IAM systems instead of CSPs IAM systems. The IAM
remains the responsibility of the enterprise, so no access to assets can be
granted without the knowledge of the enterprise. It requires the approval
of the CSP and the establishment of a secure channel between the CSP
infrastructure and the corporate IAM system.
Related guidance in COBIT 5 for Information Security:
A
ppendix A. Detailed Guidance: Principles, Policies and Frameworks Enabler
. A.2 Information Security Policy
Appendix F. Detailed Guidance: Services, Infrastructure and Applications
Enabler
. F.6 User Access and Access Rights in Line With Business Requirements
. F.10 Monitoring and Alert Services for Security-related Events
B. Data visible to other tenants when resources are allocated dynamically
Related risk factor: S1.E
Description: This refers to data that have been stored in memory space or
disk space that can be recovered by other entities sharing the cloud by using
forensics techniques.
Mitigation:
A contractual agreement is necessary to officially clarify who is allowed to
access the enterprises information, naming specific roles for CSP employees
and external partners. All controls protecting the enterprises information
assets must be clearly documented in the contract agreement or SLA.
Encrypt all sensitive assets that are being migrated to the CSP, and ensure
that proper key management processes are in place. This will consume part
of the allocated resources due to the encrypt/decrypt process and global
performance can be affected.
Request the CSPs technical specifications and controls to ensure that the data
are properly wiped when requested.
Use a private cloud deployment model (no multitenancy).
3
elated guidance on technical threats and mitigating actions can also be found in COBIT 5, DSS05
R
Manage security services.
25
26
27
28
Mitigation:
Introduce procedures within the enterprise to verify the state of software
security updates prior to the activation of any VMs.
Contractually request the CSP to apply security patches on inactive VMs.
Related guidance in COBIT 5 for Information Security:
Appendix A. Detailed Guidance: Principles, Policies and Framework
Enabler:
. A.2 Information Security Policy
Appendix F. Detailed Guidance: Services, Infrastructure and Applications
Enabler:
. F.5 Adequately Secured and Configured Systems, Aligned With Security
Requirements and Security Architecture
Regulatory 4
A. Asset ownership
Related risk factors: S2.D, S3.C
Description: Any asset (data, application or process) migrated to a CSP could be
legally owned by the CSP based on contract terms. Thus, the enterprise can lose
sensitive data or have data disclosed because the enterprise is no longer the sole
legal owner of the asset. In the event of contract termination, the enterprise could
even be subject (by contract) to pay fees to retrieve its own assets.
Mitigation:
Include terms in the contract with the CSP that ensure that the enterprise
remains the sole legal owner of any asset migrated to the CSP.
Encrypt all sensitive assets being migrated to the CSP prior to the migration
to prevent disclosure and ensure proper key management is in place. This can
affect the performance of the system.
Related guidance in COBIT 5 for Information Security:
Appendix C. Detailed Guidance: Organizational Structures Enabler:
. C.5 Information Custodians/Business Owners
B. Asset disposal
Related risk factors: S1.I, S2.E, S3.D
Description: In the event of contract termination, to prevent disclosure of
the enterprises assets, those assets should be removed from the cloud using
tools and processes commensurate to data classification; forensic tools
may be necessary to remove sensitive data (or other tools that ensure a
complete wipeout).
Mitigation:
Request CSPs technical specifications and controls that ensure that data are
properly wiped and backup media are destroyed when requested.
Include terms in the contract that require, upon contract expiration or any
event ending the contract, a mandatory data wipe carried out under the
enterprises review.
Related guidance in COBIT 5 for Information Security:
Appendix G. Detailed Guidance: People, Skills and Competencies Enabler:
. G.3 Information Risk Management
4
elated guidance on regulatory threats and mitigating actions can be found in COBIT 5, MEA03
R
Monitor, evaluate and assess compliance with external requirements.
29
30
elated guidance on information security governance threats and mitigating actions can be found in
R
COBIT 5, EDM01 through EDM05 processes.
