SlideShare a Scribd company logo
1 of 23
Department of Homeland
       Security
       National Cyber Security Division




Cloud Computing from the Security Perspective:
       A Primer for Federal IT Managers
Department of Homeland Security, National Cyber Security
            Division
            Cloud Computing White Paper




nsert client name
title




          Table of Contents

          Executive Summary.................................................................................................................................................................... 1

          1. Introduction.............................................................................................................................................................................. 3
               Purpose 3
               Cloud Computing: An Old Idea Whose Time Has (Finally) Come.......................................................................................... 3
               What is Cloud Computing?..................................................................................................................................................... 3

          2. Federal Business Drivers........................................................................................................................................................ 5
               A Mandate from the Top (and the Bottom Line)..................................................................................................................... 5
               Federal Chief Information, Performance, and Technology Officers........................................................................................ 5
               Potential for Cost Control........................................................................................................................................................ 5
               Cloud Computing Provides Convenience and Capability....................................................................................................... 6

          3. Perspectives on Moving to the Cloud................................................................................................................................... 7
              What are my sourcing options?.............................................................................................................................................. 7
              Is There Interest In Cloud Computing From Foreign Governments?...................................................................................... 8

          3. Key Federal Security Challenges......................................................................................................................................... 10

          4. Benefits and Drawbacks....................................................................................................................................................... 14
              Anticipated Benefits ............................................................................................................................................................. 14
              Anticipated Drawbacks......................................................................................................................................................... 14

          5. Federal, Defense, State and Other Cloud Initiatives........................................................................................................... 16
               Apps.gov............................................................................................................................................................................... 16
               National Aeronautics and Space Administration .................................................................................................................. 16
               Department of Veteran Affairs.............................................................................................................................................. 16
               Defense Information Systems Agency.................................................................................................................................. 17
               U.S. Navy.............................................................................................................................................................................. 17
               U.S. Army.............................................................................................................................................................................. 18
               State and Local Use ............................................................................................................................................................ 18
               Conclusion............................................................................................................................................................................ 19

          APPENDIX A: ACRONYMS....................................................................................................................................................... 20

          APPENDIX B: Cloud Computing Checklist............................................................................................................................ 21




                    Cloud Computing from the Security Perspective: A Primer for Federal IT Managers
            i
Executive Summary
    The potential of cloud computing is particularly important now, when most federal agencies are looking to
    update aging legacy systems. This white paper seeks to clarify the variations of cloud services and
    examine the current and near-term potential                                        for    federal    cloud
    computing      from    the     cyber   security                                    perspective.      Cloud
    computing offers attractive opportunities to                                       cut costs; accelerate




                                                                                                           centers and operations, and ultimately adopting
    development; replace expensive, quickly                                            outmoded




                                                             ““The Federal Government will transform its

                                                                                                           virtualizing data centers, consolidating data
    infrastructure, and increase agency flexibility                                    for both infrastructure




                                                                                                           Information Technology Infrastructure by
    and application The idea of cloud computing                                        brings up a host of




                                                                                                                                                               - IT Manager, Department of Defense
                                                                                                             - FY2010 Federal Budget, Analytical
    issues for Chief Information Officers (CIO)                                        and Chief Information




                                                                                                           Perspective, Cross Cutting Programs
                                                                                                           a cloud-computing business model.”
    Security Officers (CISO) as they consider                                          moving their mission-




                                                                                                                                                             “Is the cloud just the latest hype?”
    critical applications and information onto                                         remote          servers
    controlled by third parties. Beyond the cost                                       savings             and
    productivity benefits of cloud computing is the                                    attraction     of     a
    convenient, on-demand model for network                                            access to a shared
    pool of configurable computing resources that                                      can      be     rapidly
    provisioned and released with minimal                                              management effort or
    service provider interaction.1

    Cloud computing means different things to                                                                                                                                                        different people. The
    National     Institute of    Standards     and                                                                                                                                                   Technology        has
    published no less than fifteen iterations of its                                                                                                                                                 “Working Definition of
    Cloud Computing” In general terms, the key                                                                                                                                                       to      understanding
    cloud computing, especially as security in the                                                                                                                                                   cloud is becoming a
    major issue, is to recognize that the                                                                                                                                                            technology is largely
    not new, or untested. Cloud computing is the                                                                                                                                                     next      step     for
    information technology (IT) services to take                                                                                                                                                     as more established
    parts of IT are commoditized.

    When moving to the cloud, agencies need to understand how it differs from their existing environments.
    The cloud is a shared and largely virtual environment. Data owners need to understand the implications
    of their data residing in the cloud service provider’s data center and under its protection. It’s critical that
    an agency understands the controls its cloud provider has in place. In the cloud, federal managers need
    to recognize that while they still retain accountability for their data, the responsibility for its protection has
    passed to the vendor.

    In an era when the Internet is ubiquitous and international corporations have consolidated IT service
    centers and sited them globally, governments are challenged to both use the lessons learned from global
    corporations and explore the potential found by other governments, especially those in the developed
    world. Further, many nations have the potential (though often not the cultural ability), because they are
    smaller than our own government and may have less stringent governance, to move quickly to adopt new
    technology. In Europe, where privacy laws are more circumspect than in the US, cloud computing has
    lagged as an attractive solution.

    The appointment of the Federal Chief Information, Performance, and Technology officers, fundamental
    re-examination of investments in technology infrastructure, and “work-at-a-distance” act as federal
    business drivers. The Obama administration’s key White House technology experts, new agency
    leadership, and members of Congress, are all pushing for more transparency, accountability improving
    innovation, efficiency and effectiveness in federal IT. Overall, these new advisors are heavily involved in
    driving technology modernization across government. While agency portfolios are already established for
    the next budget cycles, these new advisors will encourage the Office of Management and Budget (OMB)


    1
        "Crosscutting Programs." <http://www.whitehouse.gov/omb/budget/fy2010/assets/crosscutting.pdf>



         Cloud Computing from the Security Perspective: A Primer for Federal IT Managers
1
to ask compelling questions regarding alternative investments and return on investment (ROI) in OMB
    300 reviews.

    In addition to the U.S. government, foreign governments have also shown an interest in cloud computing.
    The government of Singapore has been both more forward and more aggressive in embracing the cloud
    as part of a prominent research consortium and consistent with its advanced e-government initiatives.
    The Open Cirrus™ project aims to address this problem by providing systems researchers with a testbed
    of distributed data centers they can use for systems-level (as well as applications and services) cloud
    computing research.2 As these and other initiatives move forward internationally, the US can benefit from
    lessons learned from both successes and failures.

    Implementing a cloud-computing platform entails different risks than dedicated agency data centers.
    Risks associated with the implementation of a new technology service delivery model include policy
    changes, implementation of dynamic applications, and securing the dynamic environment. The mitigation
    plan for these risks depends on establishing a proactive security program to implement industry best
    practices and government policies in the management of any cloud program.3

    As cloud computing continues to evolve the terms and benefits it will deliver, agencies like the Defense
    Information Systems Agency (DISA) are working closely with technology leaders in many areas to define
    standards and set the stage for private clouds. From a federal perspective, other agencies like National
    Aeronautics and Space Administration (NASA) and Department of Veterans Affairs are making advances
    with their own initiatives. Within the Department of Defense, both the Army and Navy have had successful
    implementations of pilot programs.

    Cloud computing is an evolving computing paradigm that is real and becoming progressively more
    popular. While there are advantages and similarly challenges to adopting the cloud computing concept,
    the key consideration provided in this white paper can be used as a starting point. Adoption of cloud
    computing symbolizes a major cultural transformation for both CIOs and CISO and the lines of business
    each support. In and effort to better support the agencies' mission, senior IT management need to think
    freshly about "make vs. buy" sourcing decisions for their IT service delivery capabilities.

    The cloud is going to happen. As we move forward in cloud computing for support to the mission, the
    federal enterprise should continue to strengthen formal processes to ensure that lessons learned from
    both industry and the government's own successful cloud computing initiatives are continually examined
    and broadly adopted across the enterprise.4




    2
      Ibid
    3
      "Crosscutting Programs." <http://www.whitehouse.gov/omb/budget/fy2010/assets/crosscutting.pdf>
    4
      Gourley, Bob. "Cloud Computing and Cyber Defense." 21 MAR 2009



        Cloud Computing from the Security Perspective: A Primer for Federal IT Managers
2
1. Introduction
    Purpose
    In IT marketing and popular management literature, the message is that cloud computing is going to
    modernize IT. Whether that is true is not yet clear; in fact, what cloud computing is takes a variety of
    permutations.

    This white paper seeks to clarify the variations of cloud services and examine the current and near-term
    potential for Federal cloud computing from the cyber security perspective. The potential of cloud
    computing is particularly important now, when most federal agencies are looking to update aging legacy
    systems. It offers seductive opportunities to cut costs; accelerate development; replace expensive,
    quickly outmoded infrastructure and increase agency flexibility for both infrastructure and applications.
    Furthermore, IT and telecommunications infrastructure is an area where government organizations use a
    variety of sourcing models. While many agencies still prefer to run their own infrastructure, over the past
    several years there has been a trend toward sharing or centralizing infrastructure.5
    Cloud Computing: An Old Idea Whose Time Has (Finally) Come
    For many IT managers, it seems that cloud computing is simply a new term for a long-held dream of
    computing as a utility6, which has recently emerged as a commercial reality. The key to understanding
    cloud computing, especially as security in the cloud is becoming a major issue, is to recognize that the
    technology is largely not new, or untested. Cloud computing is the next step for IT services to take as
    more established parts of IT are commoditized. Cloud computing represents the logical progression to
    outsourcing of commodity IT services in a manner similar to that which the government has been doing
    for years.
    What is Cloud Computing?
    Cloud computing means different things to different people. NIST has published no less than fifteen
    iterations of its “Working Definition of Cloud Computing” In general terms, cloud computing is a
    convenient, on-demand model for network access to a shared pool of configurable computing resources
    (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released
    with minimal management effort or service provider interaction. The cloud element of cloud-computing
    derives from a metaphor used for the Internet, from the way it is often depicted in computer network
    diagrams. Conceptually it refers to a model of scalable, real-time, internet-based information technology
    services and resources, satisfying the computing needs of users, without the users incurring the costs of
    maintaining the underlying infrastructure. Examples in the private sector involve providing common
    business applications online, which are accessed from a web browser, with software and data stored on
    the “cloud” provider’s servers.7

        Essential Characteristics                       Delivery Models                       Deployment Models
        •   On-demand self-service
                                               • Software as a Service (SaaS)                 •   Private Cloud
        •   Broad network access
                                               • Platform as a Service (PaaS)                 •   Community Cloud
        •   Resource pooling
                                               • Infrastructure as a Service (IaaS)           •   Public Cloud
        •   Rapid Elasticity
                                                                                              •   Hybrid Cloud8
        •   Measured Service




    5
        Maio, Andrea. "Government in the Cloud: Much More Than Computing
    6
      PARKHILL, D. The Challenge of the Computer Utility. Addison-Wesley Educational Publishers Inc., US, 1966
    7
      Crosscutting Programs
    8
      Draft NIST Working Definition of Cloud Computing v1.5 dtd 8/21/09




         Cloud Computing from the Security Perspective: A Primer for Federal IT Managers
3
Cloud Computing from the Security Perspective: A Primer for Federal IT Managers
4
2. Federal Business Drivers

    A Mandate from the Top (and the Bottom Line)

    For most federal CIO’s, relief from the persistent and increasing costs of infrastructure operation and
    maintenance is an attractive option, though few would consider it at the expense of the control mandated
    under Clinger-Cohen.        Further, many are                           considering or currently in the
    process of updating applications, mostly in the                         direction of Commercial-off-the-
    Shelf Software (COTS) replacements for legacy                           systems and moving to a medium




                                                              operations demand that technologies spread
                                                              “The days of dedicated servers have passed
    which might simplify application updates and                            distribute their cost across a
    broader base would be welcome. These                                    intrinsic pressures are reinforced




                                                              due to expense and inefficiency. Future
    by political drivers. The Obama administration’s                        key White House technology




                                                                                                           –IT Manager, Federal Civilian Agency
    experts, new agency leadership, and members                             of Congress, are all pushing for
    more transparency, accountability improving                             innovation,      efficiency    and
    effectiveness in Federal IT.




                                                                                                                                                  The 2009 Cloud Consensus Report p.3
    Federal Chief Information,                                                                                                                                                          Performance, and
    Technology Officers



                                                              and stretch to do more.”
    From March 2009, when President Obama                                                                                                                                               named Vivek Kundra the Federal
    CIO, Kundra urged agencies to aggressively                                                                                                                                          investigate cloud computing and
    sponsored a GSA Cloud initiative In addition to                                                                                                                                     Kundra, Jeffrey Zients, the new
    Chief Performance Officer, and Aneesh                                                                                                                                               Chopra, the Chief Technology
    Officer are committed to technological                                                                                                                                              innovation to help the country
    meet its goals from job creation, to reducing                                                                                                                                       health care costs, to protecting
    the homeland. Overall, these new advisors are                                                                                                                                       intended to drive technology
    modernization across government, exerting                                                                                                                                           pressure from the top to do so.
    While agency portfolios are already established                                                                                                                                     for the next budget cycles, these
    new advisors will encourage OMB to ask                                                                                                                                              compelling questions regarding
    alternative investments and ROI in OMB 300 reviews.

    Potential for Cost Control

    Actual or feared budget constraints are pushing government IT leaders to explore new, potentially less
    expensive avenues to support some of the operational needs of their organizations.9 A June 2009 survey
    of 605 government IT managers found cost pressures as the top four perceived benefits of cloud
    computing:

          •    57% anticipated reduced hardware requirements

          •    45% saw the potential for reduced costs in a pay-as-you go model

          •    35% saw other resource savings in reduced staff requirements and the ability to focus staff on
               more critical tasks and

          •    33% cited flexibility to access a variety of services. 10

    Not surprisingly in today's economic climate, the desire to save money is part of many discussions.
    However, cloud computing does not always save money — in fact it can drive costs up if it is used simply


    9
        Maio, Andrea. "Government in the Cloud: Much More Than Computing
    10
        The 2009 Cloud Consensus Report (Meritalk/Merlin, Washington), p.11.



         Cloud Computing from the Security Perspective: A Primer for Federal IT Managers
5
to replace on-premises work with an exact duplicate of that work in the cloud. Knowing when to redesign
    or when to avoid using cost savings as a justification for cloud computing is critical.11

    The fifth most anticipated benefits from the survey also spoke to cost—the indirect cost savings of
    productivity enhancements—noting the potential for group collaboration (24%).

