Page 1021 - Cloud computing: From paradigm to operation
P. 1021

Security                                                   7


            7.5     Security controls in migrate stage

            Guidelines for security controls in the migrate stage include the following:
            a)      Network  connectivity  should  be  assessed  prior  to  data  migration  to  ensure  the  safety  of  the
                    migration process.
            b)      CSPs should ensure that data integrity and confidentiality is not affected during a migration.
            c)      CSPs should ensure that data migration does not affect the continuity of services and applications.
            d)      CSPs should conduct data backup and recovery-related work appropriately during data migration.
            e)      CSPs should establish a migration scheme, assess its feasibility and associated risks, then develop
                    risk control measures accordingly as preparations for data migration.

            7.6     Security controls in destroy stage
            Guidelines for security controls in the destroy stage include the following:
            a)      CSPs should be able to erase all key material related to encrypted data.
            b)      CSPs  should  utilize  physical  destruction,  such  as  degaussing  of  physical  media  when
                    decommissioning storage hardware.
            c)      CSPs should utilize data recovery techniques to confirm destruction processes.
            d)      CSPs should be able to provide means to help clear legacy data caused by the migration of data
                    among different cloud platforms, the termination of service and contract, and natural disasters.
            e)      CSPs should provide means to remove all copies of the data.
            f)      CSPs should ensure that the storage space for user authentication information, such as the user
                    account and password, are not released or reallocated to other users until that information is fully
                    cleared.
            g)      CSPs should ensure that the storage space for resources, such as files, directories and database
                    records, are not released or reallocated to other users until those resources are fully cleared.
            h)      CSPs should provide means to prevent the recovery of destroyed data.

            7.7     Security controls in backup and restore stage

            Guidelines for security controls in the backup and restore stage include the following:
            a)      CSPs should utilize content recovery mechanisms, like those for data loss prevention, to assist in
                    identifying and auditing data that needs to be backed up.
            b)      CSPs should support an appropriate encryption algorithm for long-term (archival) storage media
                    backup, such as the use of long encryption keys and planning for replacement with an improved
                    encryption algorithm.
            c)      CSPs should provide local data backup and recovery functions. Complete data backup should be
                    conducted at least once a week and the incremental backup at least once a day.
            d)      A remote disaster recovery centre should be established, with facilities such as communication lines,
                    network  equipment  and  data  processing  equipment  that  are  needed  for  disaster  recovery
                    integrated into them.
            e)      A redundancy disaster recovery centre could be established. It should provide a basic equivalent
                    capability for business operation and synchronize data in real time via a high-speed link. It could
                    share the operations of the business and management systems simultaneously while maintaining
                    business continuity through an emergency switch in disaster situations.
            f)      For data that is categorized as either important or sensitive, the CSPs should provide remote data
                    backup functions together with the capability for timely data recovery. One approach to providing
                    this service would be via a network utilizing a disaster recovery centre.






                                                                                                        1013
   1016   1017   1018   1019   1020   1021   1022   1023   1024   1025   1026