0% found this document useful (0 votes)
22 views

Unit 5 - CC

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Unit 5 - CC

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 28

1.What is Cloud Security?

Cloud security refers to protecting data stored online via cloud computing
environments (instead of data centers) from theft, deletion, and leakage. There
are many protective methods that help secure the cloud; these measures include
access control, firewalls, penetration testing, obfuscation, tokenization, virtual
private networks (VPN), and not using public internet connections.
How Secure is the Cloud?
Human error is one of the top reasons for data breaches in the cloud.
Therefore, it is not an issue of whether or not the cloud is secure but if the
customer is using the cloud securely.
Examples of Cloud Security Compromised by Misconfiguration
Too often, misconfigured cloud-based systems lead to data breaches. For
instance, in 2019, Capital One was hacked by a malicious actor who stole the
sensitive data of more than 100 million people while not following traditional
hacker patterns.
The breach was the result of a misconfigured open-source web application
firewall (WAF), which Capital One used in its operations hosted on Amazon
Web Services. The misconfigured WAF was permitted to list all the files in any
AWS data buckets and read the contents of each file. The misconfiguration
allowed the intruder to trick the firewall into relaying requests to a key back-end
resource on AWS.
security challenges included:
1. Visibility
2. Data Privacy
3. IAM Procedures
4. Configuration Management
5. Compliance Requirements
7 Fundamentals of Cloud Security
Don’t just migrate to the cloud – prevent security threats by following these
tips:

