Page 147 - Big data - Concept and application for telecommunications
P. 147

Big data - Concept and application for telecommunications                       4


            For CSP, the hypervisor often provides protection for hosted VMs, for example, by providing anti-virus and
            anti-spam processing inside hypervisors, so that VMs do not need to implement these functions separately.
            The hypervisor will normally be configured with the minimum set of services. Unnecessary interfaces and
            application  programing  interfaces  (APIs)  will  normally  be  closed,  and  irrelevant  service components will
            normally be disabled.
            VMs covered by this capability include those created by CSC in IaaS, as well as any VMs created by SaaS and
            PaaS. Virtual machines will usually be well isolated when sharing memory, a central processing unit (CPU)
            and storage capacities. Virtual machines will usually have intrinsic security capabilities and policy awareness
            (e.g., in the guest operating system).

            9.6     Network security
            In a cloud computing environment, network security enables both physical and virtual network isolation, and
            secures  communications  among  all  participants.  It  enables  network  security  domain  partition,  network
            border access controls (e.g., firewall), intrusion detection and prevention, network traffic segregation based
            on  security  policies,  and  it  protects  the  network  from  attacks  in  both  the  physical  and  virtual  network
            environments.

            9.7     Data isolation, protection and confidentiality protection

            This capability addresses general data protection issues which often have legal implications.
            •      Data isolation
            In a cloud computing context, a tenant is prevented from accessing data belonging to another tenant, even
            when the data is encrypted, except when explicitly authorized. Data isolation may be realized logically or
            physically, depending on the required isolation granularity and the specific deployment of cloud computing
            software and hardware.

            NOTE 1 – In cloud computing, isolation occurs at the tenant level. A given CSC may have multiple tenants in
            the cloud, for example, to separate different subsidiaries, divisions or business units.
            •      Data protection

            Data  protection  ensures  that  CSC  data  and  derived  data  held  in  a  cloud  computing  environment  is
            appropriately protected so that it can only be accessed or changed as authorized by the CSC (or according to
            applicable law). This protection may include some combination of access control lists, integrity verification,
            error correction/data recovery, encryption and other appropriate mechanisms.
            When a CSP provides storage encryption for CSCs, this function can be client-side encryption (e.g., within a
            CSP application) or server-side encryption.
            •       Confidentiality protection

            Private information can include PII and confidential corporate data. The collection, use, transfer, handling,
            storage and destruction of private information can be subject to confidentiality regulations or laws. This
            restriction applies to both CSPs and their CSCs, e.g., a CSC must be able to permanently delete a data table
            containing private information, even though the CSP is not aware of the table contents. CSPs may also need
            to support the handling, e.g., searching of a CSCs' data in their transformed or encrypted form.

            Confidentiality  protection  extends  to  private  information  that  may  be  observed  or  derived  from  CSC
            activities, such as business trends, relationships or communications with other parties, activity levels and
            patterns, etc.

            Confidentiality protection is also responsible for ensuring that all private information (including observed or
            derived data) is used only for those purposes which have been agreed between a CSC and CSP.

            A risk assessment of private information (noted as "confidentiality risk assessment") can assist a CSP in
            identifying the specific risks of confidentiality breaches involved in an envisaged operation. The CSP should
            identify and implement capabilities to address the confidentiality risks identified by the risk assessment and
            treatment of private information.


                                                                   Security, privacy and data protection   139
   142   143   144   145   146   147   148   149   150   151   152