Information Systems Security on Cloud Computing

3 downloads 74301 Views 1002KB Size Report
Benefits, Risks, Security Considerations, Recommended Model .... Benefits of Cloud Computing . ..... A cloud primarily can be private or public (Anon., 2012).
1

Information Systems Security on Cloud Computing Benefits, Risks, Security Considerations, Recommended Model

2

Name of the Contributor An undergraduate student of the Department of Management Information Systems, Faculty of Business Studies, University of Dhaka, Dhaka 1000, Bangladesh.

Mohammad Saidur Rahman Department of Management Information Systems (MIS) Faculty of Business Studies University of Dhaka Dhaka 1000, Bangladesh

3

Table of Contents 1.

Executive Summary............................................................................................................ 6

2.

Introduction ........................................................................................................................ 7

3.

Cloud Computing ............................................................................................................... 7

4.

Arhitecture and Deployment Model ................................................................................... 8 4.1 Architecture of Cloud Computing.................................................................................... 8

Infrastructure as a Service (IaaS)........................................................................................ 8 Platform as a Service (PaaS) .............................................................................................. 8 Software as a Service (SaaS) .............................................................................................. 8 Network as a Service (NaaS) .............................................................................................. 8 Data as a Service (DaaS) .................................................................................................... 8 Hardware as a Service (HaaS) ............................................................................................ 9 4.2 Deployment Model of Cloud Computing ......................................................................... 9

Public Cloud ....................................................................................................................... 9 Private Cloud ...................................................................................................................... 9 Community Cloud .............................................................................................................. 9 Hybrid Cloud .................................................................................................................... 10 5.

6.

Benefits of Cloud Computing ........................................................................................... 11 5.1)

IT Cost Reduction ..................................................................................................... 11

5.2)

Scalability .................................................................................................................. 11

5.3)

Business Continuity .................................................................................................. 11

5.4)

Easy to Implement ..................................................................................................... 11

5.5)

Flexible ...................................................................................................................... 11

5.6)

Access to Automatic Updates ................................................................................... 11

5.7)

Resiliency .................................................................................................................. 11

Risks of Cloud Computing ............................................................................................... 12 6.1

Data Breaches ............................................................................................................ 12

Shared Tenancy Environment .......................................................................................... 12 6.2)

Data Loss ................................................................................................................... 13

6.3)

Account or Service Traffic Hijacking ....................................................................... 13

6.4)

Insecure Interfaces and APIs ..................................................................................... 13

6.5)

Denial of Service ....................................................................................................... 13

6.6)

Malicious Insiders ..................................................................................................... 14

Virtual Machine Based Malware ...................................................................................... 14 6.7)

Abuse of Cloud Services ........................................................................................... 14

Brute Force ....................................................................................................................... 14

4

7.

Security Considerations of Cloud Computing .................................................................. 15 7.1

Maintaining Availability and Business Functionality ............................................. 16

Business Criticality of Data or Functionality ................................................................... 16 Vendor’s Business Continuity and Disaster Recovery Plan ............................................. 16 My Data Backup Plan ....................................................................................................... 16 My Business Continuity and Disaster Recovery Plan ...................................................... 17 My Network Connectivity to the Cloud ........................................................................... 17 Vendor’s Guarantee of Availability ................................................................................. 17 Impact of Outages ......................................................................................................... 17 SLA Inclusion of Scheduled Outages ............................................................................... 17 SLA Compensation........................................................................................................... 18 Data Integrity and Availability ......................................................................................... 18 Data Restoration ............................................................................................................... 18 Scalability ......................................................................................................................... 18 Changing Vendor .............................................................................................................. 18 7.2

Protecting Data from Unauthorized Access by a Third Party ................................... 19

Choice of Cloud Deployment Model................................................................................ 19 Sensitivity of My Data ...................................................................................................... 19 Legislative Obligations ..................................................................................................... 19 Countries with Access to My Data ................................................................................... 19 Data Encryption Technologies ......................................................................................... 20 Media Sanitization ............................................................................................................ 20 Vendor’s Remote Monitoring and Management .............................................................. 20 My Monitoring and Management ............................................................................... 20 Data Ownership .............................................................................................................. 20 Gateway Technologies ..................................................................................................... 21 Gateway Certification ....................................................................................................... 21 Email Content Filtering .................................................................................................... 21 Policies and Processes Supporting the Vendor’s IT security Posture .............................. 21 Technologies Supporting the Vendor’s IT Security Posture ............................................ 21 Auditing the Vendor’s IT Security Posture ...................................................................... 21 User Authentication .......................................................................................................... 22 Centralized Control of Data .............................................................................................. 22 Vendor’s Physical Security Posture ................................................................................. 22 Software and Hardware Procurement ............................................................................... 22 7.3

Protecting Data from Unauthorized Access by the Vendor’s Customers ................. 23

Customer Segregation ..................................................................................................... 23

5

Weakening My Security Posture ................................................................................... 23 Dedicated Servers ............................................................................................................ 24 Media Sanitization .......................................................................................................... 24 7.4

Protecting Data from Unauthorized Access by Rogue Vendor Employees .............. 24

Data Encryption Key Management .................................................................................. 24 Vetting of Vendor’s Employees ....................................................................................... 24 Auditing Vendor’s Employees ......................................................................................... 24 Visitors to Data Centre ..................................................................................................... 24 Physical Tampering by Vendor’s Employees .................................................................. 25 Vendor’s Subcontractors .................................................................................................. 25 7.5

Handling Security Incidents ...................................................................................... 25

Timely Vendor Support .................................................................................................... 25 Vendor’s Incident Response Plan ..................................................................................... 25 Training of Vendor’s Employees ..................................................................................... 25 Notification of Security Incidents..................................................................................... 25 Extent of Vendor Support ................................................................................................. 26 My Access to Logs ........................................................................................................... 26 Security Incident Compensation ....................................................................................... 26 Data Spills......................................................................................................................... 26 8.

Recommended Model for Cloud Computing ................................................................... 27

9.