    The final most prominent perceived benefit cited (22%) was in Continuity of Operations Planning (COOP),
    the most significant measure of overall system resilience. That is consistent with the FY10 budget
    priorities. Enhancing cyber security and technology research and development by supporting partnerships
    with government, industry, and academia is a budget highlight with $355 million targeted to make private
    and public sector cyber infrastructure more resilient and secure.

    Cloud Computing Provides Convenience and Capability
    Beyond the cost savings and productivity benefits of cloud computing is the attraction of a convenient, on-
    demand model for network access to a shared pool of configurable computing resources (e.g., networks,
    servers, storage, applications, and services) that can be rapidly provisioned and released with minimal
    management effort or service provider interaction. Examples from the private sector involve providing
    common business applications online, accessed from a web browser, with software and data stored on
    the “cloud” provider’s servers.12

    Capability is about the ability to do things that otherwise couldn't be done, A great appeal of the cloud is
    the potential to create new solutions that were not technically or economically feasible without the use of
    cloud services. A key example is new application development. One of the main characteristics of cloud
    computing that enables these capabilities is elasticity.13

    Additional potential for cloud use is to enable federal employees to work in real time from remote
    locations, reducing travel costs and energy consumption, and improving the Government’s emergency
    preparedness capabilities. Cloud-computing and “work-at-a-distance” represent major new Government-
    wide initiatives, supported by the CIO Council under the auspices of the Federal CIO and funded through
    the General Services Administration (GSA) as the service-provider.14




    11
       David Smith, Daryl Plummer, David Cearley, "The What, Why and When of Cloud Computing." Gartner (2009)
    12
       "Crosscutting Programs." <http://www.whitehouse.gov/omb/budget/fy2010/assets/crosscutting.pdf>
    13
       David Smith, Daryl Plummer, David Cearley, "The What, Why and When of Cloud Computing." Gartner (2009)
    14
       "Crosscutting Programs." <http://www.whitehouse.gov/omb/budget/fy2010/assets/crosscutting.pdf>



         Cloud Computing from the Security Perspective: A Primer for Federal IT Managers
6
3. Perspectives on Moving to the Cloud

    Who are the Major Service Providers?

    When moving to the cloud, agencies need to understand how it differs from their existing environments.
    The cloud is a shared and largely virtual environment, Data owners need to understand the implications
    of their data residing in the cloud service provider’s data center and under its protection. It’s critical that
    an agency understands the controls its cloud provider has in place. In the cloud, federal managers need
    to recognize that while they still retain accountability for their data, the responsibility for its protection has
    passed to the vendor.

    Understanding how the service provider has historically gone to market within the federal environment
    may be an indication of who to select when the agency is ready to decide on a vendor. Large -scale cloud
    providers are expected to be more secure than smaller or less established companies out there offering
    cloud services, because they have the experienced personnel, resources, and infrastructure that smaller
    organizations might lack.

    The list of cloud computing solutions and service providers continues to grow daily. The sample below is
    illustrative and does not imply any federal endorsement.

                    Software as a Service (Saas)                               Platform as a Service
       •   Google Apps                • Oracle On Demand        • Amazon E2C                    • Coghead
       •   Zoho Office                Apps                      • Salesforce.com                • Etelos
       •   Workday                    • NetSuite ERP            Force.com                       • LongJump
       •   Microsoft Office Live      • Salesforce.com SFA      • Google App Engine             • Boomi
                                                                                                • Microsoft Azure
                            External IaaS                                           Internal IaaS
       • HP/EDS (TBD)                  • Joyent                 • HP Adaptive Infrastructure as a Service
       • IBM Blue Cloud                • Rackspace
       • Sun Grid                      • Jamcracker
               Utility Systems Management Tools+                            Utility Application Development
       • VMWare                        • Xen                    •   Data Synapse                  • IBM WebSphere XD
       • IBM Tivoli                    • Zuora                  •   Univa UD                      • BEA Weblogic
       • Cassatt                       • Aria Systems           •   Elastra Cloud Server          Server VE
       • Parallels                     • eVapt                  •   3tera App Logic               • Mule



    What are my sourcing options?
    Among internal sourcing approaches, the most relevant from a government perspective are:

      • Own - where the government organization that uses the resource also owns or directly controls it.
        The resource may be totally in-sourced or totally outsourced, but the government organization is its
        exclusive user.
      • Share - where several government organizations share the resource, through joint governance
        arrangements and with one organization being responsible for either owning the resources or
        sourcing them as deemed fit.
      • Centralize - similar to the above, but without the joint governance component. That is, government
        organizations are simply clients of whoever provides access to the resource.




      Cloud Computing from the Security Perspective: A Primer for Federal IT Managers
7
• Commoditizing - where the resource or the way to access it or both is completely commoditized, and
           it is managed outside the government boundaries without any control of where it is located.15

    Is There Interest In Cloud Computing From Foreign Governments?

    In and era when the internet is ubiquitous and international corporations have consolidated IT service
    centers and sited them globally, governments are challenged to both use the lessons learned from global
    corporations and explore the potential found by other governments, especially those in the developed
    world. Further, many nations have the potential (though often not the cultural ability), because they are
    smaller than our own government and may have less stringent governance, to move quickly to adopt new
    technology. In Europe, where privacy laws are more circumspect than in the US, cloud computing has
    lagged as an attractive solution. Based upon the Nippon Telegraph and Telephone Europe (NTT) “Cloud
    or Fog?” survey, CIOs in the United Kingdom generally aren't embracing cloud computing The survey
    found that CIOs are adopting online software and service delivery with secure hosted environments, but
    they're hesitating to adopt the cloud computing concept, putting cloud computing at the bottom of their list
    for investment priority. The UK government, however, is sanguine about a private cloud:

               In the government's Digital Britain report published yesterday [June 2009], [Lord] Carter said the
               so-called "G-Cloud" should be created within the next three years, to allow local and central
               government departments to share centrally hosted applications. The CIO Council and UK IT trade
               association Intellect are currently developing a business case for funding the G-Cloud. "Provided
               that this business case can be properly developed, the adoption of the G-Cloud will be a priority for
               government investment to secure efficiencies," Lord Carter said in the report.16

    In Asia, governments are seeing cloud computing as part of an industrial strategy and eager to
    develop capabilities. In Japan, the phenomenon is recent:

               Masayuki Hyugaji, spokesman for the Ministry of Internal Affairs and Communications of Japan [says they]
               ha[ve] embarked in a series of new research and development activities including launching a Global Inter-
               Cloud Technology Forum, [whose] primary focus … is on Cloud Federation and currently includes several
               large Japanese companies. The aim of the forum is to promote standardization of network protocols and the
               interfaces through which cloud systems "interwork" with each other, and to enable the provisioning of more
               reliable cloud services.

               Main activities and goals
               - Promote the development and standardization of technologies to build or use cloud systems;
               - Propose standard interfaces that allow cloud systems to interwork with each other;
               - Collect and disseminate proposals and requests regarding organization of technical exchange meetings
               and training courses;
               - Establish liaison with counterparts in the U.S. and Europe, and promote exchange with relevant R&D
               teams.

    The government of Singapore has been both more forward and more aggressive in embracing the cloud
    as part of a prominent research consortium and consistent with its advanced e-government initiatives.

    They have capitalized on the growing interest in cloud computing within the systems and applications
    research communities. Since systems researchers often find it difficult to do credible work without access
    to large-scale distributed data centers and application researchers can also benefit from being able to
    control the deployment and consumption of hosted services across a distributed cloud computing testbed,
    this project, Open Cirrus, envisions enabling system researchers, who are developing the techniques and
    software infrastructure to support cloud computing, to obtain low-level access to large scale cluster
    resources. 17

    15
         Maio, Andrea. "Government in the Cloud: Much More Than Computing
    16
         http://www.silicon.com/publicsector/0,3800010403,39442843,00.htm
     Roy Campbell, Indranil Gupta, Michael Heath, Steven Y. Ko, Michael Kozuch, Marcel Kunze, Thomas
    17

    Kwan, Kevin Lai, Hing Yan Lee, Martha Lyons, Dejan Milojicic, David O’Hallaron, and Yeng Chai Soh.
    Open Cirrus™ Cloud Computing Testbed: Federated Data Centers for Open Source Systems and


         Cloud Computing from the Security Perspective: A Primer for Federal IT Managers
8
The Open Cirrus™ project aims to address this problem by providing systems researchers with a testbed
    of distributed datacenters they can use for systems-level (as well as applications and services) cloud
    computing research. (Open Cirrus™ is a trademark of Yahoo!, Inc.). The project is a joint initiative
    sponsored by HP, Intel, and Yahoo!, in collaboration with the National Science Foundation (NSF), the
    University of Illinois (UIUC), Karlsruhe Institute of Technology, and the Infocomm Development Authority
    of Singapore. Open Cirrus site members is expected to increase in 2009.

    The Open Cirrus testbed is a collection of federated data centers for open-source systems and services
    research. The initial testbed is composed of six sites in North America, Europe, and Asia. Each site
    consists of a cluster with at least 1000 cores and associated storage. The objectives of the Open Cirrus™
    are to:

     •   Foster systems research around cloud computing
     •   Vendor-neutral open-source stacks and APIs for the cloud
     •   Expose research community to enterprise level requirements
     •   Provide realistic traces of cloud workloads

    As these and other initiatives move forward internationally, the US can benefit from tracking lessons
    learned from both successes and failures.




    Services Research 200


      Cloud Computing from the Security Perspective: A Primer for Federal IT Managers
9
3. Key Federal Security Challenges
     Implementing a cloud-computing solution incurs different risks than with dedicated agency data centers.
     Risks associated with the implementation of a new technology service delivery model include policy lags,
     implementation of dynamic applications, and securing the dynamic environment. The mitigation plan for
     these risks depends on establishing robust security program to implement industry best practices and
     government policies in the management of any program. In addition, the federal community will need to
     actively put in place new security measures which will permit secure use of dynamic applications and
     information-sharing to be implemented in a secure fashion.18

     Specific security challenges include:

     Privacy:
     Regulations on the treatment of personal information vary across the globe and a growing number of
     countries place restrictions on whether it can be stored outside of the country. It is difficult or impossible
     for a cloud service to provide a single level of service that is acceptable in every jurisdiction. Providers are
     becoming more willing to accommodate privacy regulations through contractual commitments to store
     data within specific countries, although this is difficult to verify.19

      “Agencies must implement an assessment strategy when utilizing cloud computing services. When
     turning to cloud computing, the function of IT security will morph into more of a compliance and risk
     management role, rather than security operations”, said Chenxi Wang, principal analyst at Forrester
     Research. In an age when the consequences and potential costs of mistakes are rising fast for
     companies that handle confidential and private customer data, IT security professionals must develop
     better ways of evaluating the security and privacy practices of the cloud services. An effective
     assessment strategy must cover data protection, compliance, privacy, identity management, secure
     operations, and other related security and legal issues. 20

     Jurisdiction:
     National and state regulatory implications extend beyond privacy considerations. Requirements vary on
     issues including appropriate practices, investigative support and breach disclosure. Do not expect that
     contractual commitments will be followed and enforced to the same degree in every country.21

     Investigation and E-Discovery:
     Internal investigations of inappropriate or illegal activity and electronic discovery are difficult and
     expensive propositions, even when conducted within your infrastructure. If you are considering
     purchasing a service that would process anything considered a business record, or if you otherwise
     anticipate a need to conduct investigations, then you cannot assume that a service provider will be willing,
     or even able, to support them. The virtualization inherent in cloud services makes it especially difficult to
     conduct forensic investigations, because logs and data for multiple customers may be co-located, may
     also be spread across an ever-changing set of hosts and data centers, and may not persistent on a
     particular device. If you cannot get a contractual commitment to support specific forms of investigation,
     along with evidence that the vendor has already successfully supported such activities, then the only safe
     assumption is that investigation and discovery requests will be impossible. Be aware that investigative
     cost may be extremely high, especially if your organization is obligated to meet government or court
     schedules.22 Federal agencies potentially subject to e-discovery in support of litigation must keep this in
     mind.



     18
        "Crosscutting Programs." <http://www.whitehouse.gov/omb/budget/fy2010/assets/crosscutting.pdf>
     19
        Jay, Heiser. "What You Need to Know About Cloud Computing Security and Compliance." Gartner (2009)
     20
        Moscaritolo, Angela. "Cloud computing providers require strong audits." SCMagazine (2009): 2. Print.
     21
        Jay, Heiser. "What You Need to Know About Cloud Computing Security and Compliance." Gartner (2009)
     22
        Jay, Heiser. "What You Need to Know About Cloud Computing Security and Compliance." Gartner (2009)



          Cloud Computing from the Security Perspective: A Primer for Federal IT Managers
10
Data Retention:
     If business records must be archived for legal purposes, then any associated cloud-based activity must
     also offer a form of archiving that is verifiably robust in the storage and retrieval of data. High-end e-mail
     products often support such requirements, but most other cloud offerings do not.23 Customers must also
     determine whether the cloud vendor is capable of meeting the client agency’s National Archives and
     Records Administration requirements.

     Process Verification:
     Regulations such as Sarbanes-Oxley in the U.S., which emphasize process oversight, are usually being
     addressed through the Statement of Auditing Standards No. 70 (SAS70) auditing standard. This is an
     expensive form of third-party verification that is often misunderstood as being a security certification, but it
     is only a review of process, and does not consider technical issues.24 In addition, Standard SAS70 audits
     may not be practical in a cloud environment.

     Multi-tenancy:
     Multi-tenancy resulting from shared use of a device can expose all tenants to a greater level of external
     risk due to the business practices of any tenant. As long as the cloud provider builds its security to meet
     the higher-risk client, then all of the lower risk clients get better security than they would have normally.

     Security Assessment:
     The cloud environment is very dynamic. New capacity is continually added and networks are optimized to
     provide efficient service. As a result, cloud providers must conduct continuous security assessments to
     ensure that changes in configurations and infrastructure do not introduce vulnerabilities,. The
     assessments should be done in a prescribed manner following written policies. The vendor should be
     required by contract to notify the customer immediately upon discovery of a security issue affecting the
     client’s data or service.25 Additional periodic assessments should be performed by a mutual agreed upon
     independent third party.

