Who's Responsible For Cloud Security?

It’s been seven years since the US Office of Management and Budget mandated that federal agencies adopt a cloud-first policy, yet it’s no surprise this major change is still a work in progress.  

While the cloud brings benefits, security remains a particular area of concern, because it’s not always clear who’s responsible for securing what. Before moving to the cloud, federal CIOs and CISOs should consider the following:

1.Responsibility and accountability: Some organisations may be inclined to think that security automatically becomes the responsibility of the cloud service provider, but it doesn’t. The owner of the data is the responsible party, and agencies that plan to move to the cloud must develop, understand and periodically revisit their service-level agreements and terms-of-service contracts with their CSP. Thomas Trappler, the associate director for IT strategic sourcing at the University of California, recommends that SLAs should:

  • Codify the specific parameters and minimum levels required for each element of the service as well as remedies for failure to meet those requirements.
  • Affirm an institution's ownership of its data stored on the service provider's system and specify the organisation's rights to get it back.
  • Detail the system infrastructure and security standards to be maintained by the service provider along with the organisation's rights to audit CSP compliance.
  • Specify the organisation's rights and costs to continue or discontinue using the service.

2.FedRAMP: Most UD federal organisations moving to the cloud know about the Federal Risk and Authorisation Management Program, which provides a standardised approach to security assessment, authorisation and continuous monitoring for cloud products and services. 

Using a FEDRAMP-certified provider, however, does not mean that the agencies’ data will automatically be secured in the cloud. While the cloud provider may have the infrastructure to support security, most CSPs don’t provide encryption, security or segregation/separation of duties by default. Those often are considered additional services at an additional cost.

3.Public cloud vs. private cloud: Federal agencies must determine whether to move to a public cloud, where a commercial service provider makes resources, such as applications and storage, available clients over the internet, or a hosted private cloud, which offers similar services to a public cloud but is dedicated to a single organisation. 

There are many factors that can influence a CIO’s decision -- budgetary limitations, staff and resource requirements, available physical space, capacity and workloads, to name a few. Two of most important considerations, however, should be data security and resiliency.

With a public cloud, most CSPs typically offer environment isolation in a multitenant hosting facility. Although an agency's data may be heavily firewalled from outside attack and isolated from other tenants' data, there’s still a possibility that it might become vulnerable. In fact, many IT professionals would argue that the risk of a breach goes up with public cloud. 

Major public cloud provider may have more tenured and technically trained cyber cloud experts, more monitoring and cyber defense tools and greater security guarantees, but they also are bigger targets than many smaller CSPs. The size of the cloud provider, how publicly known it is, the value of its hosted data and the likelihood of being targeted by cyber adversaries are all factors that agencies should consider when choosing between private and public cloud.

Private cloud can be a better choice for agencies that have the long-term funding to support it. Some may be able to afford the initial purchase of the hardware needed for a hosted private cloud, but the costs associated with hardware refreshes, physical security and hiring or retraining staff may limit agencies with smaller cloud budgets to a public cloud offering.

4.Security authorisation: One of the biggest challenges for agencies using cloud-based solutions is understanding what it means to conduct assessment and authorisation, formerly known as certification and accreditation, on a system whose boundaries and assets are in the cloud. Because of the complexities of a cloud environment, agencies should consider leveraging automation as a means of maintaining compliance. 

Automation can significantly reduce errors, but automating compliance takes significant investment. Agencies considering compliance automation should start with automating smaller components, such as security alert systems, then move on to other areas that will benefit from automation.

Authorisation is really about ensuring that legitimate users on an agency's network has access to the data, applications and systems that are relevant to their jobs and roles and making sure that those who aren’t authorized to be on the network stay off of it. 

Because cloud resources can be accessed from anywhere with an internet connection, there’s an increased opportunity for cyber adversaries to gain access to agency data. 

To combat those threats and improve security in the cloud, many cloud providers will offer compliance as a service, but it’s important to understand not only the required standards and regulatory requirements, but exactly what CaaS means.

It’s easy to get excited about the benefits of moving to the cloud, but agencies must really understand the cyber implications. It can be tempting for CIOs and CISOs to think that someone else is responsible for their organisation’s data once it’s in the cloud, but the truth is that the CIO and CISO are responsible for holding the CSP accountable for protecting that data.

GCN.com:

You Might Also Read:

Multicloud - The Next Step In Cloud Computing:

In The House Or In The Cloud: Which Is More Secure?:

 

 

« Cyber Monday 2017 UK Deals
The US National Security Agency Is On The Ropes »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Security Magazine

Security Magazine

Security, the business magazine for security executives, focuses on management issues facing top security professionals and effective solutions being employed, both physical and cyber.

Netsparker

Netsparker

Netsparker provide a web application security scanner to automatically find security flaws in your websites, web applications and web services.

Open Systems International (OSI)

Open Systems International (OSI)

Our innovative Operations Technology (OT) solutions are highly scalable and can be deployed by various utility companies to monitor, control and optimize their real-time operations.

Aspen Insurance

Aspen Insurance

Aspen is a leading diversified specialty insurance and reinsurance company. Products offered include cyber insurance.

H-ON Consulting

H-ON Consulting

H-ON Consulting develops and applies robust cyber security procedures enabling control systems to be secure.

Level Effect

Level Effect

Level Effect is developing new capabilities to bring a unique perspective on proactive network defense and advanced security analytics.

Garner Products

Garner Products

Garner design, manufacture, and sell equipment that delivers complete, permanent, and verifiable data elimination.

DarkLight

DarkLight

DarkLight is a cybersecurity platform that mimics human thinking at scale to build resiliency to Advanced Persistent Threats.

Rezilion

Rezilion

Rezilion is a stealth mode cyber-security start-up developing a cutting edge technology that makes cloud environments self-protecting and resilient to cyber-attacks.

Nisos

Nisos

Nisos provides unrivaled protection of your reputation and assets through the practice of Active Defense.

Buchanan & Edwards

Buchanan & Edwards

Buchanan & Edwards delivers forward-focused technology solutions that help our clients transform the way they perform their missions.

ZINAD IT

ZINAD IT

ZINAD is an information security company offering state-of-the-art cybersecurity awareness products, solutions and services.

One82

One82

Serving emerging small and medium-sized businesses in California and neighboring regions for over 20 years, One82 has established itself as the most dependable provider of IT support services.

Kaesim Cybersecurity

Kaesim Cybersecurity

Kaesim are a global team of cybersecurity experts protecting businesses since 2015. We stop bad people damaging your business, your data and your reputation.

Upwind Security

Upwind Security

Upwind delivers comprehensive cloud security, precisely when and where it’s most critical.

London AI Safety Research (LASR)

London AI Safety Research (LASR)

London AI Safety Research Labs is a technical AI Safety research programme focussed on reducing the risk of loss of control to advanced AI.