Conclusion ........................................................................................................................ 28

References ................................................................................................................................ 29

6

1.

Executive Summary

Cloud computing is a new way of delivering computing resources not a new technology (ENISA, November 20th, 2009). It can be defined as on demand self-service having ubiquitous network access, location independent resourcepooling, rapid elasticity and measured service (charges are applicable to the used resources). Cloud computing is not confined only to a computing model rather it is now a widely accepted computing service (typically web-based). A cloud primarily can be private or public (Anon., 2012). Using public cloud model only in the business is very risky because of its security reasons and using private cloud only will not solve our purpose because in that case we will not be able to use advantages of public cloud (Mishra, 2012). Privacy advocates criticize the cloud models because hosting company or cloud vendors posses its control and monitor at their will either lawfully or unlawfully or both. Use of the cloud services are getting popular for various reasons (i.e. cost effective, highly scalable, on-demand service, felexibility). Cloud security issues have become a new concern for the recent odd events of cloud services. For example, Amazon’s cloud went down in December 2009, subscribers on the U.S. east coast were unable to use their systems for several hours (Anon., 2012). Millions of customers of salesforce.com suffered a 38 minutes outage in early January 2009 (Anon., 2012). This paper covers the area of different cloud architecture & deployment models, benefits of cloud service, relevant and related risks, detail security considerations of cloud computing and a recommended model of cloud computing.

7

2.

Introduction

Cloud computing is a new economic model of computing. In this model, resources of computing are located in a virtualstorage even users are barely aware of the identity of the vendors of cloud service and do not know how the data are delivered. Cloud computing informally can be called a utility service like water, electricity, gas, telephony etc. . Cloud service serves a vast area (i.e storage facility, computer processiong, software and other services) as a pool of virtualized resources over a network (primarily over the internet). According to IDC’s analysis, the worldwide forcast for cloud services in 2009 will be in the order of $17.4bn. The estimation for 2013 amounts to $44.2bn, with the European market ranging from €971m in 2008 to €6005m in 2013 (ENISA, November 20th, 2009).

3.

Cloud Computing

It is not clear when the term cloud computing was first introduced. Bartholomew(2009), Bogatin (2006) and several others suggested that ‘cloud computing’ terminology was , perhaps, first coined by Google™ Chief Executive Eric Schmidt in 2006. Kaufman (2009:61) suggests that cloud computing terminology ‘originates from the telecommunications world of the 1990s, when providers began using virtual private network (VPN) services for data communication’. Desisto, Plummer and Smith (2008: 1) state that ‘[t]he first SaaS [Software as a Service] offerings were delivered in the late 1990s, although these offerings weren’t called cloud computing’ (Choo, October 2010). Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared (e.g. networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management or service provider interaction. This cloud model is composed of five essential characteristics (i.e. on demand self-service, broad network access, resource pooling, rapid elasticity and measured service), six service models [i.e. software as a service (saaS), Platform as a Service (PaaS), infrastructure as a service (IaaS), data as a service (DaaS), hardware as a service (HaaS), network as a service (NaaS)], four deployment models (i.e. private cloud, public cloud, hybrid cloud, community cloud) (Grace, September, 2011) (Anon., November, 2012) (Wikipedia, 31st March, 2013) (Alliance, 2009).

8

4.

Arhitecture and Deployment Model

4.1 Architecture of Cloud Computing Infrastructure as a Service (IaaS) Infrastructure as a Service (IaaS) is the foundation of cloud services. Consumers can take the advantage of processing

accessed using a web browser such as Mozila Firefox, Internet Explorer over the Internet) on Google’s infrastructure (Choo, n.d.).

power, storage, networking components or middleware on-demand. Infrastructure-asa-Service provides virtual server instances with unique IP addresses and blocks of storage on-demand (Mishra, November 2012). Consumers use the providers’ application program interface (API) to start, stop, access and configure their virtual servers and storage. Examples of IaaS providers include: Amazon EC2, Azure Services platform, Google compute engine, HP Cloud, Oracle Infrastructure as a service etc. (Wikipedia, n.d.). Platform as a Service (PaaS) Without buying and managing computing infrastructure, customers can access to the basic OS (Operating System) and optional services to develop and use software application (e.g. database access and payment service) through platform as-aService (PaaS). For example, Google App Engine allows clients to run their web applications (i.e. software that can be

Software as a Service (SaaS) Software as-a-Service (SaaS) builds upon Infrastructure

as-a-Service

(IaaS)

and

Platform as a Service (PaaS), provides clients with integrated access to software applications. For example: Google Apps, Microsoft Office 365, Onlive, GT Nexus etc. (Wikipedia, n.d.). Network as a Service (NaaS) Network as-a-Service (NaaS), provides access to the users to use network connectivity

and

inter-cloud

network

connectivity services. It is a unified service of network and computing resources which involves the optimization of resource allocation. Data as a Service (DaaS) Data as-a-Service (DaaS) is said the cousin of software as a service (SaaS) and a member of ‘as a service (aaS)’ family (Wikipedia, n.d.). It provides data on demand. DaaS offers data in various formats and from various sources can be

9

accessed via services by users on the

Hardware as-a-Service (HaaS). HaaS is

network in a transparent and logical way

flexible, scalable, and manageable to meet

(Mishra, November 2012).

clients’ needs (Mishra, November 2012)

Hardware as a Service (HaaS) Hardware virtualization, IT automation,

(Wikipedia, n.d.)

usage metering and pricing are the offers of

4.2 Deployment Model of Cloud Computing benefits include restriction free network Public Cloud Public cloud is a temporary extension of

bandwidth, data and others resources are

organizational infrastructure in which

organization. In addition, users access and

clients can enjoy reduced risks of their

networks are restricted and designated for

resources in a flexible way. A third party

the selected members of an organization.

providers or vendors offer this service to

Private cloud requires an organization a

clients/customers

Web

higher degree of virtualization and to

Services). Clients get this service via the

reevaluate existing resource decisions

Internet. Public cloud does not mean that

(Wikipedia, n.d.).