31
32
business disruption or failure should the CSP go bankrupt, face legal action, or be
the potential target for an acquisition (with the likelihood of sudden changes in
CSP policies and any agreements in place). Another possibility is the run on the
banks scenario, in which there is a crisis of confidence in the CSPs financial
position resulting in a mass exit and withdrawal on first-come,
first-served basis. If there are limits to the amount of content that can be
withdrawn in a given time frame, then the enterprise might not be able to retrieve
all its data in the time specified. Another possibility may occur if the enterprise
decides, for any reason, to end the relationship with the CSP. The complexity of
the business logic and data models could make it impossible for the enterprise to
extract its data, reconstruct the business logic and rebuild the applications.
Mitigation:
Ensure by contract or SLA with the CSP an exit strategy that specifies the
terms that should trigger the retrieval of the enterprises assets in the time
frame required by the enterprise.
Implement a DRP, taking into account the possibility of complete CSP
disruption.
Related guidance in COBIT 5 for Information Security:
Appendix B. Detailed Guidance: Processes Enabler:
. B.2 Align, Plan and Organize: APO09 Manage Service Agreements
Appendix B. Detailed Guidance: Processes Enabler:
. B.4 Deliver, Service and Support: DSS04 Manage Continuity
Appendix G. Detailed Guidance: People, Skills and Competencies Enabler:
. G.3 Information Risk Management
G. Solid enterprise governance:
Related risk factor: S3.I
Description: Enterprises turn to CSPs in search of solutions that can be
implemented easily and at low cost. This ease can be tempting, especially when
the enterprise is facing urgent deadlines that require an urgent solution (e.g.,
the expiration of application licenses or the need of more computing capacity).
This can become an issue because enterprises may contract cloud applications
without proper procurement and approval oversight, thus bypassing compliance
with internal policies.
Mitigation:
Ensure that internal governance controls are in place within the enterprise to
involve the necessary governance organization (legal, compliance, finance,
etc.) during the decision process of migrating to cloud services.
Related guidance in COBIT 5 for Information Security:
Appendix B. Detailed Guidance: Processes Enabler:
. B.1 Evaluate, Direct and Monitor: EDM01 Ensure Governance Framework
Setting and Maintenance.
. B.5 Monitor, Evaluate and Assess: MEA02 Monitor, Evaluate and Assess
the System of Internal Control
33
34
Commercial analysis must, of course, be done, but it is out of scope for this publication.
35
36
2. Interdependencies
with other
business processes?
7. Business driver
cloud-compatible?
SaaS
4. Applications/hardware/OS
custom?
5. Hardware/OS custom?
PaaS
6. Hardware custom?
IaaS
37
38
Explanation
Next Question
No
No
Question 4: Applications/hardware/OS
While interdependency may implicate a
custom?
change in the IT infrastructure, it is not
always a necessity. If interdependency
does implicate such a change, however,
the cloud application will need to be
changed. This fact will largely influence the
decision for a cloud service model. Thus,
it is important to outline the differences
between the current solution and the
standard solution provided by a CSP.
No
4. Application/hardware/OS custom?
Yes
No
Explanation
Next Question
5. Hardware/OS custom?
Yes
No
Solution: PaaS
6. Hardware custom?
Yes
No
Solution: IaaS
Solution: SaaS
No
39
40
6. Predictable?
5. Adequate
infrastructure?
3. More than
data?
2. Critical
data?
1. Sensitive
data?
Start
7. Legal/compliance
impediments?
4. Business
process critical?
14. SLA?
10. SLA?
Y
9. Jurisdiction?
8. Data
ownership?
Cloud may
not be the
best solution.
12. In-house
DRP/BCM?
N
Y
Public cloud
11. Cost
efficient?
19. Data
ownership?
18. Legal/
compliance
impediments?
20. Jurisdiction?
17. Predictable?
16. Adequate
infrastructure?
15. Cost
efficient?