     Share Risk:
     In many instances, your cloud service provider will not be the cloud operator. But it may be providing a
     value-added service on top of another cloud provider’s service. For example, if a SaaS provider needs
     infrastructure, it may make more sense to acquire that infrastructure from an IaaS provider rather than
     building it. These cloud service provider tiers that get built by layering SaaS on top of IaaS, for example,
     can affect your security. In this type of multi-tier service provider arrangement, each party shares the risk
     of security issues because the risk potentially impacts all parties at all layers. The identification of all
     parties involved in providing a cloud solution is a critical factor in a total risk mitigation plan.26

     Staff Security Screening:
     Most organizations employ contractors as part of their workforce. Cloud providers are no exception. As
     with regular employees, the contractors should go through a full background investigation comparable to
     your own employees. Your cloud provider must be able to provide you with its policy on background
     checks and document that all of its employees have had a background check performed, according to the
     policy. Further, you should contractually bind the cloud provider to require the same level of due diligence
     with its contractors. 27

     Distributed Data Centers:
     Disasters are a fact of life. They include hurricanes, tornadoes, landslides, earthquakes, and even fiber
     cable cuts. In theory, a cloud computing environment should be less prone to disasters because providers
     can provide an environment that is geographically distributed. However, some providers may not have
     sufficient geographical distribution to provide sufficient resilience for its operations. Customers should
     23
         Ibid.
     24
         Ibid.
     25
         Almond, Carl. "A Practical Guide to Cloud Computing Security." Perspective (2009): 9. Print.
     26
        Ibid..
     27
         Almond, Carl. "A Practical Guide to Cloud Computing Security." Perspective (2009): 9. Print.



          Cloud Computing from the Security Perspective: A Primer for Federal IT Managers
11
require their provider to have a working and regularly tested disaster recovery plan, which includes
     Service Level Agreements (SLAs). For those organizations that do contract for geographically diverse
     cloud services, they should test their cloud provider’s ability to respond to a disaster on a regular basis.28

     Physical Security:
     Physical external threats should be analyzed carefully when choosing a cloud security provider. Do all of
     the cloud provider’s facilities have the same levels of security? Are you being sold on the most secure
     facility with no guarantee that your data will actually reside there? Do the facilities have, at a minimum, a
     man trap, card or biometric access, surveillance, an onsite guard, a requirement that all guests be
     escorted and all non-guarded egress points be equipped with automatic alarms?29 Do the facilities meet
     the standards and security requirements of your department, agency, or organization?

     Coding:
     Cloud providers in-house software may contain application bugs. Customer should review the cloud
     provider’s secure coding practices. Also, all code should be written using a standard methodology that is
     documented and can be demonstrated to the customer.30

     Data Leakage:
     Data leakage has become one of the greatest organizational risks from a security standpoint. Virtually
     every government worldwide has regulations that mandate protections for certain data types. The cloud
     provider should have the ability to map its policy to the security mandate you must comply with and
     discuss the issues. At a minimum, the data that falls under legislative mandates, or contractual obligation,
     should be encrypted while in transit and at rest. Further, a yearly risk assessment just on the data in
     question should be done to make sure the mitigations meet the need. The cloud provider also must
     include data leakages in its security incident response and notification policy.31

     Coming Regulations:
     Looking forward, new regulations and case law that will affect how records are kept and managed are on
     the horizon in the United States and abroad. The current U.S. administration has mandated transparency
     and accountability. These tenets will be the cornerstones of new regulations that will soon be in force.
     Transparency and accountability will drive future records management directives much like the Sarbanes-
     Oxley Act of 2002 did before them. It is critical that any solution, inside the organization or outside, be
     prepared for this new mandate as it relates to records and information.

     This means, while organizations must maintain easy access to information, having appropriate
     management controls will be even more important tomorrow than it is today. Where information is
     maintained, how it is managed, and how the information is used to support an organization will drive the
     development of new compliance strategies and tools. "How is this done in the cloud?" is a question that
     organizations must answer specific to its records requirements.32

     Cloud Applications:
     Accessing cloud technologies requires a thin-client, and the world’s most commonly used thin-client for
     this purpose is a web browser. This means the vast majority of all applications on the Internet have some
     kind of web or application server on which the business logic is implemented. Currently, most of the
     money spent on security goes into firewalls and antivirus solutions, but in the last 10 years the typical
     target for attacks has shifted from the network layer to the application layer because the operating
     systems and services available to the general public were cut down. As a result, it is now easier to target
     the application logic or framework of an application than the actual server behind the hardened network
     perimeter. Applications are mostly developed by the businesses themselves and developer s do not have

     28
        Ibid.
     29
        Ibid.
     30
        Ibid.
     31
        Ibid.
     32
        Gatewood, Brent. "Clouds On The Information Horizon: How To Avoid The Storm." Information Management
     Journal. (2009)



          Cloud Computing from the Security Perspective: A Primer for Federal IT Managers
12
a common, standard set of secure development policies.33 This creates a target rich environment of
     vulnerabilities to be exploited.34 These problems include:

          •   Injection Flaws
          •   Malicious File Execution
          •   Cross Site Scripting (XSS)
          •   Insecure Communications
          •   Failure to Restrict URL Access
          •   Insecure Cryptographic Storage
          •   Insecure Direct Object Reference
          •   Cross Site Request Forgery (CSRF)
          •   Information Leakage and Improper Error Handling
          •   Broken Authentication and Session Management
     Capable IT Staffing Challenges:
     Based upon a report from the Partnership for Public Service, entitled Cyber In-Security, the overriding
     finding of their analysis is that the federal government will be unable to combat these threats [cyber
     security] without a more coordinated, sustained effort to increase cyber security expertise in the federal
     workforce. Defense Secretary Robert Gates has stated that the Pentagon is “desperately short of people
     who have capabilities (defensive and offensive cyber security war skills) in all the services and we have to
     address it.” 35




     33
        "Defining a dWAF to Secure Cloud Applications." (2009): 2. Print.
     34
        Ibid.
     35
        Booz|Allen|Hamilton, "Cyber In-Security: Strengthening the Federal Cybersecurity Workforce." (2009): 3. Print.



          Cloud Computing from the Security Perspective: A Primer for Federal IT Managers
13
4. Benefits and Drawbacks

     Anticipated Benefits

     Through cloud computing, agencies can:

     Easily expand scalability and enhance elasticity – Using a cloud computing model, IT staff can meet
     changing user loads quickly without having to engineer for peak loads. Elasticity is a benefit when
     enterprises are growing, providing the ability to purchase infrastructure on the margin at predictable costs.
     Equally as important, the elastic nature of cloud computing provides a way to cost-effectively and quickly
     scale down a service when it is no longer needed.36 Users can increase or decrease resources in minutes
     by ordering more capacity. No need to buy and install additional servers.37

     Reduce capital expenditure (CAPEX) – With external clouds, customers do not own the infrastructure.
     This enables enterprises to eliminate capital expenditures and consume resources as a service, paying
     only for what they use. Clouds also enable IT departments to save on application implementation,
     maintenance and security costs, while benefiting from economies of scale.38

     Save energy – ‘Going green’ is a key focus for many enterprises. Clouds enable IT organizations to
     reduce power, cooling, and space usage to help enterprises create and sustain environmentally
     responsible data centers.39

     Increase end-user productivity – Cloud computing increases user productivity because users can
     access systems regardless of location or device (e.g., PCs, laptops, etc.).40

     Improve reliability – Cloud computing can cost-effectively provide multiple redundant sites, facilitating
     business continuity and disaster recovery scenarios.41

     Free up capacity to invest in new projects – Moving applications out to a cloud frees up existing
     infrastructure and resources that can be reassigned to more strategic tasks.42

     Anticipated Drawbacks

     Limitations of Existing Cloud Computing Solutions
     Despite all the benefits, serious perils must be weighed. Once an organization decides to move to the
     cloud, it's at the mercy of power outages, network failures, security attacks and plain old human error by
     the provider.43 Many of today’s cloud computing solutions have serious issues, such as proprietary
     application platforms that require extensive redevelopment time to function off-premise, the inability to
     move to another provider if service level agreements (SLAs) aren’t met, and long lead times to move or
     set up new environments. The widespread adoption of cloud computing has been hindered by the
     limitations of these ineffective solutions, including:

          • A lack of interoperability between computing clouds – The absence of standardization across
            cloud computing platforms creates unnecessary complexity and results in high switching costs. Each
            cloud computing vendor has a different application model, many of which are proprietary, vertically
     36
        "Eight Key Ingredients for Building an Internal Cloud." http://www.vmware.com/files/pdf/cloud/eight-key-
     ingredients-building-internal-cloud.pdf
     37
         The future is cloudy; Roberto Rocha. The Gazette. Montreal, Que.:Jul 11, 2009. p. C.1
     38
        "Eight Key Ingredients for Building an Internal Cloud."
     39
        Ibid.
     40
        Ibid.
     41
        Ibid.
     42
        Ibid.
     43
        Future is cloudy; Roberto Rocha. The Gazette. Montreal, Que.:Jul 11, 2009. p. C.1



          Cloud Computing from the Security Perspective: A Primer for Federal IT Managers
14
integrated stacks that limit platform choice. Customers don’t want to be locked into a single provider
            and are often reluctant to relinquish control of their mission-critical applications to service providers.44
          • Lack of compatibility with existing applications – Many existing cloud technologies do not provide
            inherent compatibility with existing applications. Some current computing clouds in the public domain
            have sacrificed application compatibility in order to provide better scalability and other features. What
            this can potentially mean is that IT has to write entirely new applications specific to that computing
            cloud, or, at the very least, make very significant modifications to their existing applications before
            they will run in the computing cloud.45
          • Inadequate security – By design, most external cloud vendors typically support multi-tenancy
            compute environments. IT managers must look for the right balance between the security of an
            internal, dedicated infrastructure and the improved economics of a shared, external cloud
            environment.46




     44
        "Eight Key Ingredients for Building an Internal Cloud."
     45
        Ibid.
     46
        Ibid.



          Cloud Computing from the Security Perspective: A Primer for Federal IT Managers
15
5.        Federal, Defense, State and Other Cloud Initiatives

     The National Aeronautics and Space Administration (NASA) Ames Research Center recently launched a
     cloud computing environment called Nebula. The Defense Information Systems Agency (DISA) is one of
     the first organizations in the public or private sector to implement a self-service cloud computing
     environment. State governments are also looking to move forward with cloud computing initiatives.

     Apps.gov

     Apps.gov, which went live, Sept. 15, 2009, is an online storefront for federal agencies to quickly browse
     and purchase cloud-based IT services for productivity, collaboration, and efficiency. By consolidating
     available services, Apps.gov is intended to be a one-stop source for cloud services. GSA conducted the
     competitive bidding process to commercially obtain IaaS services for cloud storage services, virtual
     machines, and cloud web hosting. In a reflection of the commoditized nature of cloud computing,
     government agencies will be able to procure IaaS units of service on a fixed-price basis. I view of the fact
     that apps.gov went live days before this paper was written, there is no information available on users or
     services ordered.

     National Aeronautics and Space Administration
     One of NASA's first cloud computing initiatives, called Nebula, is up and running and could be used in
     support of the agency's space missions and to give Earth-based observers greater participation in the
     space program. Chris Kemp, CIO of NASA's Ames Research Center, mentioned Nebula for the first time
     recently at the Federal Information Technology on a Budget Forum in Washington, DC. NASA describes
     Nebula as a cloud computing environment that integrates open source components into a seamless, self-
     service platform. Nebula can be used for the rapid development of policy-compliant, secure Web apps,
     NASA says, adding that it will be used to support education, public outreach, collaboration, and mission
     support.47

     NASA describes Nebula as a combination of infrastructure, platform, and software as a service, and the
     agency has created an IT architecture to support that. Components include the Eucalyptus software
     developed at the University of California at Santa Barbara, the Lustre file system deployed on 64-bit
     storage nodes, the Django Web application framework, the SoIr indexing and search engine, and an
     integrated development environment. Nebula will be compatible with Amazon Web Services, which
     means AWS compatible tools will work with it and Nebula virtual servers can run on Amazon's Elastic
     Compute Cloud.48

     Currently on the production side, NASA is currently hosting a limited number of web applications to test
     drive their cloud. On the infrastructure side, the migration of the "Horsehead" 12-server cluster to their
     new facility is complete, and we are progressing on the procurement of 12 additional servers.

     Department of Veteran Affairs
     The Department of Veterans Affairs (VA) has deployed a small internal cloud. It wanted an early-warning
     system that could analyze data from its 100-plus clinics and hospitals and spot outbreaks of infectious
     diseases, and it had to do so on a tight budget. The project, dubbed the Health Associated Infection and
     Influenza Surveillance System, was built on six standard blade servers with converged network and
     storage I/O. The CPUs can be managed individually or as a virtualized whole, with workloads shifted and
     capacity summoned as necessary.49


     47
        NASA Launches Its First Effort, John Foley. InformationWeek. Manhasset:Jun 1, 2009. Iss. 1232, p. 11
     48
        Ibid.
     49
        Babcock, Charles. "Time To Believe In 'Private Clouds'." InformationWeek 13 Apr 2009



          Cloud Computing from the Security Perspective: A Primer for Federal IT Managers
16
The six-blade system runs Egenera's cloud management software, PAN Manager, which manages I/O,
     networking, and storage for the servers as a logical set. It can execute several applications, while always
     having enough horsepower to do its main job. The system's Dell blades and storage can be virtualized as
     a pooled resource in such a way that processing power can be devoted quickly to the VAs cloud, its
     highest-priority task. In many ways, the VAs new system anticipated Cisco's recently introduced "unified
     computing" platform, a virtualized, multiblade server chassis with converged I/O that Cisco touts as just
     the thing for cloud computing.50

     Defense Information Systems Agency
     The Defense Information Systems Agency (DISA) is involved in one of few examples of cloud computing
     in government. In October, the agency launched the Rapid Access Computing Environment (RACE),
     which allows Defense IT developers to test applications before they go live. RACE allows users to
     provision a server within 24 hours inside one of DISA's data centers, using a charge card. The agency
     plans to offer RACE on its classified network by the end of the year.51 The applications are stored at a
     DISA data center, and customers pay the agency only for the computing resources they need when they
     need them.52 Among the benefits it hopes to achieve are lower IT costs, pay-per-use accounting,
     accelerated deployment of mainframe -class systems, data center standardization, and flexibility in
     scaling up and down.53

     The agency has been virtualizing servers in its 13 data centers since 2006, when it awarded capacity
     contracts to APPTIS, Hewlett-Packard Co., Sun Microsystems and Vion Corp. The eight-year contracts
     allow DISA to purchase server capacity on an on-demand basis and to pay for it like a utility; DISA hosts
     6,000 operating environments and has virtualized 20 percent of them during the last two years. The
     biggest benefit of virtualization for DISA is that it speeds the process of standing up a new server. What
     used to take two years in some instances now takes two hours.

