Who's Responsible For Cloud Security?

It’s been seven years since the US Office of Management and Budget mandated that federal agencies adopt a cloud-first policy, yet it’s no surprise this major change is still a work in progress.  

While the cloud brings benefits, security remains a particular area of concern, because it’s not always clear who’s responsible for securing what. Before moving to the cloud, federal CIOs and CISOs should consider the following:

1.Responsibility and accountability: Some organisations may be inclined to think that security automatically becomes the responsibility of the cloud service provider, but it doesn’t. The owner of the data is the responsible party, and agencies that plan to move to the cloud must develop, understand and periodically revisit their service-level agreements and terms-of-service contracts with their CSP. Thomas Trappler, the associate director for IT strategic sourcing at the University of California, recommends that SLAs should:

  • Codify the specific parameters and minimum levels required for each element of the service as well as remedies for failure to meet those requirements.
  • Affirm an institution's ownership of its data stored on the service provider's system and specify the organisation's rights to get it back.
  • Detail the system infrastructure and security standards to be maintained by the service provider along with the organisation's rights to audit CSP compliance.
  • Specify the organisation's rights and costs to continue or discontinue using the service.

2.FedRAMP: Most UD federal organisations moving to the cloud know about the Federal Risk and Authorisation Management Program, which provides a standardised approach to security assessment, authorisation and continuous monitoring for cloud products and services. 

Using a FEDRAMP-certified provider, however, does not mean that the agencies’ data will automatically be secured in the cloud. While the cloud provider may have the infrastructure to support security, most CSPs don’t provide encryption, security or segregation/separation of duties by default. Those often are considered additional services at an additional cost.

3.Public cloud vs. private cloud: Federal agencies must determine whether to move to a public cloud, where a commercial service provider makes resources, such as applications and storage, available clients over the internet, or a hosted private cloud, which offers similar services to a public cloud but is dedicated to a single organisation. 

There are many factors that can influence a CIO’s decision -- budgetary limitations, staff and resource requirements, available physical space, capacity and workloads, to name a few. Two of most important considerations, however, should be data security and resiliency.

With a public cloud, most CSPs typically offer environment isolation in a multitenant hosting facility. Although an agency's data may be heavily firewalled from outside attack and isolated from other tenants' data, there’s still a possibility that it might become vulnerable. In fact, many IT professionals would argue that the risk of a breach goes up with public cloud. 

Major public cloud provider may have more tenured and technically trained cyber cloud experts, more monitoring and cyber defense tools and greater security guarantees, but they also are bigger targets than many smaller CSPs. The size of the cloud provider, how publicly known it is, the value of its hosted data and the likelihood of being targeted by cyber adversaries are all factors that agencies should consider when choosing between private and public cloud.

Private cloud can be a better choice for agencies that have the long-term funding to support it. Some may be able to afford the initial purchase of the hardware needed for a hosted private cloud, but the costs associated with hardware refreshes, physical security and hiring or retraining staff may limit agencies with smaller cloud budgets to a public cloud offering.

4.Security authorisation: One of the biggest challenges for agencies using cloud-based solutions is understanding what it means to conduct assessment and authorisation, formerly known as certification and accreditation, on a system whose boundaries and assets are in the cloud. Because of the complexities of a cloud environment, agencies should consider leveraging automation as a means of maintaining compliance. 

Automation can significantly reduce errors, but automating compliance takes significant investment. Agencies considering compliance automation should start with automating smaller components, such as security alert systems, then move on to other areas that will benefit from automation.

Authorisation is really about ensuring that legitimate users on an agency's network has access to the data, applications and systems that are relevant to their jobs and roles and making sure that those who aren’t authorized to be on the network stay off of it. 

Because cloud resources can be accessed from anywhere with an internet connection, there’s an increased opportunity for cyber adversaries to gain access to agency data. 

To combat those threats and improve security in the cloud, many cloud providers will offer compliance as a service, but it’s important to understand not only the required standards and regulatory requirements, but exactly what CaaS means.

It’s easy to get excited about the benefits of moving to the cloud, but agencies must really understand the cyber implications. It can be tempting for CIOs and CISOs to think that someone else is responsible for their organisation’s data once it’s in the cloud, but the truth is that the CIO and CISO are responsible for holding the CSP accountable for protecting that data.

GCN.com:

You Might Also Read:

Multicloud - The Next Step In Cloud Computing:

In The House Or In The Cloud: Which Is More Secure?:

 

 

« Cyber Monday 2017 UK Deals
The US National Security Agency Is On The Ropes »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

AMETIC

AMETIC

AMETIC, is the Association of Electronics, Information and Communications Technologies, Telecommunications and Digital Content Companies in Spain.

Clavister

Clavister

Clavister is a network security vendor delivering a full range of network security solutions for both physical and virtualized environments.

BMS Group

BMS Group

BMS is an independent, employee-owned specialist insurance broking group. Broking solutions include Cyber and Technology.

Sift

Sift

The Sift Digital Trust Platform protects your business and customers from all vectors of fraud and abuse through our Live Machine Learning, global trust network and automation technologies.

TruSTAR Technology

TruSTAR Technology

TruSTAR is a threat intelligence exchange platform built to protect and incentivize information sharing.

Platin Bilişim

Platin Bilişim

Platin Bilisim is an IT Security company providing consultancy, solutions and operational support services.

Montimage

Montimage

Montimage develops tools for testing and monitoring networks, applications and services; in particular, for the verification of functional, performance (QoS/QoE) and security aspects.

ZeroNorth

ZeroNorth

ZeroNorth provides a new approach to improve software and infrastructure security, simplify continuous compliance reporting and to create more cost-effective risk management programs.

Ockam

Ockam

Ockam gives you the tools you need to establish an architecture for trust within your connected device applications.

Blackbird.AI

Blackbird.AI

Blackbird.AI provides an intelligence and early-warning system to help users detect disinformation and take action against threats.

Zerify

Zerify

Zerify offers the industry’s only video conferencing platform built with a zero-trust architecture to keep your meetings secure, private and business compliant.

Quantum Security Services

Quantum Security Services

Quantum Security Services is a specialist information security firm providing a range of risk, compliance and technical security services.

All About Cookies

All About Cookies

All About Cookies is an informational website that provides tips, advice, and recommendations to help you with Online Privacy, Identity Theft Prevention, Antivirus Protection, and Digital Security.

Prizsm Technologies

Prizsm Technologies

Prizsm is a computational storage capability that provides flexible, easy-to-use, resilient solutions for quantum-resistant, hyper-secure cloud storage and communications.

Cybermindz

Cybermindz

Many cyber security professionals are under sustained and increasing stress. We set about providing direct support to restore and rebuild emotional and cognitive health.

Helix Tech Consulting

Helix Tech Consulting

Helix Tech have expertise in a wide range of technology areas, including IT strategy, infrastructure design, cybersecurity, disaster recovery, cloud, data centers, IT cost optimization, and more.