Page 1033 - Cloud computing: From paradigm to operation
P. 1033

Security                                                   7


            7.2.2.3    Emergency response

            CSPs should provide a hotline service number to provide a fault reporting service, available 5*8 or 7*24.
            Additionally, the service indicators should include failure acceptance time, troubleshooting time, and so on.

            7.2.2.4    Security measures
            CSPs should provide appropriate security measures for the whole cloud computing infrastructure.
            1)      Measures on computing virtualization
                    CSPs  should  implement  available  measures  to  provide  flow  inspection,  virtual  firewall  or  other
                    security features in the hypervisor layer, which can keep the behaviour of intra-virtual machines
                    (VMs) visible and controlled by administrators.
            2)      Network and domain isolation
                    CSPs should implement network and domain isolation measures, such as firewall, access control list
                    (ACL) policies in routers, and domain controllers to keep strict isolation of different CSCs.
            3)      Privileged access
                    CSPs should implement measures, such as just in time (JIT) access, to ensure privileged access.
            4)      Authentication
                    CSPs  should  implement  strong  authentication  methods,  such  as  multi-factor  authentication,
                    fingerprint authentication, etc., to reinforce the security of the authentication.
            5)      Measures to secure network traffic
                    CSPs should implement available measures to resist denial of service (DoS)/distributed denial of
                    service  (DDoS)  attacks  and  circumvent  network  congestion,  deploy  intrusion  detection  or
                    prevention systems to resist network intrusion.
            6)      Measures against malware
                    CSPs should implement available measures to prevent infection by malware or virus.
            7)      Patch upgrade
                    CSPs should regularly implement patch upgrade and version upgrade for the virtualization software,
                    the operating system and database (DB) to keep them up to date.
            7.2.2.5    Security audit

            CSPs should carry out regular security audits over the whole cloud computing system. The audit can be
            executed by an internal independent audit team or third-party auditors (acting as cloud service partners
            (CSNs)). The audit results should be appropriately visible to CSCs.

            7.2.2.6    Security monitoring for improving SLA
            CSPs should provide a mechanism to monitor the quantitative parameters of services to improve SLA.
            1)      Monitoring objects
                    Define  the  monitoring  objects,  such  as  the  central  processing  unit  (CPU)  utilization,  security
                    warnings, and so on. The trigger condition should also be explicitly indicated.
            2)      Security event notification
                    The  mode  and  time  of  security  event  notification  should  be  stipulated.  The  notification  mode
                    includes  e-mail,  telephone,  short  messages  or  other  ways  negotiated  by  CSPs  and  CSCs.  The
                    notification time means the average time from the event occurrence to notifying CSC.
                    CSPs  may  provide  appropriate  capabilities  for  CSCs  such  as  service-level  self-monitoring  and
                    automatic supervision of the resources allocated to them.
            7.2.2.7    Security certification
            CSPs should be responsible for the acquisition of relevant security certifications, and they should regularly
            update these certifications to meet the requirements of CSCs.
            The engineers and other CSP staff should take security training courses and should be qualified for the
            operations of the cloud computing platform.


                                                                                                        1025
   1028   1029   1030   1031   1032   1033   1034   1035   1036   1037   1038