Y
22. SLA?
N
Y
Cloud may
not be the
best solution.
Private cloud
23. Cost
efficient?
4. The Path to the Decision and Beyond
41
42
Explanation
Next Question
1. Sensitive data?
Yes
2. Critical data?
Yes
No
Explanation
Next Question
No
5. Adequate infrastructure?
Yes
Question 6: Predictable?
No
6. Predictable?
Yes
Question 7: Legal/compliance
impediments?
No
43
44
Explanation
Next Question
7. Legal/compliance impediments?
Yes
8. Data ownership?
Yes
Question 9: Jurisdiction?
If the enterprise can clearly define data
ownership during contract negotiations, the
next steps to move to the cloud can
be taken.
Explanation
Next Question
9. Jurisdiction?
Yes
10. SLA?
Yes
No
45
46
Explanation
Next Question
No
No
Question 6: Predictable?
No
Explanation
Next Question
14. SLA?
Yes
No
47
48
Explanation
Next Question
No
17. Predictable?
Yes
No
Explanation
Next Question
49
50
Explanation
Next Question
20. Jurisdiction?
Yes
Even though data ownership resides with the Question 22: SLA?
enterprise, local and international laws often
forbid the transfer of certain data to countries
that have conflicting laws or regulations.
Therefore, it is important for the enterprise to
know the location of the CSPs data storage
facilities and data processing centers to
prevent legal infractions.
It is advisable for the enterprise to include
in the contract with the CSP the necessary
clauses requiring the CSP to limit service
locations to those approved by the
enterprise.
No
No
Explanation
Next Question
22. SLA?
Yes
No
No
51
52
1.1
Prepare a consistent business case and evaluate the cost and benefits related
to the move to a cloud provider.
1.2
Identify and classify all information assets (data, application, processes) that
are considered in scope.
1.3
Prepare a list of potential cloud provider candidates and perform a sanity check
on them (financial situation, references, authenticity, etc.).
1.4
1.5
2.1
Request the CSPs security policy and ensure that it is aligned with the
enterprises security policy.
2.2
Request the CSPs list of infrastructure locations and verify that regulation in
those locations is aligned with the enterprises requirements.
2.3
2.4
Request the CSPs technical details and additional controls to ensure data
privacy for CIO and CISO approval.
2.5
2.6
Request that the CSP include the enterprise into its incident management
process to be notified of collateral events.
2.7
Request the CSPs information about its contractual SLA for hypervisor
vulnerability management, patch management and release management to be
applied when new hypervisor vulnerabilities are discovered.
2.8
2.9
Request the CSPs technical specifications and controls to ensure that the data
are properly wiped out when requested.
53
54
2.10
Request the CSPs process and techniques in place for data storage media
disposal and evaluate that they meet the requirements of the enterprise.
2.11
Request the CSPs details about the software systems development life cycle
(SDLC) policy and procedures in place and ensure that the security measures
introduced into the design are compliant with the requirements of the
enterprise.
2.12
Contract terms:
3.1
Ensure that the CSP is aligned with the enterprises security policy and
implement necessary controls to monitor compliance.
3.2
Ensure that the enterprise remains the sole owner of any asset migrated to
the CSP.
3.3
3.4
Ensure that the enterprises contracted capacity is always available and cannot
be directed to other tenants without approval.
3.5
Ensure that the CSP provides regular reporting on security (incident reports,
IDS/IPS logs, etc.) to the enterprise for analysis.
3.6
Ensure that the CSP applies a mandatory data wipeout under the enterprises
approval on contract expiration.
3.7
Ensure that the CSP is compliant with the enterprises security policy for data
storage media disposal.
3.8
Ensure (together with the CSP) that an exit strategy specifies the terms that
trigger the retrieval of the enterprises assets in the time frame required by
the enterprise.
Preventive measures:
4.1
Encrypt all sensitive assets being migrated to the CSP prior to the migration to
prevent disclosure and ensure proper key management is in place. This could
affect the performance of the system.