1. Understand what you’re responsible for – different cloud services


require varying levels of responsibility. For instance, while software-as-a-
service (SaaS) providers ensure that applications are protected and that data
security is guaranteed, IaaS environments may not have the same controls. To
ensure security, cloud customers need to double check with their IaaS providers
to understand who’s in charge of each security control.
2. Control user access – a huge challenge for enterprises has been
controlling who has access to their cloud services. Too often, organizations
accidently publically expose their cloud storage service despite warnings from
cloud providers to avoid allowing storage drive contents to be accessible to
anyone with an internet connection. CSO advises that only load balancers and
bastion hosts should be exposed to the internet. Further, do not allow Secure
Shell (SSH) connections directly from the internet as this will allow anyone
who finds the server location to bypass the firewall and directly access the data.
Instead, use your cloud provider’s identity and access control tools while also
knowing who has access to what data and when. Identity and access control
policies should grant the minimum set of privileges needed and only grant other
permissions as needed. Configure security groups to have the narrowest focus
possible and where possible, use reference security group IDs. Finally, consider
tools that let you set access controls based on user activity data.
3. Data protection – data stored on cloud infrastructures should never be
unencrypted. Therefore, maintain control of encryption keys where possible.
Even though you can hand the keys over to cloud service providers, it is still
your responsibility to protect your data. By encrypting your data, you ensure
that if a security configuration fails and exposes your data to an unauthorized
party, it cannot be used.
4. Secure credentials – AWS access keys can be exposed on public
websites, source code repositories, and other such platforms. Therefore, you
should create and regularly rotate keys for each external service. Never use root
user accounts – these accounts should only be used for specific account and
service management tasks. Further, disable any user accounts that aren’t being
used to further limit potential paths that hackers can compromise.
5. Implement MFA – your security controls should be so rigorous that if one
control fails, other features keep the application, network, and data in the cloud
safe. By tying MFA (multi-factor authentication) to usernames and passwords,
attackers have an even harder time breaking in. Use MFA to limit access to
management consoles, dashboards, and privileged accounts.
6. Increase visibility – to see issues like unauthorized access attempts, turn
on security logging and monitoring once your cloud has been set up. Major
cloud providers supply some level of logging tools that can be used for change
tracking, resource management, security analysis, and compliance audits.
7. Adopt a shift–left approach – with a shift-left approach, security
considerations are incorporated early into the development process rather than
at the final stage. Before an IaaS platform goes live, enterprises need to check
all the code going into the platform while also auditing and catching potential
misconfigurations before they happen. One tip – automate the auditing and
correction process by choosing security solutions that integrate with Jenkins,
Kubernetes, and others. Just remember to check that workloads are compliant
before they’re put into production. Continuously monitoring your cloud
environment is key here.
Secure Your Cloud with Stefanini
Across Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and
Software as a Service (SaaS), we will work with your unique business needs to
balance data accessibility with security concerns and address the growing need
for agility to adapt to a connected world. We are here to help your business scale
by delivering new functionality whenever you need it and by managing your
complex Cloud (public, hybrid, private cloud) environments with complete
operational insights and security controls.
2. What are Cloud Security Services?
Cloud Security Services is a set of policies, controls, procedures, and
technologies that work together to protect your cloud-based systems. These
services work like an invisible shield, guarding your data against threats like
hackers, viruses, and data leaks. They also ensure that only authorized people
can access your data, much like a key to a lock.
Cloud Security Services are essential components of the digital ecosystem,
functioning as the protective measures deployed to safeguard our data — the
precious jewels in the cloud. These services comprise a set of security protocols,
technologies, controls, and procedures that diligently work towards shielding
our data from various threats.
Cloud Security Services perform a myriad of functions, each integral to the
protection and integrity of data. They mitigate a wide array of cyber threats,
including data breaches, malware infections, DDoS attacks, and insider threats,
to name a few. With the exponential increase in cyber attacks, having robust
Cloud Security Services is not just a good-to-have feature, but an absolute
necessity.
Consider Cloud Security Services as the robust vault safeguarding your treasure
of data from cyber threats. Much like a well-guarded fortress, these services
provide multiple layers of defense against a wide spectrum of threats, including
hacking attempts, data breaches, malicious software, and insider threats.
Moreover, Cloud Security Services ensure that data access is strictly managed
and controlled. They operate like a sophisticated lock-and-key system that
permits access only to authorized individuals. This reinforces the principle of
‘least privilege,’ ensuring that each user can access only the data necessary for
their role.
Types of Cloud Security Services
When we delve into the realm of cloud security, it’s crucial to understand that it
is not a singular, monolithic entity. Instead, it encompasses a wide range of
services, each designed to address specific vulnerabilities and threats. Here’s a
breakdown of the primary types of cloud security services:
Network Security Services: These services focus on protecting the underlying
networking infrastructure from threats, unauthorized access, and disruptions.
This is achieved through a combination of methods such as secure gateways,
firewalls, intrusion detection systems (IDS), and intrusion prevention systems
(IPS). Network Security Services are designed to safeguard the integrity,
usability, reliability, and safety of your network and data.
