Page 990 - Cloud computing: From paradigm to operation
P. 990

7                                                     Security




                       Table 1 – Example of security framework analysis step 1 for file storage as a service

                                                                                       Is this applicable to this
                        Area of analysis                Specific threat or challenge
                                                                                              service?
                                                  Clause 8.1.8 Loss of software integrity

             Clause 8.2 Security challenges for cloud   Clause 8.2.1 Ambiguity in responsibility   Y
             service providers (CSPs)
                                                  Clause 8.2.2 Shared environment                Y
                                                  Clause 8.2.3 Inconsistency and conflict of     Y
                                                  protection mechanisms
                                                  Clause 8.2.4 Jurisdictional conflict           Y

                                                  Clause 8.2.5 Evolutionary risks
                                                  Clause 8.2.6 Bad migration and integration     Y
                                                  Clause 8.2.7 Business discontinuity            Y
                                                  Clause 8.2.8 Cloud service partner lock-in
                                                  Clause 8.2.9 Supply chain vulnerability        Y
                                                  Clause 8.2.10 Software dependencies
             Clause 8.3 Security challenges for cloud   Clause 8.3.1 Ambiguity in responsibility
             service partners (CSNs)
                                                  Clause 8.3.2 Misappropriation of
                                                  intellectual property
                                                  Clause 8.3.3 Loss of software integrity

            Once the security threats and challenges have been identified, the security capabilities that could mitigate
            these threats and address these challenges can be identified. In Table I.1 there is an example of a mapping
            of cloud computing security threats and challenges to security capabilities. The letter 'Y' in a cell formed by
            the intersection of the table's columns and rows designate that a particular security threat and challenge is
            addressed by a corresponding security capability. This table shows all the threats and challenges and the
            corresponding security capability.

            Once the capabilities required have been identified, the security controls, policies and procedures can be
            determined as to what is needed. Examples of controls that could be used are "Operations security" (clause
            12 in [b-ISO/IEC 27002]) and "Information security incident management" (clause 16 in [b-ISO/IEC 27002])
            which can be derived from the identified capabilities in clauses 9.9 and 9.10, respectively.
            A cloud service may have a supply chain comprised of multiple CSPs. The companies participating in such a
            supply chain can refer to ITU and Industry standards on the topic of supply chain security (e.g., [b-ISO/IEC
            28000]). Each CSP will need to clearly delineate their responsibility in the cloud computing service chain, and
            develop their security controls, policies and procedures based on the derived security capabilities by this
            three-step approach. To provide consistent security to CSCs, the upstream CSP may need to negotiate with
            their downstream CSPs on these security capabilities based on their security responsibilities. When needed,
            CSCs should follow this three-step procedure as well.
            In addition, the above three-step procedure should be carried out periodically or when needed (e.g., when a
            serious security breach occurs, or when a CSP changes its upstream CSP).
















            982
   985   986   987   988   989   990   991   992   993   994   995