4.2
Use corporate identity and access management systems instead of the CSPs
access management systems. It requires the approval of the CSP and the
establishment of a secure channel between the CSP infrastructure and the
corporate access management system.
4.3
4.4
Implement a DRP taking into account the possibility of complete CSP disruption.
Scalability/
elasticity
Disaster
recovery and
backup
Patch
management
S1.B
S1.C
Risk Factor
S1.A
IaaS
Code
Unavailability
Loss
Theft
Risk Event
Disclosure
Decreasing
Decreasing
Decreasing
Type
Description
Appendix B. Overview of Different Risk Factors
per Service and Deployment Model
55
Risk Factor
Legal
transborder
requirements
Multitenancy
and isolation
failure
Lack of visibility
surrounding
technical
security
measures in
place
S1.D
S1.E
S1.F
IaaS (cont.)
Code
Unavailability
Loss
Theft
Risk Event
Disclosure
Increasing
Increasing
Increasing
Type
Description
56
Security Considerations for Cloud Computing
Risk Factor
Absence of DRP
and backup
Physical security
Data disposal
Offshoring
infrastructure
S1.G
S1.H
S1.I
S1.J
IaaS (cont.)
Code
Unavailability
Loss
Theft
Risk Event
Disclosure
Increasing
Increasing
Increasing
Increasing
Type
Description
Appendix B. Overview of Different Risk Factors
per Service and Deployment Model
57
Risk Factor
Cloud provider
authenticity
S1.L
Short
development
time
Application
mapping
SOA-related
vulnerabilities
Application
disposal
S2.A
S2.B
S2.C
S2.D
PaaS
VM security
maintenance
S1.K
IaaS (cont.)
Code
Unavailability
Loss
Theft
Risk Event
Disclosure
Increasing
Increasing
Increasing
Decreasing
Increasing
Increasing
Type
Description
58
Security Considerations for Cloud Computing
Improved
security
Application
patch
management
Data ownership
Data disposal
Lack of visibility
into software
SDLC
S3.B
S3.C
S3.D
S3.E
Risk Factor
S3.A
SaaS
Code
Unavailability
Loss
Theft
Risk Event
Disclosure
Increasing
Increasing
Increasing
Decreasing
Decreasing
Type
Description
Enterprises that use cloud applications have little visibility into the
software SDLC. Customers do not know in detail how the applications
were developed and what security considerations were taken into
account during the SDLC. This could lead to an imbalance between
the security provided by the application and the security required by
customers/users.
In the event of a contract termination, the data fed into the CSPs
application must be erased immediately using forensic tools to avoid
disclosures and confidentiality breaches.
The CSP provides the applications and the customer provides the
data. If data ownership is not clearly defined, the CSP could refuse
access to data when required or even demand fees to return the data
once the service contracts are terminated.
Appendix B. Overview of Different Risk Factors
per Service and Deployment Model
59
Risk Factor
IAM
Exit strategy
Broad exposure
of applications
S3.F
S3.G
S3.H
SaaS (cont.)
Code
Unavailability
Loss
Theft
Risk Event
Disclosure
Increasing
Increasing
Increasing
Type
Description
60
Security Considerations for Cloud Computing
Risk Factor
Lack of control
of the release
management
process
Browser
vulnerabilities
S3.J
S3.K
Public
reputation
Full sharing of
the cloud (data
pooling)
D1.A
D1.B
Public Cloud
Ease to contract
SaaS
S3.I
SaaS (cont.)
Code
Unavailability
Loss
X
Theft
Risk Event
Disclosure
Increasing
Decreasing
Increasing
Increasing
Increasing
Type
Description
Providers of public cloud services are aware that they are generally
perceived as more risky. It is critical for them to ensure a good
reputation because a secure provider or customers will simply
move elsewhere.