(e.g.

Amazon

controlled

and

monitored

within

data are publicly available or accessed, rather data and resources can be accessed through a access mechanism provided by the vendors. Standard cloud computing model is the basement of public cloud computing in which vendors accumulate resources (i.e. applications, storage) and make it available to the general public (through access mechanism) over the Internet.

Community Cloud Community cloud

infrastructure

is

specially provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (i.e. mission, security requirements, policy and compliance considerations) (Grance, September

2011).one

or

more

organizations or a third party or their combined entity can own, manage, monitor

Private Cloud The another name of private cloud is

this community cloud. It is more than a

corporate network of an organization or

which is costly than public cloud.

data center of proprietors. Private cloud

private cloud but less than a public cloud

10

Hybrid Cloud The emergence of hybrid cloud is from the

Hybrid cloud offers to get the benefit of those two basic clouds (i.e. public cloud,

combined form of private, public and

private cloud) including community cloud.

community cloud. Hybrid cloud ensures the

The highly sensitive and critical data and

allocation of resources to different public

service can be deployed on private

cloud is case one of the public clouds

(internal) cloud and less critical ata on

overloads (Vohra, January 19, 2011). The

public cloud and finally by integrating

nature of public cloud is a great issue for

those two can serve us the best. The success

adoption but the control of IT is on the hand

of this hybrid approach depends on how

of third party (vendor) which increases the

public and private cloud interacts and

security concern. On the other hand, private

works together in union (Mishra, 2012)

cloud can rescue us from the headache of

(Grance, n.d.).

security but it is limited in use and costly.

11

5. Benefits of Cloud Computing 5.4) Easy to Implement

5.1) IT Cost Reduction Cloud computing reduces costs of IT systems management and maintenance. Organizations do not have to buy expensive

A customer can use cloud computing without the need to purchase hardware, software licenses or implement services.

systems and equipment; they can reduce

5.5) Flexible

costs by using the resources from cloud

Cloud computing offers flexibility in work.

computing service providers. By moving to

A client gets the access to data from

the

significantly

anywhere he wants (i.e. home, offsite,

operating costs are reduced (i.e. costs of

office) and anytime (via the Internet

systems upgrades, wages for expert staffs).

connection). When a customer is in offsite,

cloud

computing,

he can set up a virtual office quickly and

5.2) Scalability To the consumers, the cloud appears to be infinite and consumer can purchase as much or as little computing power as they need. Cloud computing helps organizations to scale up or scale down operations and storage needs quickly to suit situation (Anon., Last Updated 5th April, 2013).

5.3) Business Continuity Protecting data and systems is a major concern for an organization to continue its business. If natural disaster, power failure

easily with the help of cloud computing service.

5.6) Access to Automatic Updates Access to automatic updates of IT requirements may include service fee. Depending on the cloud computing service provider, systems will be updated regularly with the latest technology. This includes up-to-date versions of software as well as upgrades

to

servers

and

computer

processing power (Government, n.d.).

happens, data stored in cloud ensures the data are backed up and protected in a secure and safe location. Cloud service allows to continue the business again without any loss of productivity.

5.7) Resiliency The potentiality of failure in a highly resilient

computing

environment

is

reduced. The failure of one node of a system is a cloud environment will have no impact on overall information availability

12

impact reducing the risk or perceivable downtime (Government, 2011).

6. Risks of Cloud Computing To identify the top threats, experts conducted a survey of industry experts to compile professional opinion on the greatest vulnerabilities within cloud computing. They identified nine critical threats to cloud computing: data breaches, data loss, account hijacking, insecure APIs, denial of service, malicious insiders, abuse of cloud services, insufficient due diligence, shared technology issues (Group, 2013).

6.1

machine to run concurrently through

Data Breaches

If the secret data of an organization go to

multiple virtual machine.

the hand of competitors, it will the most unexpected news for an organization. Weak design of cloud service database gives access to the attackers not only to single clients data but also every clients data. Experts say though data loss and leakage are both serious threats to cloud computing, the taken measure to mitigate threats can possibly exacerbate the others (group,

In

shared

tenancy

cloud

computing

environment, separate VMs can host data from different clients. The activities of one VM does not affect other even without any influence among different VMs because individual VM is unaware of others activities as all actions of an individual VM is confined to its own address space.

2013). Encryption of data can give the best

In a recent study, a team of computer

solution to avoid data breach but concern is

scientists from the University of California,

the loss of encryption key (loss of

san Diego and MIT examined the widely-

encryption key reflects the loss of data).

used Amazon Compute Cloud (EC2)

Shared Tenancy Environment A virtual machine (VM) works like a

Services. They found that ‘it is possible to map the internal cloud infrastructure,

software

identify where a particular target VM is

implementation of a computer that runs its

likely to reside, and then instantiate new

own operating system and application.

VMs until one is placed co-resident with

Different software application on different

the target (Choo, 2010). It can be stated that

OS (Operating System) in a single physical

they were able to install their own software

physical

machine.

It

is

a

on the targeted websites of the same

13

servers. This opens door for the attackers to

For example, In 2009 numerous Amazon

take control over the cache in order to steal

systems were hijacked to run Zesus botnet

data hosted on the same physical machine.

nodes

Such an attack is known as side-channel

experienced a cross-site scripting (XSS)

attack (Choo, 2010).

bug that allowed attackers to hijack

and in

April

2010, Amazon

credentials from this site (Group, 2013).

6.2) Data Loss In the summer 2012, attackers broke into Mat’s (Mat Honan, writer for Wired

6.4) Insecure Interfaces and APIs

magazine) Apple, Gmail and Twitter

Cloud customers manage and interact with

accounts and they used that accessed to

cloud services through a set of software

erase all of his personal data in those

interfaces or APIs provided by the cloud

accounts including all of the baby pictures

computing service vendors. All activities

Mat had taken of his 18-year-old daughter

(i.e.