     Another measurable benefit of virtualization is the reduction of excess capacity. DISA has two SaaS pilot
     projects. It offers CollabNet's SourceForge software development platform on a per-user basis, and it
     plans to offer a commercial customer relationship management platform to its Army and Air Force
     customers. The projects require changes to DISA's procurement methodologies and security concerns
     have arisen.54

     U.S. Navy
     Sponsored by Dataline, LLC, the Secure Cloud Computing experiment has been designed to explore the
     use of a commercial IaaS platform as a viable means of supporting a specified subset of U.S. Navy
     mission requirements for global connectivity, server failover and application access. Goals for the
     experiment include:55

          • Demonstrating the establishment and use of trusted communication paths on a global public
            computing infrastructure; and
          • Demonstrating dynamic, mission driven, provisioning of information via trusted communication paths
            on a global public computing infrastructure56



     50
        Ibid.
     51
        Marsan, Carolyn. "Forecast: Mostly Cloudy." 04 SEP 2009
     Web.<http://www.nextgov.com/nextgov/ng_20090904_5712.php?oref=search>
     52
        Aitoro, Jill. "Managing Technology: Reaching for the Clouds." 02 MAY 2009 Web.8 Sep 2009.
     <http://www.nextgov.com/nextgov/ng_20090205_7722.php>
     53
        Foley, John. "How Government's Grabbing THE CLOUD." InformationWeek 06 Jul 2009
     54
        Marsan, Carolyn. "Forecast: Mostly Cloudy." 04 SEP 2009
     Web.<http://www.nextgov.com/nextgov/ng_20090904_5712.php?oref=search>
     55
        Jackson, Kevin. "U.S. Navy Experiments with Secure Cloud Computing." Cloud Computing Journal (2009): 1. Print.
     56
        Jackson, Kevin. "U.S. Navy Experiments with Secure Cloud Computing." Cloud Computing Journal (2009): 1. Print.



          Cloud Computing from the Security Perspective: A Primer for Federal IT Managers
17
Working with Amazon Web Services and Security First Corporation, the Dataline-led team will explore the
     ability of cloud computing technologies to support humanitarian assistance and disaster relief military
     missions. As currently planned, the test scenario will simulate the secure use of a cloud-based
     collaboration environment. Both synchronous and asynchronous collaboration technologies will be
     leveraged. Information and data access among multiple operational groups will be dynamically managed
     based on simulated ad-hoc mission requirements. Expected mission advantages of this new approach
     include:57

          • Increased IT infrastructure resiliency through the use of dynamic and automatic provisioning of
            compute and storage resources;
          • The ability to provide virtually unlimited IT infrastructure scalability through the elastic nature of an
            IaaS platform; and
          • Increased mission flexibility through a globally distributed and accessible IT infrastructure that is also
            open to use by Non-Government Organizations (NGOs), civilian first responders and non-U.S. military
            forces. The use of a government sponsored "Red Team" is also being requested as a means of
            validating the security of the proposed infrastructure.58

     U.S. Army
     During June 2009, after successful implementation of our U.S. Army pilot our combined solution was
     moved behind the Army's firewall and the pilot metrics expanded. Soldiers with traumatic brain injuries
     who are returning home will need to be monitored by doctors and case managers. The military is testing a
     new cloud system provided by AllOne Mobile that combines accessible health-care information,
     monitoring technology, and mobile communications. By accessing the system, doctors and managers can
     monitor the patient and send him or her text messages, and the soldiers can easily access their health
     records while away from home. AllOne Mobile's platform is anticipated to support the rehabilitation needs
     of up to 10,000 returning soldiers in a phased implementation over the next year.59

     State and Local Use
     Today, there are already hundreds of early adopter local governments across North America recognizing
     the benefits of moving into cloud computing applications for processes such as community development
     planning and zoning. For example: City of Sonora, CA; Borough of Beaver, PA; City of Sweet Home, OR;
     Town of Waxhaw, NC; to name a few. These local governments have adopted BasicGov web-based
     software from CloudBench Applications. 60

     The BasicGov software application is built on Force.com, the cloud computing platform from
     SalesForce.com used by more than 55,000 organizations worldwide. 61

     Within weeks, Michigan will take the first step toward building a massive data center designed to provide
     cloud computing services to state agencies, cities, counties and schools across the state. Michigan's
     Department of Information Technology will release a request for information (RFI) in September to gather
     ideas and gauge industry interest in forming a public-private partnership to build and operate the facility,
     according to state CIO Ken Theis. The state intends to break ground on the data center project in October
     2010.62

     This said, the new facility would cut the cost of running government by reducing the number of duplicate
     computer systems operated by cities, counties and state agencies. The plan envisions a public-sector
     57
        Ibid.
     58
        Ibid.
     59
        "Diversinet Reports Second Quarter 2009 Financial Results." 07 JUL 2009 Web.10 Sep 2009.
     <http://markets.hpcwire.com/taborcomm.hpcwire/?GUID=9604064&Page=MediaViewer&ChannelID=3197>
     60
        "Cloud Computing – Emergency Preparedness for Local Government." (2009)
     61
        Ibid
     62
        Towns, Steve. "Michigan Plans New Data Center and Government Cloud." Government Technology (2009): Print.



          Cloud Computing from the Security Perspective: A Primer for Federal IT Managers
18
cloud that would offer application hosting and managed services to any public entity in Michigan. In
     addition, the data center is being positioned as a magnet for technology related economic development
     and as a potential alternative to offshore application hosting and storage for private companies.63

     Utah state government is preparing a private cloud that will offer hosted e-mail and Web applications to
     cities and counties within the state, according to Steve Fletcher, state CIO and executive director of
     Utah's Department of Technology Services.64

     Conclusion
     Legacy IT absorbs a lot of an agency's available IT budget and is a primary barrier to IT responsiveness
     and overall business agility. It's the fundamental reason IT is not flexible, responsive, and efficient. Cloud
     computing is an emerging computing paradigm that is real and becoming progressively more popular.
     While there are advantages and similarly challenges to adopting the cloud computing concept, the key
     consideration provided in this white paper can be used as a starting point. Adoption of cloud computing
     symbolizes a major cultural transformation for both CIOs and CISO and the lines of business each
     support. In and effort to better support the agencies' mission, senior IT management need to think freshly
     about "make versus buy" sourcing decisions for their IT service delivery capabilities.

     The Cloud is going to happen. As we move forward in cloud computing for support to the mission, the
     federal enterprise should continue to strengthen formal processes to ensure that lessons learned from
     both industry and the government's own successful cloud computing initiatives are continually examined
     and broadly adopted across the enterprise.65




     63
        Ibid.
     64
        Ibid.
     65
        Gourley, Bob. "Cloud Computing and Cyber Defense." 21 MAR 2009



          Cloud Computing from the Security Perspective: A Primer for Federal IT Managers
19
APPENDIX A: ACRONYMS

     CAPEX          Capital Expenditure
     CIO            Chief Information Officer
     CISO           Chief Information Security Officer
     COTS           Commercial off-the-shelf
     CPU            Central Processing Unit
     DISA           Defense Information Systems Agency
     E-Discovery    Electronic Discovery
     GSA            General Services Administration
     IaaS           Infrastructure as a Service
     IT             Information Technology
     NASA           National Aeronautics and Space Administration
     NCSD           National Cyber Security Division
     NGO            Non-Government Organization
     NFS            National Science Foundation
     NTT            Nippon Telegraph and Telephone
     OMB            Office of Management and Budget
     PaaS           Platform as a Service
     RACE           Rapid Access Computing Environment
     ROI            Return on Investment
     SaaS           Software as a Service
     SAS70          Statement of Auditing Standards No. 70
     SLA            Service Level Agreements
     VA             Veterans Affairs




      Cloud Computing from the Security Perspective: A Primer for Federal IT Managers
20
APPENDIX B: Cloud Computing Checklist

     
                  Examine creating a Private (Virtual) Cloud or a Hybrid Cloud that provides the appropriate level
                  of controls while maintaining risk at an acceptable level.
                  Review what type of provider you require such as software (SaaS), infrastructure (IaaS) or
                  platform (PaaS).
                  Careful and comprehensive due diligence is required before deciding to use Public Cloud
                  Services for mission critical components of your business unless you can manage customer
                  expectations and draft an appropriate contract
                  Examine creating a Private Cloud or a Hybrid Cloud that provides the appropriate level of
                  controls while maintaining risk at an acceptable level.
                  Review what type of provider you require such as software (SaaS), infrastructure (IaaS) or
                  platform (PaaS)
                  Gain clarity on how pricing is truly performed with respect to bandwidth and CPU utilization in a
                  shared environment. Compare usage as measured by the cloud service provider with your own
                  log data, to ensure accuracy.
                  Request clear documentation on how the facility and services are assessed for risk and audited
                  for control weaknesses, the frequency of assessments and how control weaknesses are
                  mitigated in a timely manner. Ask the service provider if they make the results of risk
                  assessments available to their customers.
                  Require the definition of what the provider considers to be critical success factors, key
                  performance indicators and how they measure them relative to IT Service Management (Service
                  Support and Service Delivery).
                  Require a listing of all provider third party vendors, their third party vendors, their roles and
                  responsibilities to the provider and their interfaces to your services.
                  Request divulgence of incident response, recovery, and resiliency procedures for any and all
                  sites and associated services.
                  Request a review of all documented policies, procedures and processes associated with the site
                  and associated services assessing the level of risk associated with the service.
                  Require the provider to deliver a comprehensive list of the regulations and statutes that govern
                  the site and associated services and how compliance with these items is executed.
                  Require the provider to deliver a comprehensive list of the regulations and statutes that govern
                  the site and associated services and how compliance with these items is executed.
     Source: "Security Guidance for Critical Areas of Focus in Cloud Computing." Cloud Security Alliance.
     (2009)




         Cloud Computing from the Security Perspective: A Primer for Federal IT Managers
21

More Related Content

What's hot

The Myths And Magic Of Cloud Computing
The Myths And Magic Of Cloud ComputingThe Myths And Magic Of Cloud Computing
The Myths And Magic Of Cloud Computingjayroy
 
Cloud computing
Cloud computingCloud computing
Cloud computingsaralaanuj
 
Cloud 9: Nine Reasons to Take the Cloud Seriously_White Paper
Cloud 9: Nine Reasons to Take the Cloud Seriously_White PaperCloud 9: Nine Reasons to Take the Cloud Seriously_White Paper
Cloud 9: Nine Reasons to Take the Cloud Seriously_White PaperNewton Day Uploads
 
Business implementation of Cloud Computing
Business implementation of Cloud ComputingBusiness implementation of Cloud Computing
Business implementation of Cloud ComputingQuaid Sodawala
 
Cloud computing for enterprise
Cloud computing for enterpriseCloud computing for enterprise
Cloud computing for enterprisePravin Asar
 
Moving your Infrastructure to the Cloud
Moving your Infrastructure to the CloudMoving your Infrastructure to the Cloud
Moving your Infrastructure to the CloudRackspace
 
All Clouds are Not Created Equal: A Logical Approach to Cloud Adoption in Y...
All Clouds are Not Created Equal:  A Logical Approach to Cloud Adoption in  Y...All Clouds are Not Created Equal:  A Logical Approach to Cloud Adoption in  Y...
All Clouds are Not Created Equal: A Logical Approach to Cloud Adoption in Y...IBM India Smarter Computing
 
White paper cost savings_final
White paper cost savings_finalWhite paper cost savings_final
White paper cost savings_finalJulie Dolak
 
Cloud Expo 2010 Cloud Computing in DoD
Cloud Expo 2010 Cloud Computing in DoDCloud Expo 2010 Cloud Computing in DoD
Cloud Expo 2010 Cloud Computing in DoDGovCloud Network
 
BCBSA Summit - Cloud Computing Issues (Dec 2012)
BCBSA Summit - Cloud Computing Issues (Dec 2012)BCBSA Summit - Cloud Computing Issues (Dec 2012)
BCBSA Summit - Cloud Computing Issues (Dec 2012)JNicholson
 
Texas Cloud Brokerage - A Success Story
Texas Cloud Brokerage - A Success StoryTexas Cloud Brokerage - A Success Story
Texas Cloud Brokerage - A Success StoryIlyas Iyoob, Ph.D.
 

What's hot (17)

The Myths And Magic Of Cloud Computing
The Myths And Magic Of Cloud ComputingThe Myths And Magic Of Cloud Computing
The Myths And Magic Of Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud 9: Nine Reasons to Take the Cloud Seriously_White Paper
Cloud 9: Nine Reasons to Take the Cloud Seriously_White PaperCloud 9: Nine Reasons to Take the Cloud Seriously_White Paper
Cloud 9: Nine Reasons to Take the Cloud Seriously_White Paper
 
2010 grail research_cloud_computing
2010 grail research_cloud_computing2010 grail research_cloud_computing
2010 grail research_cloud_computing
 
Business implementation of Cloud Computing
Business implementation of Cloud ComputingBusiness implementation of Cloud Computing
Business implementation of Cloud Computing
 
Effective storagemanagementforcloudcomputing
Effective storagemanagementforcloudcomputingEffective storagemanagementforcloudcomputing
Effective storagemanagementforcloudcomputing
 
Cloud2009
Cloud2009Cloud2009
Cloud2009
 
Cloud computing for enterprise
Cloud computing for enterpriseCloud computing for enterprise
Cloud computing for enterprise
 
Cloud Technology_Concepts
Cloud Technology_ConceptsCloud Technology_Concepts
Cloud Technology_Concepts
 
Moving your Infrastructure to the Cloud
Moving your Infrastructure to the CloudMoving your Infrastructure to the Cloud
Moving your Infrastructure to the Cloud
 
All Clouds are Not Created Equal: A Logical Approach to Cloud Adoption in Y...
All Clouds are Not Created Equal:  A Logical Approach to Cloud Adoption in  Y...All Clouds are Not Created Equal:  A Logical Approach to Cloud Adoption in  Y...
All Clouds are Not Created Equal: A Logical Approach to Cloud Adoption in Y...
 
