Page 149 - Big data - Concept and application for telecommunications
P. 149

Big data - Concept and application for telecommunications                       4


            9.12    Service security assessment and audit

            This capability enables the security evaluation of cloud computing services. It enables an authorized party to
            verify  that  a  cloud  service  complies  with  the  applicable  security  requirements.  Security  assessment  or
            security audit could be performed by the CSC, CSP or a third party (CSN), and security certification could be
            performed by an authorized third party (CSN).
            Appropriate security criteria are implemented so as to provide a mutual understanding of the security level
            between the CSC and CSP.

            Each CSP and each of their services may have the security level regarding the CSP's security controls and their
            effectiveness. Advertised security levels of the CSPs and their services will help facilitate the comparison and
            selection of appropriate CSPs and cloud computing services. Independent trusted third parties may be used
            to provide reliable, independent and neutral security level assessments.

            To avoid a CSP conducting individual security audits for each CSC, common service audit results will be
            appropriately reused. For a CSP covering a wide range of cloud computing services, security audits may be
            conducted on each cloud computing service. The CSP may provide the appropriate audit results of all or part
            of the cloud computing services to an authorized CSC (e.g., potential customer), and to certain other CSPs
            and CSNs (e.g., third-party auditor).
            For a cloud computing service chain, the security audit results of a downstream service provider will integrate
            the relevant security audit results of upstream service providers.

            9.13    Interoperability, portability and reversibility

            This capability enables the coexistence and cooperation of heterogeneous components (interoperability), it
            enables CSCs to replace one CSP with another where appropriate (portability), and enables CSCs to transfer
            their ICT system from a cloud computing environment back to a non-cloud computing ICT infrastructure
            (reversibility). This reversibility will also enable the "right to be forgotten" if this is required by local laws or
            regulations.
            NOTE 1 – This capability is only responsible for the interoperability and portability of cloud computing security
            functions, not of the actual data, metadata or message formats, which are the responsibility of other cloud
            computing  platform  functions.  For  example,  this  capability  might  provide  transitional  encryption,  key
            management and identity information so that data and other content can be moved between two different
            encryption systems without exposing either the system(s) or the data in transit.
            NOTE 2 – The "right to be forgotten" is not yet clearly defined and may in some cases be constrained by
            regulatory requirements to retain certain data for a minimum period, such as call records or connection
            information. It may therefore also be necessary to retain the relevant keys or other security information for
            the same period.


            9.14    Supply chain security
            A CSP uses a number of suppliers to build their services. Some of these will be cloud industry participants,
            e.g., a CSN, while others will be traditional information technology (IT) equipment or service suppliers, e.g.,
            hardware  manufacturers  with  no  direct  relationship  with  cloud  computing.  This  capability  enables  the
            establishment of a trust relationship between the CSP and all participants in the supply chain by security
            activities. These supply chain security activities involve identifying and gathering information about the CSP's
            acquired components and services that are used to provide cloud computing services, and enforcing supply
            chain security policies.

            For example, typical supply chain security activities in a CSP may include:
            •       confirmation of background information about the participants in the supply chain;
            •       validation of hardware, software and services employed by the CSP;
            •       inspection of the hardware and software purchased by the CSP so as to ensure that it was not
                    tampered with while in-transit;



                                                                   Security, privacy and data protection   141
   144   145   146   147   148   149   150   151   152   153   154