(Group, 2013).

orchestration, monitoring) are done with

provisioning,

management,

these interfaces. If those interfaces are not If this happens to one of us, nothing can be

secure, cloud services are insecure to use.

worse than this loss of personal data. Malicious attackers are not the only reasons

Organizations and third parties often build

behind data loss rather various other

upon these interfaces to offer value-added

reasons can be liable for this occurrence.

services

For example, unconsciously cloud service

introduces a complex layer of API

provider can delete file.

including increased risk as organizations

to

their

customers

which

may be required to relinquish their

6.3) Account or Service Traffic Hijacking Though account or service traffic hijack is

credentials to third parties in order to enable their agency.

an old concept. Still attacks like phishing,

6.5) Denial of Service

fraud

software

In practical, denial of a service can be

vulnerabilities get succeed. If attackers get

compared as being caught in a rush-hour

access in the cloud environment by

traffic jam; there is no way to get to

hijacking password, they can control this

destination and nothing to do except just sit

according to their will ( i.e. manipulate

and wait. Attackers prevent users to get

data, return falsified information, redirect

access to cloud service to get stored data

clients to illegitimate sites) and they can use

and use applications. Sometimes DoS

this as their basement.

makes a user so frustrated that he becomes

and

exploitation

of

14

confused whether his decision to reduce

package or installed by an attacker who is

infrastructure costs by moving to cloud is

able to take advantage of the vulnerabilities

right or wrong. This attack slows down

of

system and attackers force victim cloud

AUgust 24, 2011).

service to consume resources such as processing power, memory, disk space or network bandwidth.

malicious

(McDowell,

“VM-based rootkits, as pointed out by Michael Price of the University of Southern attackers to gain complete control of the

an

underlying OS without the compromised

organization is a current or former

OS being aware of their existence and are

employee, contractor, or other business

especially dangerous because they also

partner who has or had authorized access to

control all hardware interfaces. Once VM-

an organizations network system, or data

based rootkits are installed to the machine,

and intentionally exceeded or misused that

they can view key strokes, network packets,

access in a manner that negatively affected

disk state, and memory state, while the

the confidentiality, integrity, or availability

compromised

of

(Choo, 2011).

the

insider

computers”

California, Irvine, could be used by

6.6) Malicious Insiders “A

targeted

organizations

threat

to

information

or

OS

remains

oblivious”

information systems” (Mellon, n.d.).

6.7) Abuse of Cloud Services From IaaS to PaaS and SaaS, the malicious

Cloud computing is available for all kinds

insider has increasing levels of access to

of organization. It gives much benefit to

more critical systems and data as a result

small organizations as they get vast

systems that completely depend on cloud

computing power that could be impossible

service provider (CSP) are at great risk.

to set up by themselves. At the same way,

Virtual Machine Based Malware Malware can attack and control virtual

cloud computing opens favorable doors for hackers and attackers who can use it for

machines for their vulnerabilities. Both

several abuses such as stage a DDoS attack,

server machines and customers can be

serve

exploited by VM-based rootkit.

software. This threat is not a concern for

“A rootkit is a piece of software that can be installed and hidden on a targeted computer without prior knowledge of the client. It may be included in a larger software

malware

or

distribute

pirated

clients rather for cloud vendors mostly. Brute Force A significant abuse of cloud computing is the use of visualized infrastructure as a launching pad for brute force and other

15

attacks. Brute force attack is a strategy used

web service, it would cost more than $US

to break encrypted data by typing all

1.5 million to brute force a 12-character

possible decryption key or password

password containing nothing more than

combinations.

lower-case letters ‘a through z’ but an 11-

Using Amazon EC2 as an example, a security consultant estimated that based on the hourly fees Amazon charges for its EC2

character code costs less than $60,000 to crack and a 10-letter phrase costs less than $23,000 (Choo, 2011).

7. Security Considerations of Cloud Computing In a sense, cloud computing security is not different from regular security. The security considerations of private cloud and public cloud (e.g. Microsoft Office 365) are marginally different. There are only two major distinctions between private and public cloud: geo-location and multi-tenancy. The Information Security Forum (ISF) recommends that cloud service providers should be treated like any other external supplier such as an outsourcer or offshore outsourcer, and should be covered by the same form of contract. To assist in this, the ISF has developed a four-step approach to working with external suppliers, which provides a consistent set of activities that can equally be applied to cloud service providers: ((ISF), 2011) : Step 1: Identify and classify third parties. Step 2: Agree third-party security. Step 3: Validate third-party security. Step 4: Agree termination terms. At the time of evaluation, implementation, management and maintenance of cloud computing solutions, five things must be considered carefully: compliance and risk management, identity and access management, service integrity, endpoint integrity and information protection. These considerations vary according to the use of cloud service.

16

This section of this paper provides a detail consideration guideline of cloud computing security. Five broad areas must be considered as security considerations: maintaining availability and business functionality, protecting data from unauthorized access by a third party, protecting data from unauthorized access by the vendor’s customers, protecting data from unauthorized access by rogue vendor employees and handling security incidents. The considerations are provided as various questions so that the answers of those questions can assist organizations to develop risk assessment. It should not be expected that single cloud service vendor can answer all of the questions; it will differ according to the requirement of organizations use of cloud service. The following considerations are designed by integrating a number of papers and articles of different organizations regarding this area such as National Institute of Standards and Technology(NIST) ((NIST), n.d.), European Network and Information Security Agency (ENISA) ((ENISA), 2009), Cloud Security Alliance (CSA) ((CSA), n.d.) ((CSA), n.d.), Australian Government (Government, Updated, September 2012), Microsoft (Cavit, January 2010), World Privacy Forum (Forum, 2009),International Journal of Advanced Research in Computer Science and Software Engineering (Bhavna Makhija, 2013), Victorian Government (Government, December 2011), TechGenix Ltd (Limited, 2013).

7.1

Maintaining Availability and Business Functionality

Answers to the following questions can reveal mitigations to help manage the risk of business functionality being negatively impacted by the vendor’s cloud services becoming unavailable: Business Criticality of Data or Functionality Am I moving business critical data or functionality to the cloud?