White paper cost savings_final
White paper cost savings_finalWhite paper cost savings_final
White paper cost savings_final
 
Cloud Computing & DCIM
Cloud Computing & DCIMCloud Computing & DCIM
Cloud Computing & DCIM
 
Cloud Expo 2010 Cloud Computing in DoD
Cloud Expo 2010 Cloud Computing in DoDCloud Expo 2010 Cloud Computing in DoD
Cloud Expo 2010 Cloud Computing in DoD
 
119 125
119 125119 125
119 125
 
BCBSA Summit - Cloud Computing Issues (Dec 2012)
BCBSA Summit - Cloud Computing Issues (Dec 2012)BCBSA Summit - Cloud Computing Issues (Dec 2012)
BCBSA Summit - Cloud Computing Issues (Dec 2012)
 
Texas Cloud Brokerage - A Success Story
Texas Cloud Brokerage - A Success StoryTexas Cloud Brokerage - A Success Story
Texas Cloud Brokerage - A Success Story
 

Viewers also liked (9)

Chung cư Sun Square - Nhận quà khi đặt mua
Chung cư Sun Square - Nhận quà khi đặt muaChung cư Sun Square - Nhận quà khi đặt mua
Chung cư Sun Square - Nhận quà khi đặt mua
 
Kkpi
KkpiKkpi
Kkpi
 
Kkpi
KkpiKkpi
Kkpi
 
Aku
AkuAku
Aku
 
Bu ghandoeng’s canteen
Bu ghandoeng’s canteenBu ghandoeng’s canteen
Bu ghandoeng’s canteen
 
Soal kemampuan 4 ke 5
Soal kemampuan 4 ke 5Soal kemampuan 4 ke 5
Soal kemampuan 4 ke 5
 
Meilleures pratiques d'affaires avec Power Pivot
Meilleures pratiques d'affaires avec Power PivotMeilleures pratiques d'affaires avec Power Pivot
Meilleures pratiques d'affaires avec Power Pivot
 
What Foods Help Cure Oral Mouth Thrush
What Foods Help Cure Oral Mouth ThrushWhat Foods Help Cure Oral Mouth Thrush
What Foods Help Cure Oral Mouth Thrush
 
linked list in c++
linked list in c++linked list in c++
linked list in c++
 

Similar to Cloud computing security_perspective

Federal Cloud Computing Strategy
Federal Cloud Computing StrategyFederal Cloud Computing Strategy
Federal Cloud Computing Strategyrameshgpai
 
Cloud Computing Building A Framework For Successful Transition Gtsi
Cloud Computing   Building A Framework For Successful Transition   GtsiCloud Computing   Building A Framework For Successful Transition   Gtsi
Cloud Computing Building A Framework For Successful Transition Gtsijerry0040
 
Federal cloud-computing-strategy
Federal cloud-computing-strategyFederal cloud-computing-strategy
Federal cloud-computing-strategyDaniel Checchia
 
Cloud Computing for Banking - Accenture
Cloud Computing for Banking - AccentureCloud Computing for Banking - Accenture
Cloud Computing for Banking - AccentureKim Jensen
 
First step to the cloud white paper
First step to the cloud white paperFirst step to the cloud white paper
First step to the cloud white paperNewton Day Uploads
 
"SEEDING CLOUDS ON POWER SYSTEMS WITH IBM SMARTCLOUD™ ENTRY"
"SEEDING CLOUDS ON POWER SYSTEMS WITH IBM SMARTCLOUD™ ENTRY""SEEDING CLOUDS ON POWER SYSTEMS WITH IBM SMARTCLOUD™ ENTRY"
"SEEDING CLOUDS ON POWER SYSTEMS WITH IBM SMARTCLOUD™ ENTRY"IBM India Smarter Computing
 
Cegos learning in the cloud white paper 22.8.11
Cegos learning in the cloud white paper   22.8.11Cegos learning in the cloud white paper   22.8.11
Cegos learning in the cloud white paper 22.8.11Cegos Asia Pacific Pte Ltd
 
Dispelling The Vapor Around Cloud Computing –Network Management
Dispelling The Vapor Around Cloud Computing –Network ManagementDispelling The Vapor Around Cloud Computing –Network Management
Dispelling The Vapor Around Cloud Computing –Network ManagementIBM India Smarter Computing
 
Dispelling the vapor around cloud computing - Drivers, barriers and considera...
Dispelling the vapor around cloud computing - Drivers, barriers and considera...Dispelling the vapor around cloud computing - Drivers, barriers and considera...
Dispelling the vapor around cloud computing - Drivers, barriers and considera...IBM India Smarter Computing
 
IIR Congres ICT & Recht - Cloud Computing - Peter de Haas - Microsoft - 20-04...
IIR Congres ICT & Recht - Cloud Computing - Peter de Haas - Microsoft - 20-04...IIR Congres ICT & Recht - Cloud Computing - Peter de Haas - Microsoft - 20-04...
IIR Congres ICT & Recht - Cloud Computing - Peter de Haas - Microsoft - 20-04...Peter de Haas
 
IBM Point of view -- Security and Cloud Computing (Tivoli)
IBM Point of view -- Security and Cloud Computing (Tivoli)IBM Point of view -- Security and Cloud Computing (Tivoli)
IBM Point of view -- Security and Cloud Computing (Tivoli)IBM India Smarter Computing
 
Cloud deep-dive0212
Cloud deep-dive0212Cloud deep-dive0212
Cloud deep-dive0212Accenture
 

Similar to Cloud computing security_perspective (20)

Federal Cloud Computing Strategy
Federal Cloud Computing StrategyFederal Cloud Computing Strategy
Federal Cloud Computing Strategy
 
Cloud Computing Building A Framework For Successful Transition Gtsi
Cloud Computing   Building A Framework For Successful Transition   GtsiCloud Computing   Building A Framework For Successful Transition   Gtsi
Cloud Computing Building A Framework For Successful Transition Gtsi
 
Intel Cloud
Intel CloudIntel Cloud
Intel Cloud
 
Federal cloud-computing-strategy
Federal cloud-computing-strategyFederal cloud-computing-strategy
Federal cloud-computing-strategy
 
Cloud Computing for Banking - Accenture
Cloud Computing for Banking - AccentureCloud Computing for Banking - Accenture
Cloud Computing for Banking - Accenture
 
First step to the cloud white paper
First step to the cloud white paperFirst step to the cloud white paper
First step to the cloud white paper
 
"SEEDING CLOUDS ON POWER SYSTEMS WITH IBM SMARTCLOUD™ ENTRY"
"SEEDING CLOUDS ON POWER SYSTEMS WITH IBM SMARTCLOUD™ ENTRY""SEEDING CLOUDS ON POWER SYSTEMS WITH IBM SMARTCLOUD™ ENTRY"
"SEEDING CLOUDS ON POWER SYSTEMS WITH IBM SMARTCLOUD™ ENTRY"
 
Cegos learning in the cloud white paper 22.8.11
Cegos learning in the cloud white paper   22.8.11Cegos learning in the cloud white paper   22.8.11
Cegos learning in the cloud white paper 22.8.11
 
understanding and Leveraging Cloud Xcomputing
understanding and Leveraging Cloud Xcomputingunderstanding and Leveraging Cloud Xcomputing
understanding and Leveraging Cloud Xcomputing
 
Dispelling The Vapor Around Cloud Computing –Network Management
Dispelling The Vapor Around Cloud Computing –Network ManagementDispelling The Vapor Around Cloud Computing –Network Management
Dispelling The Vapor Around Cloud Computing –Network Management
 
Dispelling the Vapour around Cloud
Dispelling the Vapour around Cloud Dispelling the Vapour around Cloud
Dispelling the Vapour around Cloud
 
Dispelling the vapor around cloud computing - Drivers, barriers and considera...
Dispelling the vapor around cloud computing - Drivers, barriers and considera...Dispelling the vapor around cloud computing - Drivers, barriers and considera...
Dispelling the vapor around cloud computing - Drivers, barriers and considera...
 
Dispelling The Vapor Around Cloud Computing
Dispelling The Vapor Around Cloud ComputingDispelling The Vapor Around Cloud Computing
Dispelling The Vapor Around Cloud Computing
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 
IIR Congres ICT & Recht - Cloud Computing - Peter de Haas - Microsoft - 20-04...
IIR Congres ICT & Recht - Cloud Computing - Peter de Haas - Microsoft - 20-04...IIR Congres ICT & Recht - Cloud Computing - Peter de Haas - Microsoft - 20-04...
IIR Congres ICT & Recht - Cloud Computing - Peter de Haas - Microsoft - 20-04...
 
Ccsw
CcswCcsw
Ccsw
 
IBM Point of view -- Security and Cloud Computing (Tivoli)
IBM Point of view -- Security and Cloud Computing (Tivoli)IBM Point of view -- Security and Cloud Computing (Tivoli)
IBM Point of view -- Security and Cloud Computing (Tivoli)
 
IBM Point of View: Security and Cloud Computing
IBM Point of View: Security and Cloud ComputingIBM Point of View: Security and Cloud Computing
IBM Point of View: Security and Cloud Computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud deep-dive0212
Cloud deep-dive0212Cloud deep-dive0212
Cloud deep-dive0212
 

Recently uploaded

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Recently uploaded (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

