Futuristic Approach to Ensuring Data Security in Clouds

Futuristic Approach to Ensuring Data Security in Clouds

[Total: 0    Average: 0/5]

 

Information Technology has come a long way ever since computers were invented. Similarly Information Security has come a long way. Trends such as Cloud Computing have been helping Small and Medium Investors and Innovators (SMIs) by reducing the initial cost of deployment and maintenance. This will definitely pave a new path ahead for many people. With emerging trends such as these data security in the Clouds must not be viewed in the traditional triadic way but must be viewed in a different way.

 

This paper will discuss ways on how data security paradigms can change in the near future and ways to address the new. Traditionally Information Security has been governed by the “CIA” triad, namely Confidentiality, Integrity and Availability, but this is bound to change in the future especially with data being spread across the globe. This model will ensure a considerably high level of data security and authenticity:

 

 

cloud2

 

 

Since there are enough materials and resources available already to address the first three parameters such as Confidentiality, Integrity and Availability we will focus on the other
three parameters namely Visibility, Accountability and Governance. We will focus this article from a Process and Governance perspective. A clear well-defined Service Level Agreement (SLA) is the first step in ensuring the security of our data. Here we provide some fresh approaches to drafting an SLA that will deliver a win-win situation.

 

1. Accountability:

 

Accountability is a concept in Ethics and Governance with several meanings. It is often used synonymously with concepts such as responsibility and answerability. From a modern management perspective it can be coined in two words “Stupendous  leadership” , this can be looked at  from either a people perspective or
from an organizational perspective   ,wherein both the people and the  organization go beyond the call of their  duty to create sustaining and winning   relationships. Here are some factors that can be woven into the Service Level Agreement:

 

1.1 Availability:
Draft SLAs which will clearly enlist the minimum time that the organization  can hold on disruptions. This is because certain applications in an organization will not be critical as compared to their front-line applications. This way the customer ends up getting better quality of service for their most critical applications. A sample template is given below which can be used as a cue:

 

cloud3

1.2 Rewards Management :

 
This is something new, draft agreements that clearly state the rewards that you will share with the provider if the ultimate goal of providing secure and reliable data quality is met; make them understand  the metrics that you require for sharing incentives. Also provide certificate-ofexcellence  rewards to the people who maintain your infrastructure and help achieve business excellence.

 
1.3 Loss of business:

 
Clearly state the legal and other risks that the vendor will incur if they do not meet the metrics that are deemed fit  by the organization; outcomes could range from cancellation of contracts to fines imposed due to legal obligations.

 

1.4 People Employment:

 
Clearly enlist the kind of people who must be employed to manage your data and infrastructure, the kind of  checks that must be done on those  people, the credentials (degrees and  certifications) that they must hold.

 
1.5 Good Governance Practices:

 
Ensure that an organization such as   an Internet Service Provider (ISP) will    practice good governance principles   in reference to management, which   is basically corporate governance that extends beyond IT governance.   Conducts of good governance guides   are available in the OCEG Red book.  Organizations that practice good governance are more sustainable in  the long term. To cite an example, in  the case of an Internet Service Provider  going in for a merger or acquisition the  ISP should ensure that customers are  properly informed and have visibility on what is happening to their data.

 
1.6 Good IT practices:

 
Make them accountable to follow good IT practices such as ITIL, SAS70, etc. This will ensure that your data is taken care of properly, as organizations that have these certifications get audited by an independent body. If this is not feasible, get them to follow at the least good Incident Management, Change Management, Release Management, Problem Management and Security Management procedures as per ITIL or any other leading standards.

 

This will ensure confidence amongst stakeholders as well as management.

 

2. Visibility:

 
One of the biggest challenges of Cloud Computing is gaining visibility into the infrastructure of the service provider. Most organizations will provide some sort of certification such as ISO 27001 but does that ensure that everything is taken care of? Unfortunately it does not. So how should an organization tackle visibility? Here are certain steps to do so:
2.1 Have a dedicated team in-house:

 
Have a small but dedicated in-house team of system admins, network admins, or security personnel who can mark the nature of data as to whether it is critical/semi-critical/normal and also monitor the movement of data. The KRA of this team should be to report violations and Log anomalies.

 

 

2.2 Implement CCTV Monitoring:
Through CCTV monitoring the customer can have a ground view on the physical security of the place in which the data resides. Record the findings, review them every month, note observations, circulate the observations and archive them on an external storage. These findings will be particularly useful when dealing with legal issues arising out of operations occurring across the globe.

 
2.3 Identity Management and Access Control:
Ensure that the service provider give you the power to enforce Identity Management and Access Control privileges as per your requirements; for critical systems implement dual identity authentication wherein changes on require the acknowledgement of two people. Implement Authentication, Authorization, and Audit (AAA) for these systems and have them logged on a sys-log server.

 

 

2.4 Backup:
Business Continuity and Disaster Recovery are critical components of availability but the CIO needs to ensure that they have first-hand facts on the back-up data, as to where it is  located, who has access to it, and how the data is being managed.

 

2.5 Implement Logging Server:
Implement a logging server wherein   all transactions carried on your  infrastructure and data will be logged to this server. Provide no service provider  access to this server; access to this
server must rest with a specific group of people from within the organization, such as the CISO or CIO only. Ensure that the log files are read-only.

 
3. Governance:
This pillar is based on the paradigm trust-but-verify. In spite of getting all the above factors correct the CISO  or CIO must adopt an audit-based approach. We present a multi-pronged governance approach here.

 

 
3.1 Risk Management:
Have a quarterly risk assessment conducted by your internal security team in line with international standards such as NIST or COBIT. Record the observations and have them circulated.

 

 

3.2 Vulnerability Analysis and Penetration Testing:
Have a VA/PT done by your internal team every half year and a yearly VA/PT done by a team of external specialists; this will help uncover surprise items and mitigate risks.

 

 

3.3 Internal Audit:

 

Have a year-end audit conducted by an internal team and a similar audit done by external auditors, who are specialists. Have the audits collated, and discuss    the results with the top management   of service providers. Identify concerns    and areas for improvements and have   them addressed through various  compensating mechanisms.
Conclusion:

 

Cloud Computing is here to stay and will change   the way data is being managed, stored and processed. By following the  procedures laid out above the CISO/CIO can ensure that a high level of  data security can be achieved. The above process requires well-planned  strategy, budget and resources but going by the Return-On-Investment  (ROI) that Cloud Computing provides management will hardly say NO.

 

About the Authors:

vinoth

 

 

 

 

 

 

 

 

 

 
Vinoth Sivasubramanian,

Professional security expert focussing to reach pinnacle of excellence in areas of IT security ,  governance , Ethics and Leadership.

 

 

mohamed

 

Mohamed Mohieldeen
I am the Vice President Service Delivery and Strategy of Intrendz Consulting
Mail : [email protected]

Leave a Reply

Your email address will not be published. Required fields are marked *