Page 1021 - Cloud computing: From paradigm to operation
P. 1021
Security 7
7.5 Security controls in migrate stage
Guidelines for security controls in the migrate stage include the following:
a) Network connectivity should be assessed prior to data migration to ensure the safety of the
migration process.
b) CSPs should ensure that data integrity and confidentiality is not affected during a migration.
c) CSPs should ensure that data migration does not affect the continuity of services and applications.
d) CSPs should conduct data backup and recovery-related work appropriately during data migration.
e) CSPs should establish a migration scheme, assess its feasibility and associated risks, then develop
risk control measures accordingly as preparations for data migration.
7.6 Security controls in destroy stage
Guidelines for security controls in the destroy stage include the following:
a) CSPs should be able to erase all key material related to encrypted data.
b) CSPs should utilize physical destruction, such as degaussing of physical media when
decommissioning storage hardware.
c) CSPs should utilize data recovery techniques to confirm destruction processes.
d) CSPs should be able to provide means to help clear legacy data caused by the migration of data
among different cloud platforms, the termination of service and contract, and natural disasters.
e) CSPs should provide means to remove all copies of the data.
f) CSPs should ensure that the storage space for user authentication information, such as the user
account and password, are not released or reallocated to other users until that information is fully
cleared.
g) CSPs should ensure that the storage space for resources, such as files, directories and database
records, are not released or reallocated to other users until those resources are fully cleared.
h) CSPs should provide means to prevent the recovery of destroyed data.
7.7 Security controls in backup and restore stage
Guidelines for security controls in the backup and restore stage include the following:
a) CSPs should utilize content recovery mechanisms, like those for data loss prevention, to assist in
identifying and auditing data that needs to be backed up.
b) CSPs should support an appropriate encryption algorithm for long-term (archival) storage media
backup, such as the use of long encryption keys and planning for replacement with an improved
encryption algorithm.
c) CSPs should provide local data backup and recovery functions. Complete data backup should be
conducted at least once a week and the incremental backup at least once a day.
d) A remote disaster recovery centre should be established, with facilities such as communication lines,
network equipment and data processing equipment that are needed for disaster recovery
integrated into them.
e) A redundancy disaster recovery centre could be established. It should provide a basic equivalent
capability for business operation and synchronize data in real time via a high-speed link. It could
share the operations of the business and management systems simultaneously while maintaining
business continuity through an emergency switch in disaster situations.
f) For data that is categorized as either important or sensitive, the CSPs should provide remote data
backup functions together with the capability for timely data recovery. One approach to providing
this service would be via a network utilizing a disaster recovery centre.
1013