Who's Responsible For Cloud Security?

It’s been seven years since the US Office of Management and Budget mandated that federal agencies adopt a cloud-first policy, yet it’s no surprise this major change is still a work in progress.  

While the cloud brings benefits, security remains a particular area of concern, because it’s not always clear who’s responsible for securing what. Before moving to the cloud, federal CIOs and CISOs should consider the following:

1.Responsibility and accountability: Some organisations may be inclined to think that security automatically becomes the responsibility of the cloud service provider, but it doesn’t. The owner of the data is the responsible party, and agencies that plan to move to the cloud must develop, understand and periodically revisit their service-level agreements and terms-of-service contracts with their CSP. Thomas Trappler, the associate director for IT strategic sourcing at the University of California, recommends that SLAs should:

  • Codify the specific parameters and minimum levels required for each element of the service as well as remedies for failure to meet those requirements.
  • Affirm an institution's ownership of its data stored on the service provider's system and specify the organisation's rights to get it back.
  • Detail the system infrastructure and security standards to be maintained by the service provider along with the organisation's rights to audit CSP compliance.
  • Specify the organisation's rights and costs to continue or discontinue using the service.

2.FedRAMP: Most UD federal organisations moving to the cloud know about the Federal Risk and Authorisation Management Program, which provides a standardised approach to security assessment, authorisation and continuous monitoring for cloud products and services. 

Using a FEDRAMP-certified provider, however, does not mean that the agencies’ data will automatically be secured in the cloud. While the cloud provider may have the infrastructure to support security, most CSPs don’t provide encryption, security or segregation/separation of duties by default. Those often are considered additional services at an additional cost.

3.Public cloud vs. private cloud: Federal agencies must determine whether to move to a public cloud, where a commercial service provider makes resources, such as applications and storage, available clients over the internet, or a hosted private cloud, which offers similar services to a public cloud but is dedicated to a single organisation. 

There are many factors that can influence a CIO’s decision -- budgetary limitations, staff and resource requirements, available physical space, capacity and workloads, to name a few. Two of most important considerations, however, should be data security and resiliency.

With a public cloud, most CSPs typically offer environment isolation in a multitenant hosting facility. Although an agency's data may be heavily firewalled from outside attack and isolated from other tenants' data, there’s still a possibility that it might become vulnerable. In fact, many IT professionals would argue that the risk of a breach goes up with public cloud. 

Major public cloud provider may have more tenured and technically trained cyber cloud experts, more monitoring and cyber defense tools and greater security guarantees, but they also are bigger targets than many smaller CSPs. The size of the cloud provider, how publicly known it is, the value of its hosted data and the likelihood of being targeted by cyber adversaries are all factors that agencies should consider when choosing between private and public cloud.

Private cloud can be a better choice for agencies that have the long-term funding to support it. Some may be able to afford the initial purchase of the hardware needed for a hosted private cloud, but the costs associated with hardware refreshes, physical security and hiring or retraining staff may limit agencies with smaller cloud budgets to a public cloud offering.

4.Security authorisation: One of the biggest challenges for agencies using cloud-based solutions is understanding what it means to conduct assessment and authorisation, formerly known as certification and accreditation, on a system whose boundaries and assets are in the cloud. Because of the complexities of a cloud environment, agencies should consider leveraging automation as a means of maintaining compliance. 

Automation can significantly reduce errors, but automating compliance takes significant investment. Agencies considering compliance automation should start with automating smaller components, such as security alert systems, then move on to other areas that will benefit from automation.

Authorisation is really about ensuring that legitimate users on an agency's network has access to the data, applications and systems that are relevant to their jobs and roles and making sure that those who aren’t authorized to be on the network stay off of it. 

Because cloud resources can be accessed from anywhere with an internet connection, there’s an increased opportunity for cyber adversaries to gain access to agency data. 

To combat those threats and improve security in the cloud, many cloud providers will offer compliance as a service, but it’s important to understand not only the required standards and regulatory requirements, but exactly what CaaS means.

It’s easy to get excited about the benefits of moving to the cloud, but agencies must really understand the cyber implications. It can be tempting for CIOs and CISOs to think that someone else is responsible for their organisation’s data once it’s in the cloud, but the truth is that the CIO and CISO are responsible for holding the CSP accountable for protecting that data.

GCN.com:

You Might Also Read:

Multicloud - The Next Step In Cloud Computing:

In The House Or In The Cloud: Which Is More Secure?:

 

 

« Cyber Monday 2017 UK Deals
The US National Security Agency Is On The Ropes »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Irish Reporting & Information Security Service (IRISS)

Irish Reporting & Information Security Service (IRISS)

IRISS-CERT is Ireland's first CSIRT (Computer Security Incident Response Team) to provide services to all users within Ireland.

CERT-In

CERT-In

CERT-In is a functional organisation of the Ministry of Information & Electronics Technology, Government of India, with the objective of securing Indian cyber space.

Focal Point Data Risk

Focal Point Data Risk

Focal Point is a pure-play data risk management provider capable of offering end-to-end consulting, implementation, and training services.

Cobalt Strike

Cobalt Strike

Cobalt Strike is penetration testing software designed to execute targeted attacks.

HKCERT

HKCERT

HKCERT is the centre for coordination of computer security incident response for local enterprises and Internet Users in Hong Kong.

Founder Shield

Founder Shield

Founder Shield is a data driven insurance brokerage focused excusively on rapidly evolving high-growth companies.

Socure

Socure

Socure’s identity verification increases auto approval rates, reduces false positives and captures more fraud. In real time.

SecureLayer7

SecureLayer7

SecureLayer7 is an international provider of integrated business information security solutions with an innovative approach to IT security.

Cynomi

Cynomi

Cynomi is a leading strategic cybersecurity operations platform that automates cybersecurity knowledge and expertise to empower teams with little to no in-house expertise.

Technivorus Technology

Technivorus Technology

Technivorus is a deep-tech firm delivering customized Cybersecurity, Digital Marketing, Web & App Development, and multifarious IT services for businesses across the globe.

Acronis

Acronis

At Acronis, we protect the data, applications, systems and productivity of every organization – safeguarding them against cyberattacks, hardware failures, natural disasters and human errors.

AT&T Cybersecurity

AT&T Cybersecurity

AT&T Cybersecurity’s Edge-to-Edge technologies provide threat intelligence, collaborative defense, security without the seams, and solutions that fit your business.

CyberEPQ

CyberEPQ

CyberEPQ (Cyber Extended Project Qualification) is the UK’s first and only Extended Project Qualification in Cyber Security.

Aspire Technology Solutions

Aspire Technology Solutions

Aspire is an award-winning IT Managed Service and Cyber Security Provider. We specialise in cyber security, cloud, connectivity, managed services, unified communications and IT support.

CODA Intelligence

CODA Intelligence

CODA's AI-powered attack surface management platform helps you sort out the important remediations needed in order to avoid exploits on your systems.

Planisys

Planisys

Planisys is a cybersecurity leader specializing in cutting-edge DNS security and email security solutions.