Cloud computing security_perspective

  • 1. Department of Homeland Security National Cyber Security Division Cloud Computing from the Security Perspective: A Primer for Federal IT Managers
  • 2. Department of Homeland Security, National Cyber Security Division Cloud Computing White Paper nsert client name title Table of Contents Executive Summary.................................................................................................................................................................... 1 1. Introduction.............................................................................................................................................................................. 3 Purpose 3 Cloud Computing: An Old Idea Whose Time Has (Finally) Come.......................................................................................... 3 What is Cloud Computing?..................................................................................................................................................... 3 2. Federal Business Drivers........................................................................................................................................................ 5 A Mandate from the Top (and the Bottom Line)..................................................................................................................... 5 Federal Chief Information, Performance, and Technology Officers........................................................................................ 5 Potential for Cost Control........................................................................................................................................................ 5 Cloud Computing Provides Convenience and Capability....................................................................................................... 6 3. Perspectives on Moving to the Cloud................................................................................................................................... 7 What are my sourcing options?.............................................................................................................................................. 7 Is There Interest In Cloud Computing From Foreign Governments?...................................................................................... 8 3. Key Federal Security Challenges......................................................................................................................................... 10 4. Benefits and Drawbacks....................................................................................................................................................... 14 Anticipated Benefits ............................................................................................................................................................. 14 Anticipated Drawbacks......................................................................................................................................................... 14 5. Federal, Defense, State and Other Cloud Initiatives........................................................................................................... 16 Apps.gov............................................................................................................................................................................... 16 National Aeronautics and Space Administration .................................................................................................................. 16 Department of Veteran Affairs.............................................................................................................................................. 16 Defense Information Systems Agency.................................................................................................................................. 17 U.S. Navy.............................................................................................................................................................................. 17 U.S. Army.............................................................................................................................................................................. 18 State and Local Use ............................................................................................................................................................ 18 Conclusion............................................................................................................................................................................ 19 APPENDIX A: ACRONYMS....................................................................................................................................................... 20 APPENDIX B: Cloud Computing Checklist............................................................................................................................ 21 Cloud Computing from the Security Perspective: A Primer for Federal IT Managers i
  • 3. Executive Summary The potential of cloud computing is particularly important now, when most federal agencies are looking to update aging legacy systems. This white paper seeks to clarify the variations of cloud services and examine the current and near-term potential for federal cloud computing from the cyber security perspective. Cloud computing offers attractive opportunities to cut costs; accelerate centers and operations, and ultimately adopting development; replace expensive, quickly outmoded ““The Federal Government will transform its virtualizing data centers, consolidating data infrastructure, and increase agency flexibility for both infrastructure Information Technology Infrastructure by and application The idea of cloud computing brings up a host of - IT Manager, Department of Defense - FY2010 Federal Budget, Analytical issues for Chief Information Officers (CIO) and Chief Information Perspective, Cross Cutting Programs a cloud-computing business model.” Security Officers (CISO) as they consider moving their mission- “Is the cloud just the latest hype?” critical applications and information onto remote servers controlled by third parties. Beyond the cost savings and productivity benefits of cloud computing is the attraction of a convenient, on-demand model for network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.1 Cloud computing means different things to different people. The National Institute of Standards and Technology has published no less than fifteen iterations of its “Working Definition of Cloud Computing” In general terms, the key to understanding cloud computing, especially as security in the cloud is becoming a major issue, is to recognize that the technology is largely not new, or untested. Cloud computing is the next step for information technology (IT) services to take as more established parts of IT are commoditized. When moving to the cloud, agencies need to understand how it differs from their existing environments. The cloud is a shared and largely virtual environment. Data owners need to understand the implications of their data residing in the cloud service provider’s data center and under its protection. It’s critical that an agency understands the controls its cloud provider has in place. In the cloud, federal managers need to recognize that while they still retain accountability for their data, the responsibility for its protection has passed to the vendor. In an era when the Internet is ubiquitous and international corporations have consolidated IT service centers and sited them globally, governments are challenged to both use the lessons learned from global corporations and explore the potential found by other governments, especially those in the developed world. Further, many nations have the potential (though often not the cultural ability), because they are smaller than our own government and may have less stringent governance, to move quickly to adopt new technology. In Europe, where privacy laws are more circumspect than in the US, cloud computing has lagged as an attractive solution. The appointment of the Federal Chief Information, Performance, and Technology officers, fundamental re-examination of investments in technology infrastructure, and “work-at-a-distance” act as federal business drivers. The Obama administration’s key White House technology experts, new agency leadership, and members of Congress, are all pushing for more transparency, accountability improving innovation, efficiency and effectiveness in federal IT. Overall, these new advisors are heavily involved in driving technology modernization across government. While agency portfolios are already established for the next budget cycles, these new advisors will encourage the Office of Management and Budget (OMB) 1 "Crosscutting Programs." <http://www.whitehouse.gov/omb/budget/fy2010/assets/crosscutting.pdf> Cloud Computing from the Security Perspective: A Primer for Federal IT Managers 1
  • 4. to ask compelling questions regarding alternative investments and return on investment (ROI) in OMB 300 reviews. In addition to the U.S. government, foreign governments have also shown an interest in cloud computing. The government of Singapore has been both more forward and more aggressive in embracing the cloud as part of a prominent research consortium and consistent with its advanced e-government initiatives. The Open Cirrus™ project aims to address this problem by providing systems researchers with a testbed of distributed data centers they can use for systems-level (as well as applications and services) cloud computing research.2 As these and other initiatives move forward internationally, the US can benefit from lessons learned from both successes and failures. Implementing a cloud-computing platform entails different risks than dedicated agency data centers. Risks associated with the implementation of a new technology service delivery model include policy changes, implementation of dynamic applications, and securing the dynamic environment. The mitigation plan for these risks depends on establishing a proactive security program to implement industry best practices and government policies in the management of any cloud program.3 As cloud computing continues to evolve the terms and benefits it will deliver, agencies like the Defense Information Systems Agency (DISA) are working closely with technology leaders in many areas to define standards and set the stage for private clouds. From a federal perspective, other agencies like National Aeronautics and Space Administration (NASA) and Department of Veterans Affairs are making advances with their own initiatives. Within the Department of Defense, both the Army and Navy have had successful implementations of pilot programs. Cloud computing is an evolving computing paradigm that is real and becoming progressively more popular. While there are advantages and similarly challenges to adopting the cloud computing concept, the key consideration provided in this white paper can be used as a starting point. Adoption of cloud computing symbolizes a major cultural transformation for both CIOs and CISO and the lines of business each support. In and effort to better support the agencies' mission, senior IT management need to think freshly about "make vs. buy" sourcing decisions for their IT service delivery capabilities. The cloud is going to happen. As we move forward in cloud computing for support to the mission, the federal enterprise should continue to strengthen formal processes to ensure that lessons learned from both industry and the government's own successful cloud computing initiatives are continually examined and broadly adopted across the enterprise.4 2 Ibid 3 "Crosscutting Programs." <http://www.whitehouse.gov/omb/budget/fy2010/assets/crosscutting.pdf> 4 Gourley, Bob. "Cloud Computing and Cyber Defense." 21 MAR 2009 Cloud Computing from the Security Perspective: A Primer for Federal IT Managers 2
  • 5. 1. Introduction Purpose In IT marketing and popular management literature, the message is that cloud computing is going to modernize IT. Whether that is true is not yet clear; in fact, what cloud computing is takes a variety of permutations. This white paper seeks to clarify the variations of cloud services and examine the current and near-term potential for Federal cloud computing from the cyber security perspective. The potential of cloud computing is particularly important now, when most federal agencies are looking to update aging legacy systems. It offers seductive opportunities to cut costs; accelerate development; replace expensive, quickly outmoded infrastructure and increase agency flexibility for both infrastructure and applications. Furthermore, IT and telecommunications infrastructure is an area where government organizations use a variety of sourcing models. While many agencies still prefer to run their own infrastructure, over the past several years there has been a trend toward sharing or centralizing infrastructure.5 Cloud Computing: An Old Idea Whose Time Has (Finally) Come For many IT managers, it seems that cloud computing is simply a new term for a long-held dream of computing as a utility6, which has recently emerged as a commercial reality. The key to understanding cloud computing, especially as security in the cloud is becoming a major issue, is to recognize that the technology is largely not new, or untested. Cloud computing is the next step for IT services to take as more established parts of IT are commoditized. Cloud computing represents the logical progression to outsourcing of commodity IT services in a manner similar to that which the government has been doing for years. What is Cloud Computing? Cloud computing means different things to different people. NIST has published no less than fifteen iterations of its “Working Definition of Cloud Computing” In general terms, cloud computing is a convenient, on-demand model for network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. The cloud element of cloud-computing derives from a metaphor used for the Internet, from the way it is often depicted in computer network diagrams. Conceptually it refers to a model of scalable, real-time, internet-based information technology services and resources, satisfying the computing needs of users, without the users incurring the costs of maintaining the underlying infrastructure. Examples in the private sector involve providing common business applications online, which are accessed from a web browser, with software and data stored on the “cloud” provider’s servers.7 Essential Characteristics Delivery Models Deployment Models • On-demand self-service • Software as a Service (SaaS) • Private Cloud • Broad network access • Platform as a Service (PaaS) • Community Cloud • Resource pooling • Infrastructure as a Service (IaaS) • Public Cloud • Rapid Elasticity • Hybrid Cloud8 • Measured Service 5 Maio, Andrea. "Government in the Cloud: Much More Than Computing 6 PARKHILL, D. The Challenge of the Computer Utility. Addison-Wesley Educational Publishers Inc., US, 1966 7 Crosscutting Programs 8 Draft NIST Working Definition of Cloud Computing v1.5 dtd 8/21/09 Cloud Computing from the Security Perspective: A Primer for Federal IT Managers 3
  • 6. Cloud Computing from the Security Perspective: A Primer for Federal IT Managers 4
  • 7. 2. Federal Business Drivers A Mandate from the Top (and the Bottom Line) For most federal CIO’s, relief from the persistent and increasing costs of infrastructure operation and maintenance is an attractive option, though few would consider it at the expense of the control mandated under Clinger-Cohen. Further, many are considering or currently in the process of updating applications, mostly in the direction of Commercial-off-the- Shelf Software (COTS) replacements for legacy systems and moving to a medium operations demand that technologies spread “The days of dedicated servers have passed which might simplify application updates and distribute their cost across a broader base would be welcome. These intrinsic pressures are reinforced due to expense and inefficiency. Future by political drivers. The Obama administration’s key White House technology –IT Manager, Federal Civilian Agency experts, new agency leadership, and members of Congress, are all pushing for more transparency, accountability improving innovation, efficiency and effectiveness in Federal IT. The 2009 Cloud Consensus Report p.3 Federal Chief Information, Performance, and Technology Officers and stretch to do more.” From March 2009, when President Obama named Vivek Kundra the Federal CIO, Kundra urged agencies to aggressively investigate cloud computing and sponsored a GSA Cloud initiative In addition to Kundra, Jeffrey Zients, the new Chief Performance Officer, and Aneesh Chopra, the Chief Technology Officer are committed to technological innovation to help the country meet its goals from job creation, to reducing health care costs, to protecting the homeland. Overall, these new advisors are intended to drive technology modernization across government, exerting pressure from the top to do so. While agency portfolios are already established for the next budget cycles, these new advisors will encourage OMB to ask compelling questions regarding alternative investments and ROI in OMB 300 reviews. Potential for Cost Control Actual or feared budget constraints are pushing government IT leaders to explore new, potentially less expensive avenues to support some of the operational needs of their organizations.9 A June 2009 survey of 605 government IT managers found cost pressures as the top four perceived benefits of cloud computing: • 57% anticipated reduced hardware requirements • 45% saw the potential for reduced costs in a pay-as-you go model • 35% saw other resource savings in reduced staff requirements and the ability to focus staff on more critical tasks and • 33% cited flexibility to access a variety of services. 10 Not surprisingly in today's economic climate, the desire to save money is part of many discussions. However, cloud computing does not always save money — in fact it can drive costs up if it is used simply 9 Maio, Andrea. "Government in the Cloud: Much More Than Computing 10 The 2009 Cloud Consensus Report (Meritalk/Merlin, Washington), p.11. Cloud Computing from the Security Perspective: A Primer for Federal IT Managers 5
  • 8. to replace on-premises work with an exact duplicate of that work in the cloud. Knowing when to redesign or when to avoid using cost savings as a justification for cloud computing is critical.11 The fifth most anticipated benefits from the survey also spoke to cost—the indirect cost savings of productivity enhancements—noting the potential for group collaboration (24%). The final most prominent perceived benefit cited (22%) was in Continuity of Operations Planning (COOP), the most significant measure of overall system resilience. That is consistent with the FY10 budget priorities. Enhancing cyber security and technology research and development by supporting partnerships with government, industry, and academia is a budget highlight with $355 million targeted to make private and public sector cyber infrastructure more resilient and secure. Cloud Computing Provides Convenience and Capability Beyond the cost savings and productivity benefits of cloud computing is the attraction of a convenient, on- demand model for network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Examples from the private sector involve providing common business applications online, accessed from a web browser, with software and data stored on the “cloud” provider’s servers.12 Capability is about the ability to do things that otherwise couldn't be done, A great appeal of the cloud is the potential to create new solutions that were not technically or economically feasible without the use of cloud services. A key example is new application development. One of the main characteristics of cloud computing that enables these capabilities is elasticity.13 Additional potential for cloud use is to enable federal employees to work in real time from remote locations, reducing travel costs and energy consumption, and improving the Government’s emergency preparedness capabilities. Cloud-computing and “work-at-a-distance” represent major new Government- wide initiatives, supported by the CIO Council under the auspices of the Federal CIO and funded through the General Services Administration (GSA) as the service-provider.14 11 David Smith, Daryl Plummer, David Cearley, "The What, Why and When of Cloud Computing." Gartner (2009) 12 "Crosscutting Programs." <http://www.whitehouse.gov/omb/budget/fy2010/assets/crosscutting.pdf> 13 David Smith, Daryl Plummer, David Cearley, "The What, Why and When of Cloud Computing." Gartner (2009) 14 "Crosscutting Programs." <http://www.whitehouse.gov/omb/budget/fy2010/assets/crosscutting.pdf> Cloud Computing from the Security Perspective: A Primer for Federal IT Managers 6
