Page 145 - Big data - Concept and application for telecommunications
P. 145

Big data - Concept and application for telecommunications                       4


            While lock-in is a business issue, it is not in itself a security threat. However, it can sometimes give rise to
            security concerns. For example, if the CSN who supplies a key component goes out of business, it may be that
            no further security patches are available. Where vulnerability in the component emerges, it may be very
            difficult or expensive to mitigate the risk.

            8.2.9   Supply chain vulnerability

            A CSP is at risk if hardware or software delivered to the platform through their supply chain undermines CSC
            or  CSP  security,  for  example,  the  accidental  or  deliberate  introduction  of  malware  or  exploitable
            vulnerabilities.
            A case in point would be bad software from the CSN. This security challenge exists for CSN software running
            in  the  CSP,  such  as  customer  facing,  a  virtual  machine  (VM)  guest  operating  system  (OS),  applications,
            platform components, or audit/monitoring software (e.g., for a partner providing a service audit).
            Another example is when a CSP is running software provided by a partner; the CSP is at risk if the partner
            fails to provide the necessary security updates in a timely manner.
            8.2.10  Software dependencies

            When vulnerability is detected, it may not be possible to apply updates immediately because doing so would
            break other software components (though those components may not otherwise require updating). This is
            particularly true if the dependency exists between components provided by one or more CSNs, rather than
            the CSPs themselves.

            8.3     Security challenges for cloud service partners (CSNs)

            This clause considers challenges that directly affect CSNs. Such challenges might affect the ability of a CSN to
            do business, to get paid, to protect their intellectual property, and to avoid legal or regulatory difficulties.
            Security  challenges  to  a  given  CSN  will  depend  on  their  specific  business  and  environments,  such  as
            development, integration, audit, or otherwise.
            8.3.1   Ambiguity in responsibility

            Where there is a mix of CSP and CSN software running in the service, it may not be apparent to the CSC where
            the  responsibility  for  mitigation  and  handling  of  security  incidents  resides.  It  may  be  quite  difficult  to
            determine the responsible entity by technical analysis. This could result in mutual finger-pointing between
            the CSP and CSN(s) as to who is at fault, which could result in further breaches if the root cause is not found.
            8.3.2   Misappropriation of intellectual property

            When partners submit software or other assets to the CSP for execution, the security challenge exists that
            this material could be leaked to third parties or misappropriated for unauthorized use. This could include a
            violation of copyright or the exposure of trade secrets.

            8.3.3   Loss of software integrity
            Once the partner's software is running in the CSP, there is a possibility of the software being modified or
            infected while it is out of the direct control of the CSN, thus causing their software to misbehave in some
            way. Although this possibility exists outside the CSN's control, it could seriously affect their reputation and
            thus their business.


            9       Cloud computing security capabilities

            This  Recommendation  identifies  the  following  security  capabilities  against  identified  cloud  computing
            security threats and challenges. Parameters related with these security capabilities may be stipulated in the
            security service level agreement (SLA), for example, an incident response time.








                                                                   Security, privacy and data protection   137
   140   141   142   143   144   145   146   147   148   149   150