How much time does it take for my data and the services that I use to be recovered after a disaster, and do the vendor’s other customers that are larger and pay more

Vendor’s Business Continuity and Disaster Recovery Plan Can I thoroughly review a copy of the

money than me get prioritization?

vendor’s business continuity and disaster

My Data Backup Plan Will I spend additional

recovery plan that covers the availability

maintain an up to date backup copy of my

and restoration of both my data and the

data located either at my agency’s

vendor’s services that I use?

premises, or stored with a second vendor

money

to

17

that has no common points of failure

vendor that still affects me. Finally,

with the first vendor?

availability may also be affected by

My Business Continuity and Disaster Recovery Plan Will I spend additional money to replicate my data or business functionality

configuration mistakes made by the vendor including

those

resulting

from

poor

software version control and poor change management processes.

with a second vendor that uses a different data center and ideally has no common points of failure with the first vendor? This

replication

should

preferably be

configured to automatically “failover”, so that if one vendor’s services become unavailable, control is automatically and

Impact of Outages Can I tolerate the maximum possible downtime of the SLA? Are

the

scheduled

outage

windows

acceptable both in duration and time of day, or will scheduled outages interfering with my critical business processes?

smoothly transitioned to the other vendor. Typical My Network Connectivity to the Cloud Is the network connectivity between my agency’s users and the vendor’s network adequate in terms of availability, traffic throughput (bandwidth), delays (latency) and packet loss?

SLAs

that

guarantee 99.9%

availability can have up to nine hours of unscheduled outages every year without breaching the SLA. SLA Inclusion of Scheduled Outages Does the SLA guaranteed availability percentage include scheduled outages?

Vendor’s Guarantee of Availability Does the Service Level Agreement (SLA) guarantee that thevendor will provide adequate system availability and quality of service,

using

their

robust

system

architecture and business processes?

If not, the vendor may have numerous long scheduled outages, including emergency scheduled outages with little or no notice to customers, that do not result in a breach of the SLA. Vendors with distributed and redundant

computing

and

network

Availability may be affected by technical

infrastructure

issues such as computer and

network

maintenance to be applied in batches while

latency, hardware

customers are seamlessly transitioned to

performance

and

failures

faulty vendor

and

enable

scheduled

software.

computing and network infrastructure that

Availability may also be affected by

is still available and not part of the outage.

deliberate attacks such as denial of service attacks against me or other customers of the

18

SLA Compensation Does the SLA adequately reflect the actual damage caused by a breach of the SLA such as unscheduled downtime or data loss?

began deploying a software update that unexpectedly deleted all of the email belonging

to

tens

of

thousands

of

customers. This problem affected data in the

vendor’s

multiple

data

centers,

For example, most generic SLAs designed

highlighting the importance of having

for the consumer mass-market

offline backups in addition to redundant

typically

involve inadequate compensation such as a few hours of free service, or

a

credit,

data centers.

partial refund or other small discount

Data Restoration If I accidentally delete a file, email or other

on the monthly bill. The damage done

data, how much time does it take for my

to an agency’s reputation is not repaired by

data to be partially or fully restored from

receiving a token amount of free service or

backup, and is the maximum acceptable

refunded money.

time captured in the SLA?

For example, in February 2011 a major

Scalability How many available spare computing

vendor accidentally deleted thousands of files belonging to a paying customer, admitted negligence, initially stated

that

the files were not retrievable, and offered free service worth approximately $100 as compensation.

This

business

processes

and

my usage of the vendor’s services to scale at short notice?

also

Changing Vendor If I want to move my data to my agency or

training,

to a different vendor, or if the vendor

backup

suddenly becomes bankrupt or otherwise

example

highlighted deficiencies in staff

resources does the vendor provide to enable

quits the cloud business, how do I get

implementation.

access to my data in a vendor-neutral Data Integrity and Availability How does the vendor implement

format to avoid vendor lock-in?

mechanisms such as redundancy and offsite

How cooperative will the vendor be?

backups to prevent corruption or loss of my data, and guarantee both the integrity and the availability of my data? For example, in

February 2011 a major

vendor of email Software as a Service

How do I ensure that my data is permanently deleted from the vendor’s storage media? For Platform as-a-Service (PaaS), which standards does the vendor use that facilitate

19

portability and interoperability to easily move my application to a different vendor or to my agency?

7.2 Protecting Data from Unauthorized Access by a Third Party Answers to the following questions can reveal mitigations to help manage the risk of unauthorized access to data by a third party: Choice of Cloud Deployment Model Am I considering using a potentially less

Legislative Obligations What obligations do I have to protect and

secure public cloud, a potentially more

manage my data under various legislation,

secure hybrid cloud or community cloud,

for example the Privacy Act, the Archives

or a potentially most secure private cloud?

Act, as

Sensitivity of My Data Is my data to be stored or processed in the cloud classified, sensitive, private, or data that is publicly available such

as

information from my public web site?

well

as

other

legislation

specific to the type of data? Will

the vendor contractually accepts

adhering to these obligations to help me ensure that the obligations are met to the satisfaction of the Australian Government?

Does the aggregation of my data make it more sensitive than any individual piece of

Countries with Access to My Data In which countries is my data stored,

data?

backed up and processed?

For example, the sensitivity may increase

Which foreign countries does my data

if storing a significant amount of data, or

transit?

storing

a

variety

of

data

that

if

compromised would facilitate identity theft. If there is a data compromise, could I demonstrate my due diligence to senior

In which countries is the failover or redundant data centers? Will the vendor notify me if the answers to these questions change?

management, government officials and the

Data stored in, processed in, or transiting

public?

foreign countries may be subject to their laws. Such laws range from Freedom of Information requests by members of the

20

public, through to government lawful access mechanisms.

