Page 150 - Big data - Concept and application for telecommunications
P. 150

4                                Big data - Concept and application for telecommunications



            •       providing  mechanisms  to  verify  the  provenance  of  cloud  service  software,  for  example,  code
                    provided by a CSN. Where applicable, CSNs and their host CSPs provide a process to verify the
                    integrity of the CSN's software component to ensure that it is exactly as delivered and has not been
                    modified or compromised. Some CSNs may demand the means to verify this directly by themselves.

            This capability is continuous to cover ongoing system evolution and updates.


            10      Framework methodology
            To develop a security framework for cloud computing means understanding what threats and challenges
            exist, as was discussed in clauses 7 and 8, for the chosen specific cloud service along with the business,
            technology and regulatory requirements which are to be taken together to identify security controls, policies
            and procedures that will be needed for a given cloud service. The capabilities described in clause 9 to address
            and  mitigate  these  threats  and  challenges  are  then  used  to  develop  the  security  controls,  policies  and
            procedures for the chosen specific cloud computing service. This Recommendation focuses on what the
            needs  are  for  security  in  a  cloud  computing  environment,  the  threats  and  challenges  of  a  traditional
            computing environment exist within the cloud environment and as such following the standards and best
            practices defined by the industry should be followed in addition to this Recommendation.
            The methodology described here should be followed to create the framework that will identify what security
            controls, policies and procedures will be needed for a specific given cloud computing service. It is not possible
            to provide a single normative framework for all cloud computing services, since they vary greatly in business
            model, services offered and implementation choices:
            •       Step 1: Use clauses 7 and 8 to identify security threats and security implications of the challenges in
                    the cloud computing service under study.
            •       Step 2: Use clause 9 to identify the needed high-level security capabilities based on identified threats
                    and challenges which could mitigate security threats and address security challenges.
            •       Step 3: Derive security controls, policies and procedures which could provide the security abilities
                    that are needed based on identified security capabilities.
            NOTE – A set of appropriate requirements with respect to the security capabilities will need to be determined
            by the CSC and CSP using appropriate standards. This determination will be based on the risk assessment.
            To identify which security threats and challenges are relevant for the cloud service under study, each threat
            or challenge should be reviewed. One approach could be as simple as a table showing a 'Y' next to the threat
            or challenge.
            For an example using this approach, when the CSP provides file storage as a service to individual users, the
            CSP would like to understand what security threats and challenges users are mainly concerned about, and to
            analyse what security threats and challenges that CSP mainly needs to address. Table 1 demonstrates this
            approach.

                          Table 1 – Example of security framework analysis step 1 for file storage as a service

                                                                                       Is this applicable to this
                        Area of analysis                Specific threat or challenge
                                                                                              service?
             Clause  7.1  Security  threats  for  cloud  Clause 7.1.1 Data loss and leakage      Y
             service customers (CSC)
                                                  Clause 7.1.2 Insecure service access           Y
                                                  Clause 7.1.3 Insider threats
             Clause  7.2  Security  threats  for  cloud  Clause  7.2.1  Unauthorized  administration   Y
             service providers (CSPs)             access
                                                  Clause 7.2.2 Insider threats                   Y
             Clause 8.1 Security challenges for cloud  Clause 8.1.1 Ambiguity in responsibility   Y
             service customers (CSCs)
                                                  Clause 8.1.2 Loss of trust                     Y

            142      Security, privacy and data protection
   145   146   147   148   149   150   151   152   153   154   155