Page 989 - Cloud computing: From paradigm to operation
P. 989

Security                                                   7


            10      Framework methodology

            To develop a security framework for cloud computing means understanding what threats and challenges
            exist, as was discussed in clauses 7 and 8, for the chosen specific cloud service along with the business,
            technology and regulatory requirements which are to be taken together to identify security controls, policies
            and procedures that will be needed for a given cloud service. The capabilities described in clause 9 to address
            and  mitigate  these  threats  and  challenges  are  then  used  to  develop  the  security  controls,  policies  and
            procedures for the chosen specific cloud computing service. This Recommendation focuses on what the
            needs  are  for  security  in  a  cloud  computing  environment,  the  threats  and  challenges  of  a  traditional
            computing environment exist within the cloud environment and as such following the standards and best
            practices defined by the industry should be followed in addition to this Recommendation.

            The methodology described here should be followed to create the framework that will identify what security
            controls, policies and procedures will be needed for a specific given cloud computing service. It is not possible
            to provide a single normative framework for all cloud computing services, since they vary greatly in business
            model, services offered and implementation choices:
            •       Step 1: Use clauses 7 and 8 to identify security threats and security implications of the challenges in
                    the cloud computing service under study.

            •       Step 2: Use clause 9 to identify the needed high-level security capabilities based on identified threats
                    and challenges which could mitigate security threats and address security challenges.

            •       Step 3: Derive security controls, policies and procedures which could provide the security abilities
                    that are needed based on identified security capabilities.
            NOTE – A set of appropriate requirements with respect to the security capabilities will need to be determined by the
            CSC and CSP using appropriate standards. This determination will be based on the risk assessment.
            To identify which security threats and challenges are relevant for the cloud service under study, each threat
            or challenge should be reviewed. One approach could be as simple as a table showing a 'Y' next to the threat
            or challenge.
            For an example using this approach, when the CSP provides file storage as a service to individual users, the
            CSP would like to understand what security threats and challenges users are mainly concerned about, and to
            analyse what security threats and challenges that CSP mainly needs to address. Table 1 demonstrates this
            approach.


                       Table 1 – Example of security framework analysis step 1 for file storage as a service

                                                                                       Is this applicable to this
                        Area of analysis                Specific threat or challenge
                                                                                              service?
             Clause 7.1 Security threats for cloud   Clause 7.1.1 Data loss and leakage          Y
             service customers (CSC)
                                                  Clause 7.1.2 Insecure service access           Y
                                                  Clause 7.1.3 Insider threats
             Clause 7.2 Security threats for cloud   Clause 7.2.1 Unauthorized administration    Y
             service providers (CSPs)             access
                                                  Clause 7.2.2 Insider threats                   Y
             Clause 8.1 Security challenges for cloud   Clause 8.1.1 Ambiguity in responsibility   Y
             service customers (CSCs)
                                                  Clause 8.1.2 Loss of trust                     Y
                                                  Clause 8.1.3 Loss of governance                Y
                                                  Clause 8.1.4 Loss of confidentiality           Y
                                                  Clause 8.1.5 Service unavailability            Y

                                                  Clause 8.1.6 Cloud service provider lock-in    Y
                                                  Clause 8.1.7 Misappropriation of
                                                  intellectual property


                                                                                                         981
   984   985   986   987   988   989   990   991   992   993   994