  • 9. 3. Perspectives on Moving to the Cloud Who are the Major Service Providers? When moving to the cloud, agencies need to understand how it differs from their existing environments. The cloud is a shared and largely virtual environment, Data owners need to understand the implications of their data residing in the cloud service provider’s data center and under its protection. It’s critical that an agency understands the controls its cloud provider has in place. In the cloud, federal managers need to recognize that while they still retain accountability for their data, the responsibility for its protection has passed to the vendor. Understanding how the service provider has historically gone to market within the federal environment may be an indication of who to select when the agency is ready to decide on a vendor. Large -scale cloud providers are expected to be more secure than smaller or less established companies out there offering cloud services, because they have the experienced personnel, resources, and infrastructure that smaller organizations might lack. The list of cloud computing solutions and service providers continues to grow daily. The sample below is illustrative and does not imply any federal endorsement. Software as a Service (Saas) Platform as a Service • Google Apps • Oracle On Demand • Amazon E2C • Coghead • Zoho Office Apps • Salesforce.com • Etelos • Workday • NetSuite ERP Force.com • LongJump • Microsoft Office Live • Salesforce.com SFA • Google App Engine • Boomi • Microsoft Azure External IaaS Internal IaaS • HP/EDS (TBD) • Joyent • HP Adaptive Infrastructure as a Service • IBM Blue Cloud • Rackspace • Sun Grid • Jamcracker Utility Systems Management Tools+ Utility Application Development • VMWare • Xen • Data Synapse • IBM WebSphere XD • IBM Tivoli • Zuora • Univa UD • BEA Weblogic • Cassatt • Aria Systems • Elastra Cloud Server Server VE • Parallels • eVapt • 3tera App Logic • Mule What are my sourcing options? Among internal sourcing approaches, the most relevant from a government perspective are: • Own - where the government organization that uses the resource also owns or directly controls it. The resource may be totally in-sourced or totally outsourced, but the government organization is its exclusive user. • Share - where several government organizations share the resource, through joint governance arrangements and with one organization being responsible for either owning the resources or sourcing them as deemed fit. • Centralize - similar to the above, but without the joint governance component. That is, government organizations are simply clients of whoever provides access to the resource. Cloud Computing from the Security Perspective: A Primer for Federal IT Managers 7
  • 10. • Commoditizing - where the resource or the way to access it or both is completely commoditized, and it is managed outside the government boundaries without any control of where it is located.15 Is There Interest In Cloud Computing From Foreign Governments? In and era when the internet is ubiquitous and international corporations have consolidated IT service centers and sited them globally, governments are challenged to both use the lessons learned from global corporations and explore the potential found by other governments, especially those in the developed world. Further, many nations have the potential (though often not the cultural ability), because they are smaller than our own government and may have less stringent governance, to move quickly to adopt new technology. In Europe, where privacy laws are more circumspect than in the US, cloud computing has lagged as an attractive solution. Based upon the Nippon Telegraph and Telephone Europe (NTT) “Cloud or Fog?” survey, CIOs in the United Kingdom generally aren't embracing cloud computing The survey found that CIOs are adopting online software and service delivery with secure hosted environments, but they're hesitating to adopt the cloud computing concept, putting cloud computing at the bottom of their list for investment priority. The UK government, however, is sanguine about a private cloud: In the government's Digital Britain report published yesterday [June 2009], [Lord] Carter said the so-called "G-Cloud" should be created within the next three years, to allow local and central government departments to share centrally hosted applications. The CIO Council and UK IT trade association Intellect are currently developing a business case for funding the G-Cloud. "Provided that this business case can be properly developed, the adoption of the G-Cloud will be a priority for government investment to secure efficiencies," Lord Carter said in the report.16 In Asia, governments are seeing cloud computing as part of an industrial strategy and eager to develop capabilities. In Japan, the phenomenon is recent: Masayuki Hyugaji, spokesman for the Ministry of Internal Affairs and Communications of Japan [says they] ha[ve] embarked in a series of new research and development activities including launching a Global Inter- Cloud Technology Forum, [whose] primary focus … is on Cloud Federation and currently includes several large Japanese companies. The aim of the forum is to promote standardization of network protocols and the interfaces through which cloud systems "interwork" with each other, and to enable the provisioning of more reliable cloud services. Main activities and goals - Promote the development and standardization of technologies to build or use cloud systems; - Propose standard interfaces that allow cloud systems to interwork with each other; - Collect and disseminate proposals and requests regarding organization of technical exchange meetings and training courses; - Establish liaison with counterparts in the U.S. and Europe, and promote exchange with relevant R&D teams. The government of Singapore has been both more forward and more aggressive in embracing the cloud as part of a prominent research consortium and consistent with its advanced e-government initiatives. They have capitalized on the growing interest in cloud computing within the systems and applications research communities. Since systems researchers often find it difficult to do credible work without access to large-scale distributed data centers and application researchers can also benefit from being able to control the deployment and consumption of hosted services across a distributed cloud computing testbed, this project, Open Cirrus, envisions enabling system researchers, who are developing the techniques and software infrastructure to support cloud computing, to obtain low-level access to large scale cluster resources. 17 15 Maio, Andrea. "Government in the Cloud: Much More Than Computing 16 http://www.silicon.com/publicsector/0,3800010403,39442843,00.htm Roy Campbell, Indranil Gupta, Michael Heath, Steven Y. Ko, Michael Kozuch, Marcel Kunze, Thomas 17 Kwan, Kevin Lai, Hing Yan Lee, Martha Lyons, Dejan Milojicic, David O’Hallaron, and Yeng Chai Soh. Open Cirrus™ Cloud Computing Testbed: Federated Data Centers for Open Source Systems and Cloud Computing from the Security Perspective: A Primer for Federal IT Managers 8
  • 11. The Open Cirrus™ project aims to address this problem by providing systems researchers with a testbed of distributed datacenters they can use for systems-level (as well as applications and services) cloud computing research. (Open Cirrus™ is a trademark of Yahoo!, Inc.). The project is a joint initiative sponsored by HP, Intel, and Yahoo!, in collaboration with the National Science Foundation (NSF), the University of Illinois (UIUC), Karlsruhe Institute of Technology, and the Infocomm Development Authority of Singapore. Open Cirrus site members is expected to increase in 2009. The Open Cirrus testbed is a collection of federated data centers for open-source systems and services research. The initial testbed is composed of six sites in North America, Europe, and Asia. Each site consists of a cluster with at least 1000 cores and associated storage. The objectives of the Open Cirrus™ are to: • Foster systems research around cloud computing • Vendor-neutral open-source stacks and APIs for the cloud • Expose research community to enterprise level requirements • Provide realistic traces of cloud workloads As these and other initiatives move forward internationally, the US can benefit from tracking lessons learned from both successes and failures. Services Research 200 Cloud Computing from the Security Perspective: A Primer for Federal IT Managers 9
  • 12. 3. Key Federal Security Challenges Implementing a cloud-computing solution incurs different risks than with dedicated agency data centers. Risks associated with the implementation of a new technology service delivery model include policy lags, implementation of dynamic applications, and securing the dynamic environment. The mitigation plan for these risks depends on establishing robust security program to implement industry best practices and government policies in the management of any program. In addition, the federal community will need to actively put in place new security measures which will permit secure use of dynamic applications and information-sharing to be implemented in a secure fashion.18 Specific security challenges include: Privacy: Regulations on the treatment of personal information vary across the globe and a growing number of countries place restrictions on whether it can be stored outside of the country. It is difficult or impossible for a cloud service to provide a single level of service that is acceptable in every jurisdiction. Providers are becoming more willing to accommodate privacy regulations through contractual commitments to store data within specific countries, although this is difficult to verify.19 “Agencies must implement an assessment strategy when utilizing cloud computing services. When turning to cloud computing, the function of IT security will morph into more of a compliance and risk management role, rather than security operations”, said Chenxi Wang, principal analyst at Forrester Research. In an age when the consequences and potential costs of mistakes are rising fast for companies that handle confidential and private customer data, IT security professionals must develop better ways of evaluating the security and privacy practices of the cloud services. An effective assessment strategy must cover data protection, compliance, privacy, identity management, secure operations, and other related security and legal issues. 20 Jurisdiction: National and state regulatory implications extend beyond privacy considerations. Requirements vary on issues including appropriate practices, investigative support and breach disclosure. Do not expect that contractual commitments will be followed and enforced to the same degree in every country.21 Investigation and E-Discovery: Internal investigations of inappropriate or illegal activity and electronic discovery are difficult and expensive propositions, even when conducted within your infrastructure. If you are considering purchasing a service that would process anything considered a business record, or if you otherwise anticipate a need to conduct investigations, then you cannot assume that a service provider will be willing, or even able, to support them. The virtualization inherent in cloud services makes it especially difficult to conduct forensic investigations, because logs and data for multiple customers may be co-located, may also be spread across an ever-changing set of hosts and data centers, and may not persistent on a particular device. If you cannot get a contractual commitment to support specific forms of investigation, along with evidence that the vendor has already successfully supported such activities, then the only safe assumption is that investigation and discovery requests will be impossible. Be aware that investigative cost may be extremely high, especially if your organization is obligated to meet government or court schedules.22 Federal agencies potentially subject to e-discovery in support of litigation must keep this in mind. 18 "Crosscutting Programs." <http://www.whitehouse.gov/omb/budget/fy2010/assets/crosscutting.pdf> 19 Jay, Heiser. "What You Need to Know About Cloud Computing Security and Compliance." Gartner (2009) 20 Moscaritolo, Angela. "Cloud computing providers require strong audits." SCMagazine (2009): 2. Print. 21 Jay, Heiser. "What You Need to Know About Cloud Computing Security and Compliance." Gartner (2009) 22 Jay, Heiser. "What You Need to Know About Cloud Computing Security and Compliance." Gartner (2009) Cloud Computing from the Security Perspective: A Primer for Federal IT Managers 10
  • 13. Data Retention: If business records must be archived for legal purposes, then any associated cloud-based activity must also offer a form of archiving that is verifiably robust in the storage and retrieval of data. High-end e-mail products often support such requirements, but most other cloud offerings do not.23 Customers must also determine whether the cloud vendor is capable of meeting the client agency’s National Archives and Records Administration requirements. Process Verification: Regulations such as Sarbanes-Oxley in the U.S., which emphasize process oversight, are usually being addressed through the Statement of Auditing Standards No. 70 (SAS70) auditing standard. This is an expensive form of third-party verification that is often misunderstood as being a security certification, but it is only a review of process, and does not consider technical issues.24 In addition, Standard SAS70 audits may not be practical in a cloud environment. Multi-tenancy: Multi-tenancy resulting from shared use of a device can expose all tenants to a greater level of external risk due to the business practices of any tenant. As long as the cloud provider builds its security to meet the higher-risk client, then all of the lower risk clients get better security than they would have normally. Security Assessment: The cloud environment is very dynamic. New capacity is continually added and networks are optimized to provide efficient service. As a result, cloud providers must conduct continuous security assessments to ensure that changes in configurations and infrastructure do not introduce vulnerabilities,. The assessments should be done in a prescribed manner following written policies. The vendor should be required by contract to notify the customer immediately upon discovery of a security issue affecting the client’s data or service.25 Additional periodic assessments should be performed by a mutual agreed upon independent third party. Share Risk: In many instances, your cloud service provider will not be the cloud operator. But it may be providing a value-added service on top of another cloud provider’s service. For example, if a SaaS provider needs infrastructure, it may make more sense to acquire that infrastructure from an IaaS provider rather than building it. These cloud service provider tiers that get built by layering SaaS on top of IaaS, for example, can affect your security. In this type of multi-tier service provider arrangement, each party shares the risk of security issues because the risk potentially impacts all parties at all layers. The identification of all parties involved in providing a cloud solution is a critical factor in a total risk mitigation plan.26 Staff Security Screening: Most organizations employ contractors as part of their workforce. Cloud providers are no exception. As with regular employees, the contractors should go through a full background investigation comparable to your own employees. Your cloud provider must be able to provide you with its policy on background checks and document that all of its employees have had a background check performed, according to the policy. Further, you should contractually bind the cloud provider to require the same level of due diligence with its contractors. 27 Distributed Data Centers: Disasters are a fact of life. They include hurricanes, tornadoes, landslides, earthquakes, and even fiber cable cuts. In theory, a cloud computing environment should be less prone to disasters because providers can provide an environment that is geographically distributed. However, some providers may not have sufficient geographical distribution to provide sufficient resilience for its operations. Customers should 23 Ibid. 24 Ibid. 25 Almond, Carl. "A Practical Guide to Cloud Computing Security." Perspective (2009): 9. Print. 26 Ibid.. 27 Almond, Carl. "A Practical Guide to Cloud Computing Security." Perspective (2009): 9. Print. Cloud Computing from the Security Perspective: A Primer for Federal IT Managers 11
  • 14. require their provider to have a working and regularly tested disaster recovery plan, which includes Service Level Agreements (SLAs). For those organizations that do contract for geographically diverse cloud services, they should test their cloud provider’s ability to respond to a disaster on a regular basis.28 Physical Security: Physical external threats should be analyzed carefully when choosing a cloud security provider. Do all of the cloud provider’s facilities have the same levels of security? Are you being sold on the most secure facility with no guarantee that your data will actually reside there? Do the facilities have, at a minimum, a man trap, card or biometric access, surveillance, an onsite guard, a requirement that all guests be escorted and all non-guarded egress points be equipped with automatic alarms?29 Do the facilities meet the standards and security requirements of your department, agency, or organization? Coding: Cloud providers in-house software may contain application bugs. Customer should review the cloud provider’s secure coding practices. Also, all code should be written using a standard methodology that is documented and can be demonstrated to the customer.30 Data Leakage: Data leakage has become one of the greatest organizational risks from a security standpoint. Virtually every government worldwide has regulations that mandate protections for certain data types. The cloud provider should have the ability to map its policy to the security mandate you must comply with and discuss the issues. At a minimum, the data that falls under legislative mandates, or contractual obligation, should be encrypted while in transit and at rest. Further, a yearly risk assessment just on the data in question should be done to make sure the mitigations meet the need. The cloud provider also must include data leakages in its security incident response and notification policy.31 Coming Regulations: Looking forward, new regulations and case law that will affect how records are kept and managed are on the horizon in the United States and abroad. The current U.S. administration has mandated transparency and accountability. These tenets will be the cornerstones of new regulations that will soon be in force. Transparency and accountability will drive future records management directives much like the Sarbanes- Oxley Act of 2002 did before them. It is critical that any solution, inside the organization or outside, be prepared for this new mandate as it relates to records and information. This means, while organizations must maintain easy access to information, having appropriate management controls will be even more important tomorrow than it is today. Where information is maintained, how it is managed, and how the information is used to support an organization will drive the development of new compliance strategies and tools. "How is this done in the cloud?" is a question that organizations must answer specific to its records requirements.32 Cloud Applications: Accessing cloud technologies requires a thin-client, and the world’s most commonly used thin-client for this purpose is a web browser. This means the vast majority of all applications on the Internet have some kind of web or application server on which the business logic is implemented. Currently, most of the money spent on security goes into firewalls and antivirus solutions, but in the last 10 years the typical target for attacks has shifted from the network layer to the application layer because the operating systems and services available to the general public were cut down. As a result, it is now easier to target the application logic or framework of an application than the actual server behind the hardened network perimeter. Applications are mostly developed by the businesses themselves and developer s do not have 28 Ibid. 29 Ibid. 30 Ibid. 31 Ibid. 32 Gatewood, Brent. "Clouds On The Information Horizon: How To Avoid The Storm." Information Management Journal. (2009) Cloud Computing from the Security Perspective: A Primer for Federal IT Managers 12
  • 15. a common, standard set of secure development policies.33 This creates a target rich environment of vulnerabilities to be exploited.34 These problems include: • Injection Flaws • Malicious File Execution • Cross Site Scripting (XSS) • Insecure Communications • Failure to Restrict URL Access • Insecure Cryptographic Storage • Insecure Direct Object Reference • Cross Site Request Forgery (CSRF) • Information Leakage and Improper Error Handling • Broken Authentication and Session Management Capable IT Staffing Challenges: Based upon a report from the Partnership for Public Service, entitled Cyber In-Security, the overriding finding of their analysis is that the federal government will be unable to combat these threats [cyber security] without a more coordinated, sustained effort to increase cyber security expertise in the federal workforce. Defense Secretary Robert Gates has stated that the Pentagon is “desperately short of people who have capabilities (defensive and offensive cyber security war skills) in all the services and we have to address it.” 35 33 "Defining a dWAF to Secure Cloud Applications." (2009): 2. Print. 34 Ibid. 35 Booz|Allen|Hamilton, "Cyber In-Security: Strengthening the Federal Cybersecurity Workforce." (2009): 3. Print. Cloud Computing from the Security Perspective: A Primer for Federal IT Managers 13