Media Sanitization What processes are used to sanitize the storage media storing my data at its

For example, a foreign owned vendor may

end of life, and are the processes deemed

be subject to their country’s laws even if the

appropriate by the DSD ISM?

vendor is operating within Australia. If the enforcement agency for access to data

Vendor’s Remote Monitoring and Management Does the vendor monitor, administer or

belonging to the vendor’s customers, the

manage the computers that store or process

vendor may be legally prohibited from

my data?

vendor is subpoenaed by a foreign law

notifying their customers of the subpoena.

If yes, is this performed remotely from

Data Encryption Technologies Are hash algorithms, encryption algorithms

foreign countries or Bangladesh?

and key lengths deemed appropriate by the

Can the vendor provide patch compliance

DSD ISM used to protect my data when it

reports and other details about the security

is in transit over a network, and stored on

of workstations used to perform this work,

both the vendor’s computers and on backup

and what controls prevent the vendor’s

media?

employees

from

using

untrustworthy

personally owned laptops? The ability to encrypt data while it is being processed by the vendor’s computers is still an emerging technology and is an area of current research by industry and academia. Is the encryption deemed strong enough to protect my data for the duration of time that my data is sensitive?

has

already

ecking,

compliance checking,

security

monitoring and network management, to obtain visibility of all my systems regardle ss of whether these systems are located locally or in the cloud?

For example, cloud computing processing power

My Monitoring and Management Can I use my existing tools for integrity ch

been

used

to

significantly reduce the time and cost of

Do I have to learn to use additional tools provided by the vendor?

using brute force techniques to crack and

Does the vendor even

recover relatively weak passwords either

mechanism for me to perform monitoring?

stored as SHA1 hashes or used as Wi-Fi Protected Access (WPA) pre-shared keys.

provide such a

Data Ownership Do I retain legal ownership of my data, or does it belong to the vendor

and may be

21

considered an asset for sale by liquidators

unsolicited commercial spam email is not i

if the vendor declares bankruptcy?

nherently malicious, and affects employee

Gateway Technologies What technologies does the vendor use to create a secure gateway environment?

productivity instead of the security of the a gency’s computer network.

Examples include firewalls, traffic flow fil

Policies and Processes Supporting the Vendor’s IT security Posture Can I have details of how the vendor’s co

ters, content filters, and antivirus software

mputer and network security posture is

and data diodes where appropriate.

supported by

Gateway Certification Is the vendor’s gateway environment certif

policies

and

processes

including threat and risk assessments, ongoing

vulnerability

ied against government security standards

change

management

and regulations?

incorporates security, penetration testing,

For example, several major vendors in Aus tralia use gateways

certified

by DSD

for data classified up to IN CONFIDENCE, PROTECTED

and in

some cases

HIGHLY PROTECTED.

management, process

a

that

logging and regular log analysis? Technologies Supporting the Vendor’s IT Security Posture Can I have details of how thevendor’s com puter and network security posture is supp orted by direct technical

control

Email Content Filtering For email Software as a Service, does the v

including timely application of security

endor provide

software, defense in depth mechanisms

customizable email

content filtering

that

can enforce

patches,

regularly

updated

antivirus

to protect against unknown vulnerabilities,

my agency’s email content policy?

hardened operating systems and software a

For example, an agency may have a

pplications configured with the strongest p

“blacklist” email policy of “No executable

ossible security settings, intrusion detection

email attachments allowed” or better yet a

and prevention systems, and data loss

“white list” policy of what is allowed (such

prevention mechanisms?

as .doc .pdf .ppt .xls .jpg and .zip files

Auditing the Vendor’s IT Security Posture Can I audit the vendor’s implementation of

containing file types)

the previously

mentioned and

everythingelse is blocked by default. Spam filtering is not necessarily email content fi ltering, since

security measures, including performing s cans and

other

penetration testing of

environment provided to me?

22

If there is a justifiable reason why auditing

ng unapproved or insecure computing devi

is not possible,

ces without

which reputable third

party has

performed audits

and other vulnerability assessments?

a trusted

operating

environment to store or process sensitive data accessed using Software as-a-Service

What sort of internal audits does the vendo r perform, and which compliance standard s and other recommended practices from o rganisations such as the Cloud Security All

(SaaS)? Vendor’s Physical Security Posture Does the vendor use physical security prod ucts anddevice that are endorsed by the Australian Government?

iance are used for these assessments? Can I thoroughly review a copy of recent r

How is the vendor’s physical data centre d esigned to prevent the tampering or theft o

esulting reports?

f servers, For example, a major vendor in Australia advertises that it

infrastructure and the

data stored thereon?

uses “ISO 27001

accredited centers which can be audited

ted by an authoritative third party?

by you and your regulators”. User Authentication What identity and access management syst ems does the vendor

Is the vendor’s physical data centre accredi

support for

For example, several major vendors in Aus tralia advertise using data

centers

accredited

by

users to log in to use Software as-a-Service

the Australian Security Intelligence

(SaaS)?

Organization T4 Protective Security.

Examples include two factor

Software and Hardware Procurement What procurement process is used to ensur

authentication, synchronization with the agency’s Active

Directory

and

other

federated single sign‐on.

e that cloud infrastructure software and hardware has been supplied by a legitimate source

Centralized Control of Data What user training, policies and technical c ontrols prevent my agency’s users from usi

and has not been maliciously modified in transit?

23

7.3 Protecting Data from Unauthorized Access by the Vendor’s Customers Answers to the following questions can reveal mitigations to help manage the risk of unauthorized access to data by the vendor’s other customers: application such as email server or database

Customer Segregation What assurance do I have that the

software.

virtualization

“multi-tenancy”

For example, in December 2010 a major

mechanisms guarantee adequate logical and

vendor of Software as-a-Service (SaaS)

network segregation between multiple

admitted that a configuration mistake

tenants, so that a malicious customer using

caused a security breach that resulted in the

the same physical computer as me cannot

exposure of “offline” email address books

access my data?

belonging to customers, and confirmed

For Infrastructure as-a- Service (SaaS), the

there was unauthorized access by the

virtualization software used to share

vendor’s other customers.

and

hardware and provide each customer with

Weakening My Security Posture

their own operating system environment

How would using the vendor’s cloud

was typically not originally designed to

infrastructure weaken my agency’s existing

provide segregation for security purposes.

network security posture?