Appendix B. Overview of Different Risk Factors
per Service and Deployment Model
61
Risk Factor
Collateral
damage
Dedicated
access for the
community
Sharing of the
cloud
D2.B
D2.C
D3.A
Can be built
on-premise
Private Cloud
Same group of
entities
D2.A
Community Cloud
D1.C
Code
Unavailability
Loss
Theft
Risk Event
Disclosure
Decreasing
Increasing
Decreasing
Decreasing
Increasing
Type
Description
62
Security Considerations for Cloud Computing
Risk Factor
Performance
Application
compatibility
Investments
required
D3.B
D3.C
D3.D
Code
(can be
triggered by
cost)
Unavailability
Theft
(can be (can be
triggered triggered
by cost) by cost)
Loss
Risk Event
(can be
triggered
by cost)
Disclosure
Increasing
Increasing
Decreasing
Type
Description
Appendix B. Overview of Different Risk Factors
per Service and Deployment Model
63
Risk Factor
Cloud IT skills
required
D4.A
Cloud
interdependency
Hybrid Cloud
D3.E
Code
(can be
triggered by
cost)
Unavailability
Theft
(can be (can be
triggered triggered
by cost) by cost)
Loss
Risk Event
(can be
triggered
by cost)
Disclosure
Increasing
Increasing
Type
Description
64
Security Considerations for Cloud Computing
A. Vulnerable
access
management
(infrastructure
and application,
public cloud)
Technical Threats
Threat
Description
S1.D
S3.F
D1.B
D2.C
Risk
Factors
A contractual agreement is necessary to
officially clarify who is allowed to access
the enterprises information, naming
specific roles for CSP employees and
external partners.
Request that the CSP provide detailed
technical specifications of its IAM system
for the enterprises CISO to review and
approve. Include additional controls to
ensure robustness of the CSPs IAM
system. Most CSPs will not provide such
details due to internal security policies,
but the enterprise can request controls
and benchmarks as an alternative (e.g.,
result of penetration testing on the CSPs
IAM systems).
Mitigation
Mapping to
COBIT 5 for Information Security
Figure 9Cloud Threats and Mitigating Actions Mapped to COBIT 5 for Information Security
Figure 9 maps cloud threats and mitigating actions to COBIT 5 for Information Security.
Appendix C. Mapping Threats and Mitigating Actions 65
to COBIT 5 for Information Security
Mitigation
B. Data visible to
other tenants
when resources
are allocated
dynamically
S1.E
Risk
Factors
Use corporate IAM systems instead of
CSP IAM systems. The IAM remains
the responsibility of the enterprise, so
no access to assets can be granted
without the knowledge of the enterprise.
It requires the approval of the CSP and
the establishment of a secure channel
between the CSP infrastructure and the
corporate IAM system.
Description
A. Vulnerable
access
management
(infrastructure
and application,
public cloud)
(cont.)
Threat
Mapping to
COBIT 5 for Information Security
Figure 9Cloud Threats and Mitigating Actions Mapped to COBIT 5 for Information Security (cont.)
66
Security Considerations for Cloud Computing
D. Hypervisor
attacks
Mitigation
Request the CSPs technical details for
CISO approval and require additional
controls to ensure data privacy.
A contractual agreement is necessary to
officially clarify who is allowed to access
the enterprises information, naming
specific roles for CSP employees and
external partners. All controls protecting
the enterprises information assets must
be clearly documented in the contract
agreement or SLA.
Use a private cloud deployment model
(no multitenancy).
Risk
Factors
S1.E
Due to the nature of multitenancy,
D1.B
some assets (e.g., routing tables, MAC
D2.C
addresses, internal IP addresses, LAN
traffic) could be visible to other entities
in the same cloud. Malicious entities in
the cloud could take advantage of the
information, e.g., by utilizing shared routing
tables to map the internal network topology
of an enterprise, preparing the way for an
internal attack.
Description
C. Multitenancy
visibility
Threat
Mapping to
COBIT 5 for Information Security
Figure 9Cloud Threats and Mitigating Actions Mapped to COBIT 5 for Information Security (cont.)
