Page 1039 - Cloud computing: From paradigm to operation
P. 1039

Security                                                   7


            5)      Security configuration migration management
                    When  cloud  computing  resource  or  service  changes  (such  as  service  capacity  expansion,  VM
                    migration,  etc.),  CSPs  should  provide  dynamic  security  configuration  adjustment  means.  For
                    example,  during  VM  migration,  automatic  security  configuration  policy  migration  can  be
                    implemented  through  migration  status  sensing,  automatic  matching  and  redeployment  of  the
                    original security configuration policy, which could ensure security configuration policy consistency
                    and fast deployment in cloud environment, and improve the efficiency of the security operation.
            6)      Security configuration isolation management
                    In  a  multi-tenancy  environment  of  cloud  computing,  CSPs  should  execute  strict  classification
                    management  of  CSCs'  security  configuration,  and take measures  such  as  authentication,  access
                    control, etc. This is to ensure security configuration isolation between different CSCs.

            8.6     Security event processing

            CSPs should take certain activities to handle security events in cloud computing environment, such as threat
            alarms, vulnerability, emergency, etc. CSPs should also deploy technical measures to assist  in detecting,
            alarming and handling of security events.

            In general, the procedure of security events processing in the cloud computing environment involves the
            following steps: detecting, analysing, disposing, checking, reporting and recording. CSPs should explicitly
            specify the responsible persons in each step.
            8.6.1   Detecting

            CSPs should take measures to monitor the security status of the cloud platform mentioned in clause 8.3, and
            have the abilities to send timely alarms whenever the security events happen. They should ensure that alarms
            can be sent to the designated person, such as the security manager of the cloud computing platform. The
            alarms could be sent through e-mails, phone calls, short message service (SMS), etc. CSPs should be sure to
            monitor all kinds of security events stated in the security clause of SLA.
            8.6.2   Analysing
            CSPs should confirm the security events after receiving alarms, then analyse and diagnose them to determine
            the types of events, their causes and handling measures. CSPs can contact CSCs for assistance, if needed.

            8.6.3   Disposing
            CSPs should take handling measures according to the security events' types and levels, to minimize the
            impact of those events. CSPs should refer to the security activities mentioned in clauses 8.7, 8.8 and 8.9,
            which include but are not limited to the following:
            1)      For a security emergency, CSPs should take actions according to the emergency response plans.
            2)      For a security vulnerability, CSPs should take actions according to patch upgrade.
            3)      For a configuration weakness, CSPs should take actions according to securing configuration management.

            CSPs should monitor and assess the security events dynamically, and inform CSCs of related information and
            handling progress.
            8.6.4   Checking

            After disposing of the security events, CSPs should further analyse the reasons and situations that may cause
            the security events, and check if other CSCs' system has similar vulnerabilities that may cause the same
            security  events.  If  the  vulnerability  exists,  CSPs  should  notify  the  related  CSCs  immediately  and  take
            corresponding actions. The notification should not involve any privacy of other CSCs.

            8.6.5   Report and recording
            CSPs  should  generate  security  events  processing  report  which  includes  the  security  events'  behaviour,
            causes, handling measures, etc., and send it to the related CSCs within the time limit stated in the security
            clause of SLA. CSPs should record the information of security events for later inspection and auditing. The
            appropriate reports can be given to the affected CSCs and applicable third-party auditors (acting as CSN).


                                                                                                        1031
   1034   1035   1036   1037   1038   1039   1040   1041   1042   1043   1044