However,

the

developers

of

such

virtualization software are increasingly focusing their efforts on making their software more suitable for this purpose.

Would the vendor advertise me as one of their

customers

without

my explicit

consent, thereby assisting an adversary that is specifically targeting me?

What controls are in place to detect and prevent a tenant exploiting a publicly unknown or un-patched vulnerability in a hypervisor?

For example, an adversary could use cloud infrastructure from the same vendor used by the target agency, to both serve malicious web content to the agency’s

For Software as-a-Service (SaaS), the

users, and to ex-filtrate the agency’s

logical separation between customers is

sensitive data.

usually less well defined, and in some cases

adversary to circumvent the agency’s use of

the

be

security technologies such as white listing

software

which domains and IP address ranges can

separation

retrofitted

to

mechanism an

existing

may

This may enable an

be accessed, and which web sites can run

24

active content such as JavaScript in the web

Media Sanitization

browser.

When I delete portions of my data, what processes are used to sanities the storage

Dedicated Servers Do I have some control over which physical computer runs my virtual machines? Can I pay extra to ensure that no other customer can use the same physical computer as me e.g. dedicated servers or virtual private cloud?

media before it is made available to another customer, and are the processes deemed appropriate by the DSD ISM? For example, a vendor advertises that when a customer deletes data, “the physical space on which the data was stored is zeroed over before the space is re-used by other data”.

7.4 Protecting Data from Unauthorized Access by Rogue Vendor Employees Answers to the following questions can reveal mitigations to help manage the risk of unauthorized access to data by rogue vendor employees: Data Encryption Key Management Does the vendor know the password or key

For example, in September 2010 a major vendor acknowledged sacking an

used to decrypt my data, or do I encrypt and

employee for allegedly deliberately

decrypt the data on my computer so the

violating the privacy of users by

vendor only ever has encrypted data?

inappropriately reading their electronic

Vetting of Vendor’s Employees What personnel employment checks and vetting processes does the vendor perform to ensure that employees are trustworthy? Examples include thorough police background checks, as well as citizenship

communications during a timeframe of several months. Auditing Vendor’s Employees What robust identity and access management system do the vendor’s employees use?

checks, security clearances and

What auditing process is used to log and

psychological assessments especially for

review the actions performed by the

employees with administrative privileges

vendor’s employees?

or other access to customer data.

Visitors to Data Centre Are visitors to data centers escorted at all times, and are the name and other personal

25

details of every visitor verified and

wrong computers, and to help readily

recorded?

highlight any deliberate attempts by the

Physical Tampering by Vendor’s Employees Is network cabling professionally installed to internationally acceptable standards, to help avoid the vendor’s employees from accidentally connecting cables to the

vendor’s employees to tamper with the cabling? Vendor’s Subcontractors Do the answers to these questions apply equally to all of the vendor’s subcontractors?

7.5 Handling Security Incidents Answers to the following questions can reveal a vendor’s ability to handle security incidents: Timely Vendor Support Is the vendor readily contactable and responsive to requests for support, and is

that is similar to incident handling procedures detailed in the DSD ISM? Can I thoroughly review a copy?

the maximum acceptable response time captured in the SLA or simply a marketing claim that the vendor will try their best?

Training of Vendor’s Employees What qualifications, certifications and regular information security awareness

Is the support provided locally, or from a

training do the vendor’s employees

foreign country, or from several foreign

require, to know how to use the vendor’s

countries using an approach that follows

systems in a secure manner and to identify

the sun?

potential security incidents?

What mechanism does the vendor use to

Notification of Security Incidents Will the vendor notify me via secure

obtain a real-time understanding of the security posture of my use of the vendor’s services so that the vendor can provide support?

communications of security incidents that are more serious than an agreed threshold, especially in cases where the vendor might be liable?

Vendor’s Incident Response Plan Does the vendor have a security incident

Will the vendor automatically notify law

response plan that specifies how to detect

enforcement or other authorities, who may

and respond to security incidents, in a way

confiscate computing equipment used to store or process my data?

26

Extent of Vendor Support How much assistance will the vendor

Data Spills If data that I consider is too sensitive to be

provide me with investigations if there is a

stored in the cloud is accidentally placed

security breach such as an unauthorized

into the cloud, referred to as a data spill,

disclosure of my data, or if there is a need

how can the spilled data be deleted using

to perform legal electronic discovery of

forensic sanitization techniques?

evidence?

Is the relevant portion of physical storage

My Access to Logs How do I obtain access to time

media zeroed whenever data is deleted?

synchronized audit logs and other logs to

If not, how long does it take for deleted

perform a forensic investigation, and how

data to be overwritten by customers as part

are the logs created and stored to be

of normal operation, noting that clouds

suitable evidence for a court of law?

typically have significant spare unused storage capacity?

Security Incident Compensation How will the vendor adequately

Can the spilled data be forensically deleted

compensate me if the vendor’s actions,

from the vendor’s backup media?

faulty software or hardware contributed to a security breach?

Where else is the spilled data stored, and can it be forensically deleted?

27

8. Recommended Model for Cloud Computing USER

Major Access Control (Cipher and Decipher Code)

User Purposes Encryption/Decryption Key Management

Encryption/Decryption Key Management

Private Cloud

Community Cloud

Public Cloud

IaaS

IaaS

IaaS

Paa S

Paa S

Paa S

Saa S

Saa S

Saa S

Naa S

Naa S

Naa S

Daa

Daa

Daa

28

9. Conclusion The recommended model is a highly secure hybrid model that ensure all the facilities of cloud computing. Implementing the recommended model and satisfying the security considerations may give an organization maximum security confirmation in using cloud computing services. This model works in two sides: (i) defines the flow of information; (ii) confines the flow of information (red marked). Maintaining the information flow among the cloud models (private, public, community), an organization can get optimal security. We do not expect that any single cloud vendor can satisfy answers of all the questions rather we expect variation and above 70% of performance. We suggest massive research in this concentration so that world can get the benefit of cloud computing services with the best security along with satisfaction.