Appendix C. Mapping Threats and Mitigating Actions 67
to COBIT 5 for Information Security
F. Application
compatibility
E. Application
attacks
Description
Risk
Factors
D3.C
Threat
Mitigation
Mapping to
COBIT 5 for Information Security
Figure 9Cloud Threats and Mitigating Actions Mapped to COBIT 5 for Information Security (cont.)
68
Security Considerations for Cloud Computing
H. SaaS access
security
Description
G. Collateral
damage
Threat
S3.K
D1.C
Risk
Factors
Mitigation
Mapping to
COBIT 5 for Information Security
Figure 9Cloud Threats and Mitigating Actions Mapped to COBIT 5 for Information Security (cont.)
Appendix C. Mapping Threats and Mitigating Actions 69
to COBIT 5 for Information Security
B. Asset disposal
Description
A. Asset ownership
Regulatory Threats
I. Outdated VM
security
Threat
S1.I
S2.E
S3.D
Mitigation
S2.D
S3.C
S1.K
Risk
Factors
Mapping to
COBIT 5 for Information Security
Figure 9Cloud Threats and Mitigating Actions Mapped to COBIT 5 for Information Security (cont.)
70
Security Considerations for Cloud Computing
C. Asset location
Description
Threat
S1.D
Risk
Factors
Request the CSPs list of infrastructure
locations and verify that regulation
in those locations is aligned with the
enterprises requirements.
Include terms in the service contract
to restrict the moving of enterprise
assets to only those areas known to
be compliant with the enterprises own
regulation.
To prevent disclosure, encrypt any asset
prior to migration to the CSP, and ensure
proper key management is in place.
Mitigation
Mapping to
COBIT 5 for Information Security
Figure 9Cloud Threats and Mitigating Actions Mapped to COBIT 5 for Information Security (cont.)
Appendix C. Mapping Threats and Mitigating Actions 71
to COBIT 5 for Information Security
Description
A. Physical security
on all premises
where
data/applications
are stored
Risk
Factors
S1.H
Physical security is required in any
infrastructure. When the enterprise
migrates assets to a cloud infrastructure,
those assets are still subject to the
corporate security policy, but they can
also be physically accessed by the CSPs
staff, which is subject to the CSPs security
policy. There could be a gap between the
security measures provided by the CSP
and the requirements of the enterprise.
Threat
Request the CSPs physical security
policy and ensure that it is aligned with
the enterprises security policy.
Request that the CSP provide proof
of independent security reviews or
certification reports (e.g., AICPA SSAE 16
SOC 2 report or ISO certification).
Include in the contract language that
requires the CSP to be aligned with
the enterprises security policy and to
implement necessary controls to
ensure it.
Request the CSPs DRP and ensure
that they contain the necessary
countermeasures to protect physical
assets during and after a disaster.
Mitigation
Mapping to
COBIT 5 for Information Security
Figure 9Cloud Threats and Mitigating Actions Mapped to COBIT 5 for Information Security (cont.)
72
Security Considerations for Cloud Computing
Description
B. Visibility of
the security
measures put in
place by the CSP
C. Media
management
Threat
Request the CSPs detailed schemes of
the technical security measures in place
and determine whether they meet the
requirements of the enterprise.
Request that the CSP provide proof
of independent security reviews or
certification reports (e.g., AICPA SSAE 16
SOC 2 report or ISO certification).
Include in the contract language
that requires the CSP to provide the
enterprise with regular reporting on
security (incident reports, IDS/IPS
logs, etc.).
Request the CSPs security incident
management process be applied to the
enterprises assets and ensure that it
is aligned with the enterprises own
security policy.
Request the CSPs process and
techniques in place for data media
disposal and evaluate whether they meet
the requirements of the enterprise.
