|(Continuation of Q8/17)|
Cloud computing is a model for enabling service user’s ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services), that can be rapidly provisioned and released with minimal management effort or service provider interaction. The cloud computing model is defined by five essential characteristics (on-demand, delivery over a broad network access, resource pooling, rapid elasticity, self and measured services), five cloud computing service categories, i.e., Software as a Service (SaaS), Communication as a Service (CaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS) and Network as a Service (NaaS), and different deployment models (public, private, hybrid…). The advent of the cloud computing approach as the preferred vehicle for discovering, externalizing, composing, service re-use within workflows, applications, communication enabled applications places new emphasis on the need for security.
Forecasted benefits of cloud computing include flexible and dynamic resource provisioning, and simpler and automated administration of IT infrastructure. Virtualization makes possible to share of nearly unlimited resources, with scalability improvements and massive cost reductions for infrastructure management. However, open systems and shared resources of cloud computing raise many concerns about security, which is perhaps the most important barrier to the adoption of cloud computing. Moving to the cloud implies to shifting from safe, traditional, in-house IT systems to unsafe, “cloudified”, open infrastructures. It thus requires in-depth rethinking of security.
Cloud computing was considered for several years as service-centric IT and controlled by Internet players. However, telecommunication players have an important role to play in the emerging cloud computing market and ecosystem. As cloud services are delivered through telecommunication networks, telecommunication players should guarantee a high assurance level. Strong but flexible security protection will be a key enabler for the whole cloud market and eco-system.
In addition, the flexible use of rich resources in cloud computing environments will enable new security services that the current premise defences cannot provide (e.g. anti-malware services as a cloud service). Thus, there is need to examine what kind of security measures cloud computing can offer in the near future.
Draft Recommendations ITU‑T X.ccsec, X.srfcts and X.sfcse provide a set of Recommendations on security service for cloud security overview, architecture and framework, cross-layers cloud security and specific security of network services. Currently there is a strong need for securing cloud computing enabled critical voice, multi-media, identity based services, information assurance services, identity and data services, and emergency based services. This Question is intended to develop new Recommendations based on the Focus Group Cloud Technical Report Part 5 for:
best practices and guidelines development to guide on how to provide security in a cloud computing based environment;
responsibility clarification, and security requirements and threats definition for the main actors and related roles in the cloud computing ecosystem;
security architecture based on the reference architecture provided by Q18/13;
security management and audit technologies for the trust management.
Question 8/17 will collaborate with related Questions such as 2/17, 3/17, 4/17, 7/17, 10/17 and 11/17 to develop Recommendations on cloud computing security.
Recommendations under responsibility of this Question as of 1 December 2012: None.
Texts under development: X.ccsec, X.fsspvn, X.goscc and X.sfcse.
Study items to be considered include, but are not limited to:
What new Recommendations or other type of documents should be developed for main actors like service providers, service users and services partners, and other key industry stakeholders to advance cloud computing security?
What new Recommendations should be developed for security architecture and security functionalities organization in line with the reference architecture?
What new Recommendations should be developed for security management, assurance mechanisms, audit technologies, and associated risks assessment to establish trust among different actors?
Under the auspices of the Joint Coordination Activity on cloud computing (JCA-cloud), what collaboration is necessary to minimize duplication of efforts with other Questions, study groups, and SDOs?
How security as a service should be developed to protect telecommunication/ICT systems?
Tasks include, but are not limited to:
Developing Recommendations or other type of documents to advance cloud computing security.
Developing Recommendations to identify security requirements and threats to secure cloud computing services based on the general requirements of cloud computing specified by ITU‑T Study Group 13.
Developing Recommendations to define security architecture and to organize security functions based on the reference architecture specified by ITU‑T Study Group 13.
Developing Recommendations to define a strong, flexible and elastic security management architecture and implementation for cloud computing systems.
Developing Recommendations to identify assurance mechanisms, audit technologies, risk assessment with the objective of achieving trustworthy relationships within the cloud computing ecosystem.
Taking charge of all the Study Group 17 activities on cloud computing security.
Representing the work of Study Group 17 related to cloud computing security in the Joint Coordination Activity on cloud computing (JCA-Cloud).
ITU‑T Questions 1/17, 2/17, 3/17, 4/17, 7/17, 10/17 and 11/17