29

References (CSA), C. S. A., n.d. Security Guidance. (CSA), C. S. A., n.d. Top Threats to Cloud Computing. (ENISA), E. N. a. I. S. A., 2009. Cloud Computing Security Risk Assessment. November. (ISF), I. S. F., 2011. Driving Out the Seven Deadly Sins of Cloud COmputing. (NIST), N. I. o. S. a. T., n.d. Cloud Computing. Alliance, C. S., 2009. https://cloudsecurityalliance.org/. Anon., 2012. In: Management Information Systems (managing the digital firm). 12th Edition ed. s.l.:Pearson, pp. 183-184. Anon., 2012. Cloud Computing. In: Management Infroamtion Systems(managing the digital firm). 12th Edition ed. s.l.:Pearson, p. 183. Anon., 2012. How Secure is the Cloud?. In: Management Information Systems (managing the digital firm). 12th Edition ed. s.l.:Pearson, p. 321. Anon., Last Updated 5th April, 2013. Cloud computing for business, s.l.: http://www.business.qld.gov.au/business/running/technology-for-business/cloud-computingbusiness. Anon., November, 2012. Implement CLoud Computing Model for Business Inforamtion Systems Security. International Journal of Current Research, 4(11), pp. 121-125. Bhavna Makhija, V. G. &. I. R., 2013. Enhanced Data Security in Cloud Computing with Third Party Auditor. International Journal of Advanced Research in Computer Science and Software Engineering , February.3(2). Cavit, R. H. &. D., January 2010. Cloud Computing Security Considerations, s.l.: http://go.microsoft.com/?linkid=9708479. Choo, K.-K. R., 2010. Cloud computing: Challenges and future directions, s.l.: Australian Government. Choo, K.-K. R., 2010. Cloud Computing: Challenges and Future Directions, s.l.: Australian Government. Choo, K.-K. R., 2011. Cloud Computing Risks. Information Age, January-february.pp. 49-51. Choo, K.-K. R., 2011. Cloud Computing Risks. Information Age, January-february.pp. 49-51. Choo, K.-K. R., n.d. Cloud computing: Challenges and future directions. Trends & issues in crime and criminal justice, No. 400. Choo, K.-K. R., October 2010. Cloud computing: Challenges and future directions. Trends & issues in crime and criminal justice , No. 400. ENISA, November 20th, 2009. Cloud Computing Risk Assessment. pp. 4-4.

30

ENISA, November 20th, 2009. Cloud Computing Risk Assessment. pp. 4-4. Forum, R. G. &. W. P., 2009. Privacy in the Clouds: Risks to Privacy and Conf identiality f rom Cloud Computing. February 23.Volume 1.1. Government, A., 2011. Opportunities and applicabilityfor use by the Australian Government. CLOUD COMPUTING STRATEGIC DIRECTION PAPERR, April.Volume 01. Government, A., Updated, September 2012. Cloud Computing Security Considerations , s.l.: http://www.dsd.gov.au/infosec/cloudsecurity.htm. Government, Q., n.d. Cloud computing for business, s.l.: http://www.business.qld.gov.au/business/running/technology-for-business/cloud-computingbusiness . Government, V., December 2011. Cloud Computing Security Considerations, s.l.: www.dtf.vic.gov.au/cio. Grace, P. M. &. T., September, 2011. The NIST definition of cloud computing, s.l.: s.n. Grance, P. M. &. T., n.d. The NIST Definition of Cloud Computing, s.l.: Special Publication 800-145 . Grance, P. M. &. T., September 2011. The NIST Definition of Cloud Computing, s.l.: Special Publication 800-145. Group, T. T. W., 2013. The Notorious Nine : Cloud COmputing Top Threats in 2013, s.l.: CLoud Security Alliance. Group, T. T. W., 2013. The Notorious Nine: Cloud Computing Top Threats 2013, s.l.: Cloud Security Alliance. group, T. T. W., 2013. The Notorious Nine: Cloud Computing Top Threats in 2013. Cloud Security Alliance (CSA), February. Group, T. T. W., 2013. The Notorious Nine: Cloud Computing Top Threats in 2013. Cloud Security Alliance, February. Limited, T., 2013. Security Considerations for Cloud Computing (Part 2), s.l.: http://www.windowsecurity.com/articles-tutorials/Cloud_computing/SecurityConsiderations-Cloud-Computing-Part2.html. McDowell, M., AUgust 24, 2011. Understanding Hidden Threats: Rootkits & Bootnets, s.l.: http://www.us-cert.gov/ncas/tips.ST06-001. Mellon, C., n.d. s.l.: http://www.cert.org/insider_threat/. Mishra, D. B. M. &. V., 2012. Implement Cloud Computing Model for Business Information System Security. International Journal of Current Reserch, November , 4(11), pp. 121-125. Mishra, D. B. M. &. V., 2012. Implement Cloud Computing Model For Business Information System Security. 04(11), pp. 121-125. Mishra, D. B. M. &. V., November 2012. Implement Cloud Computing Model for Business Information System Security. International Journal of Current Research, 4(11), pp. 121-125.

31

Mishra, D. B. M. &. V., November 2012. Implement Cloud Computing Model for Business Information System Security. International Journal of Current Research, 4(11), pp. 121-125. Mishra, D. B. M. a. V., November 2012. Implement Cloud Computing Model for Business Information Systems Security. International Journal of Current Research, 4(11), pp. 121125. Vohra, D., January 19, 2011. Hybrid Cloud Computing: The Future Trend in Cloud. Cloud Computing Journal. Wikipedia, 31st March, 2013. Cloud Computing. http://en.wikipedia.org/wiki/Cloud_computing. Wikipedia, n.d. Cloud Computing. Wikipedia, n.d. Data as a Service. Wikipedia, n.d. Hardware as a Service. Wikipedia, n.d. Private Cloud. Wikipedia, n.d. Software as a Service.