Include in the contract language that
requires the CSP to comply with the
enterprises security policy
S1.I
Mitigation
S1.F
Risk
Factors
Mapping to
COBIT 5 for Information Security
Figure 9Cloud Threats and Mitigating Actions Mapped to COBIT 5 for Information Security (cont.)
Appendix C. Mapping Threats and Mitigating Actions 73
to COBIT 5 for Information Security
Description
Request the CSPs details about the
software SDLC in place and ensure
that the security measures introduced
into the design are compliant with the
requirements of the enterprise.
Request the CSP to provide proof
of independent security reviews or
certification reports (e.g., AICPA SSAE 16
SOC 2 report or ISO certification).
S3.E
D2.C
E. Common
security policy
for community
clouds
Mitigation
Risk
Factors
D. Secure software
SDLC
Threat
Mapping to
COBIT 5 for Information Security
Figure 9Cloud Threats and Mitigating Actions Mapped to COBIT 5 for Information Security (cont.)
74
Security Considerations for Cloud Computing
Description
F. Service
termination
issues
Risk
Factors
S3.G
Currently, there is very little available in
terms of tools, procedures or other offerings
to facilitate data or service portability
from CSP to CSP. This can make it very
difficult for the enterprise to migrate from
one CSP to another or to bring services
back in-house. It can also result in serious
business disruption or failure should the
CSP go bankrupt, face legal action, or be
the potential target for an acquisition (with
the likelihood of sudden changes in CSP
policies and any agreements in place).
Another possibility is the run on the banks
scenario, in which there is a crisis of
confidence in the CSPs financial position,
resulting in a mass exit and withdrawal on
first-come, first-served basis. If there are
limits to the amount of content that can
be withdrawn in a given timeframe, then
the enterprise might not be able to retrieve
all its data in the time specified. Another
possibility may occur if the enterprise
decides, for any reason, to end the
relationship with the CSP. The complexity
of the business logic and data models could
make it literally impossible for the enterprise
to extract its data, reconstruct the business
logic and rebuild the applications.
Threat
Ensure by contract or SLA with the CSP
an exit strategy that specifies the terms
that should trigger the retrieval of the
enterprises assets in the timeframe
required by the enterprise.
Implement a DRP, taking into account
the possibility of complete disruption of
the CSP.
Mitigation
Mapping to
COBIT 5 for Information Security
Figure 9Cloud Threats and Mitigating Actions Mapped to COBIT 5 for Information Security (cont.)
Appendix C. Mapping Threats and Mitigating Actions 75
to COBIT 5 for Information Security
Description
Ensure that internal governance controls
are in place within the enterprise
to involve the necessary control
organizations (legal, compliance, finance,
etc.) during the decision process of
migrating to cloud services.
S3.I
Mitigation
Risk
Factors
G. Solid enterprise
governance
Threat
Mapping to
COBIT 5 for Information Security
Figure 9Cloud Threats and Mitigating Actions Mapped to COBIT 5 for Information Security (cont.)
76
Security Considerations for Cloud Computing
Abbreviations 77
Abbreviations
Abbreviation
Full Term
BCM
CAPEX
CIO
CISO
CSP
DDoS
DRP
IaaS
Infrastructure as a Service
IAM
IDS/IPS
ISM
ISO
OPEX
OS
Operating system
PaaS
Platform as a Service
QoS
Quality of service
RPO
RTO
SaaS
Software as a Service
SDLC
SIEM
SLA
SOA
TCO
VM
Virtual machine
78
References 79
References
ISACA, COBIT 5, USA, 2012
ISACA, COBIT 5 for Information Security, USA, 2012
ISACA, COBIT 5 Implementation, USA, 2012
ISACA, IT Control Objectives for Cloud Computing: Controls and Assurance in
the Cloud, USA, 2011
ISACA, Risk IT Framework for Management of IT Related Business Risks,
ISACA, 2009
Mell, Peter; Timothy Grance; The NIST Definition of Cloud Computing, US
National Institute of Standards and Technology (NIST) Special Publication (SP)
800-145, USA, 2011
80