Page 1042 - Cloud computing: From paradigm to operation
P. 1042

7                                                     Security


            Configuration management security involves the following measures:
            1)      Configuration management auditing
                    Configuration  management  auditing  is  to  ensure  that  the  configuration  alteration  and  release
                    requirements  have  been  implemented  effectively  and  efficiently.  It  can  help  CSPs  verify  the
                    correctness,  consistency,  completeness,  validity,  and  traceability  of  each  configuration  item.
                    Configuration management auditing should be executed periodically during the daily operation.
                    All logs of user access, modification, archive and retrieval should be recorded and archived for online
                    or offline audit.
                    Furthermore, the report of configuration management auditing related to CSCs or their services
                    should be appropriately visible to CSCs, to enable CSCs to supervise the security measures and the
                    effectiveness of CSPs.
            2)      Configuration management monitoring
                    CSPs should monitor all the alternations and other operations of configuration files of an entire
                    cloud computing environment, to prevent non-authorized access, leakage, illegal modification and
                    mis-configuration.
            3)      Configuration management database protecting
                    CSPs should do precise maintenance and management  of the configuration management database,
                    such as role-based authority assignment, garbage removal, regular auditing, periodical backup, etc.
            8.9     Emergency response plans

            It is critical to ensure that the cloud computing systems are able to be operated effectively by CSPs without
            excessive interruption following a security incident. An emergency response plan supports this requirement
            by establishing an effective programme, procedures, and technical measures.
            In order to reduce the impact of security incidents on the cloud computing platforms and services, CSPs'
            emergency response plan should provide a clear guidance for operators and strike a balance between the
            level of detail and degree of flexibility. The development and management of an emergency response plan is
            a cycle of continuous improvement process consisting of three phases: development phase, testing and
            implementation phase, and maintenance phase.

            8.9.1   Development phase
            Above all, the quantitative and qualitative analysis methods should be adopted to make a comprehensive
            risk  assessment  and  business  impact  analysis  (BIA) of  the  cloud computing  systems.  After  that,  the key
            features  and  components  of  the  system  could  be  obtained,  as  well  as  the  impact  of  different  security
            incidents. On this basis, according to the security  clause of SLA between CSPs and CSCs, the regulatory
            requirements, and the recovery target of the emergency response can be formulated such as the scope of
            RTO and RPO. Furthermore, the characters of cloud service and classification of incidents should also be
            considered while developing an emergency response plan.

            The emergency response plan includes:
            1)      Notification:  A  notification  procedure  should  be  developed  to  notify  the  response  team,
                    management staff and related CSCs once a security incident occurs.
            2)      Classification and grading of security events: The security assessment of a security incident should
                    be implemented by the emergency response team to determine its category and grade.
            3)      Launching: After the classification and grading of the security events, it is urgent for CSPs and CSCs
                    to activate the correspondingly pre-established response programme.
            4)      Action:  After  activating  the  response  programme,  countermeasures  should  be  launched
                    immediately to suppress the impact of security incidents. Additionally, recovery operations should
                    be taken right after the incidents are effectively controlled.
            5)      Post-disposal:  After  the  emergency  action,  it  is  important  to  make  a  conclusion  of  the  latest
                    emergency response, which includes actions to analyse and summarize the reasons for the incident,
                    take the assessment of the loss and make the evaluation of the effectiveness and efficiency of the
                    emergency response plan.


            1034
   1037   1038   1039   1040   1041   1042   1043   1044   1045   1046   1047