  • 16. 4. Benefits and Drawbacks Anticipated Benefits Through cloud computing, agencies can: Easily expand scalability and enhance elasticity – Using a cloud computing model, IT staff can meet changing user loads quickly without having to engineer for peak loads. Elasticity is a benefit when enterprises are growing, providing the ability to purchase infrastructure on the margin at predictable costs. Equally as important, the elastic nature of cloud computing provides a way to cost-effectively and quickly scale down a service when it is no longer needed.36 Users can increase or decrease resources in minutes by ordering more capacity. No need to buy and install additional servers.37 Reduce capital expenditure (CAPEX) – With external clouds, customers do not own the infrastructure. This enables enterprises to eliminate capital expenditures and consume resources as a service, paying only for what they use. Clouds also enable IT departments to save on application implementation, maintenance and security costs, while benefiting from economies of scale.38 Save energy – ‘Going green’ is a key focus for many enterprises. Clouds enable IT organizations to reduce power, cooling, and space usage to help enterprises create and sustain environmentally responsible data centers.39 Increase end-user productivity – Cloud computing increases user productivity because users can access systems regardless of location or device (e.g., PCs, laptops, etc.).40 Improve reliability – Cloud computing can cost-effectively provide multiple redundant sites, facilitating business continuity and disaster recovery scenarios.41 Free up capacity to invest in new projects – Moving applications out to a cloud frees up existing infrastructure and resources that can be reassigned to more strategic tasks.42 Anticipated Drawbacks Limitations of Existing Cloud Computing Solutions Despite all the benefits, serious perils must be weighed. Once an organization decides to move to the cloud, it's at the mercy of power outages, network failures, security attacks and plain old human error by the provider.43 Many of today’s cloud computing solutions have serious issues, such as proprietary application platforms that require extensive redevelopment time to function off-premise, the inability to move to another provider if service level agreements (SLAs) aren’t met, and long lead times to move or set up new environments. The widespread adoption of cloud computing has been hindered by the limitations of these ineffective solutions, including: • A lack of interoperability between computing clouds – The absence of standardization across cloud computing platforms creates unnecessary complexity and results in high switching costs. Each cloud computing vendor has a different application model, many of which are proprietary, vertically 36 "Eight Key Ingredients for Building an Internal Cloud." http://www.vmware.com/files/pdf/cloud/eight-key- ingredients-building-internal-cloud.pdf 37 The future is cloudy; Roberto Rocha. The Gazette. Montreal, Que.:Jul 11, 2009. p. C.1 38 "Eight Key Ingredients for Building an Internal Cloud." 39 Ibid. 40 Ibid. 41 Ibid. 42 Ibid. 43 Future is cloudy; Roberto Rocha. The Gazette. Montreal, Que.:Jul 11, 2009. p. C.1 Cloud Computing from the Security Perspective: A Primer for Federal IT Managers 14
  • 17. integrated stacks that limit platform choice. Customers don’t want to be locked into a single provider and are often reluctant to relinquish control of their mission-critical applications to service providers.44 • Lack of compatibility with existing applications – Many existing cloud technologies do not provide inherent compatibility with existing applications. Some current computing clouds in the public domain have sacrificed application compatibility in order to provide better scalability and other features. What this can potentially mean is that IT has to write entirely new applications specific to that computing cloud, or, at the very least, make very significant modifications to their existing applications before they will run in the computing cloud.45 • Inadequate security – By design, most external cloud vendors typically support multi-tenancy compute environments. IT managers must look for the right balance between the security of an internal, dedicated infrastructure and the improved economics of a shared, external cloud environment.46 44 "Eight Key Ingredients for Building an Internal Cloud." 45 Ibid. 46 Ibid. Cloud Computing from the Security Perspective: A Primer for Federal IT Managers 15
  • 18. 5. Federal, Defense, State and Other Cloud Initiatives The National Aeronautics and Space Administration (NASA) Ames Research Center recently launched a cloud computing environment called Nebula. The Defense Information Systems Agency (DISA) is one of the first organizations in the public or private sector to implement a self-service cloud computing environment. State governments are also looking to move forward with cloud computing initiatives. Apps.gov Apps.gov, which went live, Sept. 15, 2009, is an online storefront for federal agencies to quickly browse and purchase cloud-based IT services for productivity, collaboration, and efficiency. By consolidating available services, Apps.gov is intended to be a one-stop source for cloud services. GSA conducted the competitive bidding process to commercially obtain IaaS services for cloud storage services, virtual machines, and cloud web hosting. In a reflection of the commoditized nature of cloud computing, government agencies will be able to procure IaaS units of service on a fixed-price basis. I view of the fact that apps.gov went live days before this paper was written, there is no information available on users or services ordered. National Aeronautics and Space Administration One of NASA's first cloud computing initiatives, called Nebula, is up and running and could be used in support of the agency's space missions and to give Earth-based observers greater participation in the space program. Chris Kemp, CIO of NASA's Ames Research Center, mentioned Nebula for the first time recently at the Federal Information Technology on a Budget Forum in Washington, DC. NASA describes Nebula as a cloud computing environment that integrates open source components into a seamless, self- service platform. Nebula can be used for the rapid development of policy-compliant, secure Web apps, NASA says, adding that it will be used to support education, public outreach, collaboration, and mission support.47 NASA describes Nebula as a combination of infrastructure, platform, and software as a service, and the agency has created an IT architecture to support that. Components include the Eucalyptus software developed at the University of California at Santa Barbara, the Lustre file system deployed on 64-bit storage nodes, the Django Web application framework, the SoIr indexing and search engine, and an integrated development environment. Nebula will be compatible with Amazon Web Services, which means AWS compatible tools will work with it and Nebula virtual servers can run on Amazon's Elastic Compute Cloud.48 Currently on the production side, NASA is currently hosting a limited number of web applications to test drive their cloud. On the infrastructure side, the migration of the "Horsehead" 12-server cluster to their new facility is complete, and we are progressing on the procurement of 12 additional servers. Department of Veteran Affairs The Department of Veterans Affairs (VA) has deployed a small internal cloud. It wanted an early-warning system that could analyze data from its 100-plus clinics and hospitals and spot outbreaks of infectious diseases, and it had to do so on a tight budget. The project, dubbed the Health Associated Infection and Influenza Surveillance System, was built on six standard blade servers with converged network and storage I/O. The CPUs can be managed individually or as a virtualized whole, with workloads shifted and capacity summoned as necessary.49 47 NASA Launches Its First Effort, John Foley. InformationWeek. Manhasset:Jun 1, 2009. Iss. 1232, p. 11 48 Ibid. 49 Babcock, Charles. "Time To Believe In 'Private Clouds'." InformationWeek 13 Apr 2009 Cloud Computing from the Security Perspective: A Primer for Federal IT Managers 16
  • 19. The six-blade system runs Egenera's cloud management software, PAN Manager, which manages I/O, networking, and storage for the servers as a logical set. It can execute several applications, while always having enough horsepower to do its main job. The system's Dell blades and storage can be virtualized as a pooled resource in such a way that processing power can be devoted quickly to the VAs cloud, its highest-priority task. In many ways, the VAs new system anticipated Cisco's recently introduced "unified computing" platform, a virtualized, multiblade server chassis with converged I/O that Cisco touts as just the thing for cloud computing.50 Defense Information Systems Agency The Defense Information Systems Agency (DISA) is involved in one of few examples of cloud computing in government. In October, the agency launched the Rapid Access Computing Environment (RACE), which allows Defense IT developers to test applications before they go live. RACE allows users to provision a server within 24 hours inside one of DISA's data centers, using a charge card. The agency plans to offer RACE on its classified network by the end of the year.51 The applications are stored at a DISA data center, and customers pay the agency only for the computing resources they need when they need them.52 Among the benefits it hopes to achieve are lower IT costs, pay-per-use accounting, accelerated deployment of mainframe -class systems, data center standardization, and flexibility in scaling up and down.53 The agency has been virtualizing servers in its 13 data centers since 2006, when it awarded capacity contracts to APPTIS, Hewlett-Packard Co., Sun Microsystems and Vion Corp. The eight-year contracts allow DISA to purchase server capacity on an on-demand basis and to pay for it like a utility; DISA hosts 6,000 operating environments and has virtualized 20 percent of them during the last two years. The biggest benefit of virtualization for DISA is that it speeds the process of standing up a new server. What used to take two years in some instances now takes two hours. Another measurable benefit of virtualization is the reduction of excess capacity. DISA has two SaaS pilot projects. It offers CollabNet's SourceForge software development platform on a per-user basis, and it plans to offer a commercial customer relationship management platform to its Army and Air Force customers. The projects require changes to DISA's procurement methodologies and security concerns have arisen.54 U.S. Navy Sponsored by Dataline, LLC, the Secure Cloud Computing experiment has been designed to explore the use of a commercial IaaS platform as a viable means of supporting a specified subset of U.S. Navy mission requirements for global connectivity, server failover and application access. Goals for the experiment include:55 • Demonstrating the establishment and use of trusted communication paths on a global public computing infrastructure; and • Demonstrating dynamic, mission driven, provisioning of information via trusted communication paths on a global public computing infrastructure56 50 Ibid. 51 Marsan, Carolyn. "Forecast: Mostly Cloudy." 04 SEP 2009 Web.<http://www.nextgov.com/nextgov/ng_20090904_5712.php?oref=search> 52 Aitoro, Jill. "Managing Technology: Reaching for the Clouds." 02 MAY 2009 Web.8 Sep 2009. <http://www.nextgov.com/nextgov/ng_20090205_7722.php> 53 Foley, John. "How Government's Grabbing THE CLOUD." InformationWeek 06 Jul 2009 54 Marsan, Carolyn. "Forecast: Mostly Cloudy." 04 SEP 2009 Web.<http://www.nextgov.com/nextgov/ng_20090904_5712.php?oref=search> 55 Jackson, Kevin. "U.S. Navy Experiments with Secure Cloud Computing." Cloud Computing Journal (2009): 1. Print. 56 Jackson, Kevin. "U.S. Navy Experiments with Secure Cloud Computing." Cloud Computing Journal (2009): 1. Print. Cloud Computing from the Security Perspective: A Primer for Federal IT Managers 17
  • 20. Working with Amazon Web Services and Security First Corporation, the Dataline-led team will explore the ability of cloud computing technologies to support humanitarian assistance and disaster relief military missions. As currently planned, the test scenario will simulate the secure use of a cloud-based collaboration environment. Both synchronous and asynchronous collaboration technologies will be leveraged. Information and data access among multiple operational groups will be dynamically managed based on simulated ad-hoc mission requirements. Expected mission advantages of this new approach include:57 • Increased IT infrastructure resiliency through the use of dynamic and automatic provisioning of compute and storage resources; • The ability to provide virtually unlimited IT infrastructure scalability through the elastic nature of an IaaS platform; and • Increased mission flexibility through a globally distributed and accessible IT infrastructure that is also open to use by Non-Government Organizations (NGOs), civilian first responders and non-U.S. military forces. The use of a government sponsored "Red Team" is also being requested as a means of validating the security of the proposed infrastructure.58 U.S. Army During June 2009, after successful implementation of our U.S. Army pilot our combined solution was moved behind the Army's firewall and the pilot metrics expanded. Soldiers with traumatic brain injuries who are returning home will need to be monitored by doctors and case managers. The military is testing a new cloud system provided by AllOne Mobile that combines accessible health-care information, monitoring technology, and mobile communications. By accessing the system, doctors and managers can monitor the patient and send him or her text messages, and the soldiers can easily access their health records while away from home. AllOne Mobile's platform is anticipated to support the rehabilitation needs of up to 10,000 returning soldiers in a phased implementation over the next year.59 State and Local Use Today, there are already hundreds of early adopter local governments across North America recognizing the benefits of moving into cloud computing applications for processes such as community development planning and zoning. For example: City of Sonora, CA; Borough of Beaver, PA; City of Sweet Home, OR; Town of Waxhaw, NC; to name a few. These local governments have adopted BasicGov web-based software from CloudBench Applications. 60 The BasicGov software application is built on Force.com, the cloud computing platform from SalesForce.com used by more than 55,000 organizations worldwide. 61 Within weeks, Michigan will take the first step toward building a massive data center designed to provide cloud computing services to state agencies, cities, counties and schools across the state. Michigan's Department of Information Technology will release a request for information (RFI) in September to gather ideas and gauge industry interest in forming a public-private partnership to build and operate the facility, according to state CIO Ken Theis. The state intends to break ground on the data center project in October 2010.62 This said, the new facility would cut the cost of running government by reducing the number of duplicate computer systems operated by cities, counties and state agencies. The plan envisions a public-sector 57 Ibid. 58 Ibid. 59 "Diversinet Reports Second Quarter 2009 Financial Results." 07 JUL 2009 Web.10 Sep 2009. <http://markets.hpcwire.com/taborcomm.hpcwire/?GUID=9604064&Page=MediaViewer&ChannelID=3197> 60 "Cloud Computing – Emergency Preparedness for Local Government." (2009) 61 Ibid 62 Towns, Steve. "Michigan Plans New Data Center and Government Cloud." Government Technology (2009): Print. Cloud Computing from the Security Perspective: A Primer for Federal IT Managers 18
  • 21. cloud that would offer application hosting and managed services to any public entity in Michigan. In addition, the data center is being positioned as a magnet for technology related economic development and as a potential alternative to offshore application hosting and storage for private companies.63 Utah state government is preparing a private cloud that will offer hosted e-mail and Web applications to cities and counties within the state, according to Steve Fletcher, state CIO and executive director of Utah's Department of Technology Services.64 Conclusion Legacy IT absorbs a lot of an agency's available IT budget and is a primary barrier to IT responsiveness and overall business agility. It's the fundamental reason IT is not flexible, responsive, and efficient. Cloud computing is an emerging computing paradigm that is real and becoming progressively more popular. While there are advantages and similarly challenges to adopting the cloud computing concept, the key consideration provided in this white paper can be used as a starting point. Adoption of cloud computing symbolizes a major cultural transformation for both CIOs and CISO and the lines of business each support. In and effort to better support the agencies' mission, senior IT management need to think freshly about "make versus buy" sourcing decisions for their IT service delivery capabilities. The Cloud is going to happen. As we move forward in cloud computing for support to the mission, the federal enterprise should continue to strengthen formal processes to ensure that lessons learned from both industry and the government's own successful cloud computing initiatives are continually examined and broadly adopted across the enterprise.65 63 Ibid. 64 Ibid. 65 Gourley, Bob. "Cloud Computing and Cyber Defense." 21 MAR 2009 Cloud Computing from the Security Perspective: A Primer for Federal IT Managers 19
  • 22. APPENDIX A: ACRONYMS CAPEX Capital Expenditure CIO Chief Information Officer CISO Chief Information Security Officer COTS Commercial off-the-shelf CPU Central Processing Unit DISA Defense Information Systems Agency E-Discovery Electronic Discovery GSA General Services Administration IaaS Infrastructure as a Service IT Information Technology NASA National Aeronautics and Space Administration NCSD National Cyber Security Division NGO Non-Government Organization NFS National Science Foundation NTT Nippon Telegraph and Telephone OMB Office of Management and Budget PaaS Platform as a Service RACE Rapid Access Computing Environment ROI Return on Investment SaaS Software as a Service SAS70 Statement of Auditing Standards No. 70 SLA Service Level Agreements VA Veterans Affairs Cloud Computing from the Security Perspective: A Primer for Federal IT Managers 20
  • 23. APPENDIX B: Cloud Computing Checklist  Examine creating a Private (Virtual) Cloud or a Hybrid Cloud that provides the appropriate level of controls while maintaining risk at an acceptable level. Review what type of provider you require such as software (SaaS), infrastructure (IaaS) or platform (PaaS). Careful and comprehensive due diligence is required before deciding to use Public Cloud Services for mission critical components of your business unless you can manage customer expectations and draft an appropriate contract Examine creating a Private Cloud or a Hybrid Cloud that provides the appropriate level of controls while maintaining risk at an acceptable level. Review what type of provider you require such as software (SaaS), infrastructure (IaaS) or platform (PaaS) Gain clarity on how pricing is truly performed with respect to bandwidth and CPU utilization in a shared environment. Compare usage as measured by the cloud service provider with your own log data, to ensure accuracy. Request clear documentation on how the facility and services are assessed for risk and audited for control weaknesses, the frequency of assessments and how control weaknesses are mitigated in a timely manner. Ask the service provider if they make the results of risk assessments available to their customers. Require the definition of what the provider considers to be critical success factors, key performance indicators and how they measure them relative to IT Service Management (Service Support and Service Delivery). Require a listing of all provider third party vendors, their third party vendors, their roles and responsibilities to the provider and their interfaces to your services. Request divulgence of incident response, recovery, and resiliency procedures for any and all sites and associated services. Request a review of all documented policies, procedures and processes associated with the site and associated services assessing the level of risk associated with the service. Require the provider to deliver a comprehensive list of the regulations and statutes that govern the site and associated services and how compliance with these items is executed. Require the provider to deliver a comprehensive list of the regulations and statutes that govern the site and associated services and how compliance with these items is executed. Source: "Security Guidance for Critical Areas of Focus in Cloud Computing." Cloud Security Alliance. (2009) Cloud Computing from the Security Perspective: A Primer for Federal IT Managers 21