Page 79 - Cloud computing: From paradigm to operation
P. 79

Framework and requirements for cloud computing                              1


            •       federation involves using the cloud services of a group of peer cloud service providers who mutually
                    combine  their  service  capabilities  in  order  to  provide  the  set  of  cloud  services  required  by
                    customers;
            •       intermediation  involves  a  cloud  service  provider  offering  a  cloud  service  which  is  based  on
                    conditioning  or  enhancing  the  cloud  service  of  a  peer  cloud  service  provider.  Examples  of
                    enhancements include managing access to cloud services, providing a cloud service application
                    programming  interface  (API)  façade,  identity  management,  performance  reporting,  enhanced
                    security, and so on;
            •       aggregation  involves  a  cloud  service  provider  offering  a  cloud  service  which  is  based  on  the
                    composition of a set of services provided by peer cloud service providers;
            •       arbitrage involves a cloud service provider offering a cloud service which is based on selecting one
                    service offering from a group offered by peer cloud service providers.

            8.3.2.17   Manage security and risks
            The manage security and risks activity focuses on the management of security and risks associated with the
            development, delivery, use and support of cloud services. This activity involves:
            •       defining information security policy – taking into consideration the service requirements, statutory
                    and regulatory requirements and contractual and SLA obligations;
            •       defining information security risks relating to the cloud service and the approach to those risks that
                    meets the business goals of the cloud service provider. A significant point here is that managing
                    information security risks has an associated cost and that the provider can take a business position
                    of not handling some risks, instead passing over responsibility for those risks to the cloud service
                    customer via the service agreement, in order to address the cost requirements of some part of the
                    marketplace.

            •       selecting  design  point  and  associated  information  security  controls  required  to  address  risks
                    associated with the service and design point chosen. The controls typically cover a set of categories,
                    such as:
                    –   identity and access management;
                    –   discover, categorize, protect data and information assets;

                    –   information systems acquisition, development and maintenance;
                    –   secure infrastructure against threats and vulnerabilities;
                    –   problem and information security incident management;
                    –   security governance and compliance;
                    –   physical and personnel security;

                    –   security of networks and communications;
                    –   isolation (between tenants in a multi-tenant situation).
            •       ensuring  that  the  identified  controls  are  in  place  for  the  deployed  service  and  the  underlying
                    infrastructure;
            •       designing, implementing and evaluating system and application security;
            •       managing, designing, implementing and evaluating the security of  cloud services of peer cloud
                    service providers;
            •       evaluating the effectiveness of the implemented controls and make changes based on experience;
            •       assuring that operating and business support systems provide data access to cloud service provider
                    staff based on the particular cloud service customers tenants they provide a service to.








                                                                                                           71
   74   75   76   77   78   79   80   81   82   83   84