Data Protection Services: As the name suggests, these services revolve around
protecting a company’s data stored in the cloud. They ensure data
confidentiality, integrity, and availability through encryption, tokenization, and
key management practices. This includes safeguarding data at rest, in transit,
and in use. Additionally, data loss prevention (DLP) measures are put in place to
prevent data leakage or loss.
Identity and Access Management Services (IAM): IAM services are critical
to cloud security, ensuring that only authorized individuals can access specific
resources. This is achieved by using tools like multi-factor authentication
(MFA), single sign-on (SSO), and identity federation. IAM services help
manage user identities and their permissions, reducing the risk of internal data
breaches.
Threat Intelligence and Secure DevOps Services: These services focus on
predicting, identifying, and mitigating potential threats to cloud security. Threat
intelligence services use data analysis to understand and anticipate potential
threats, providing actionable insights. On the other hand, Secure DevOps
services integrate security practices into the DevOps process, ensuring that
security is embedded in applications right from the development stage.
Features of Cloud Security Services
When considering Cloud Security Services, understanding their key features is
crucial. These features form the basis of cloud security and offer a multifaceted
approach to protect data, applications, and infrastructure in the cloud. Here are
some significant features of Cloud Security Services:
High-Level Data Encryption: Encryption is one of the fundamental features of
Cloud Security Services. It involves converting readable data into a coded form,
so it can’t be understood if intercepted. It is used both for data at rest (stored
data) and data in transit (data being sent or received). Only authorized parties
with the decryption key can decode and read the data, offering a high level of
data protection.
Regular Security Audits: Regular security audits are essential to maintaining a
strong security posture. These audits can identify potential vulnerabilities and
ensure all security controls are functioning as intended. Cloud Security Services
often include tools for continuous monitoring and regular auditing of security
measures, helping to maintain regulatory compliance and secure operations.
Disaster Recovery Planning: Another feature of Cloud Security Services is
disaster recovery planning. These services often include backup and recovery
solutions that ensure business continuity in the event of a disaster, whether
natural or man-made. Cloud backups are stored in geographically distributed
locations, so data can be recovered even if one location is compromised.
Multi-Factor Authentication (MFA): MFA is an authentication method that
requires users to verify their identities through multiple methods before they can
access certain data or systems. It is an essential feature of Identity and Access
Management Services, adding an additional layer of security that makes it
harder for unauthorized users to gain access.
Intrusion Detection and Prevention: These features are designed to detect and
prevent cyber threats in real-time. Intrusion detection systems (IDS) monitor
network traffic for suspicious activity, while intrusion prevention systems (IPS)
proactively deny network traffic based on a security profile.
These features, when combined, create a robust cloud security framework,
ensuring comprehensive protection for businesses operating in the cloud
environment. Each feature addresses different areas of security, contributing to a
layered and effective defense mechanism against cyber threats.
Different Tools Available for Cloud Security Services
A wide variety of tools are available for implementing Cloud Security Services.
These tools range from proprietary solutions developed by industry leaders to
open-source projects maintained by the community. Here are a few noteworthy
tools, including PingSafe and some open-source alternatives:
PingSafe: Reinforcing your cloud security has never been easier than with
PingSafe’s CNAPP (Cloud Native Application Protection Platform). Designed
to be your multi-cloud security ally, it offers a dynamic and resilient defense
mechanism for your multi-cloud infrastructure. From the moment of
development to the deployment stage, PingSafe’s unified platform is on guard,
shielding your digital assets. Its advanced components use intelligent
mechanisms to ward off attackers and ensure unparalleled protection. With
PingSafe, secure your cloud environment without compromising the agility and
benefits of your multi-cloud strategy.
OpenStack: OpenStack is an open-source software platform that provides
robust cloud computing services. Among its various components, OpenStack
includes several security-focused tools. For instance, OpenStack Keystone
provides Identity and Access Management (IAM) services, including multi-
factor authentication and role-based access control.
CloudSploit: CloudSploit is an open-source project aimed at ensuring security
and compliance in the cloud. It offers automated scans of configuration settings
in your AWS, Azure, Google Cloud, and Oracle Cloud accounts, helping to
identify potential security risks.
HashiCorp Vault: Vault is an open-source tool for securely managing secrets
and protecting sensitive data. It provides encryption as a service, secure secret
storage, and identity-based access management, among other features.
Utilizing these tools, along with implementing best practices, can help maintain
a secure cloud environment. Each tool offers unique features and capabilities, so
choose the ones that best suit your business needs and cloud security strategy.
How to Choose the Right Cloud Security Services?
Choosing the right Cloud Security Services is a crucial task that requires careful
consideration. It’s not a one-size-fits-all situation, as different businesses have
unique needs based on their industry, size, regulatory environment, and specific
operational requirements. Here’s how to approach this critical decision:
Understanding Your Business’s Unique Security Needs: The first step in
choosing the right cloud security services is to understand your business’s
unique security needs. This involves identifying the types of data you handle
(such as customer data, financial data, etc.), the regulatory requirements you
need to comply with, and the potential threats your business might face.
Understanding these factors can help you identify which security measures are
most important for your business.
Assessing the Service Provider’s Security Measures: Once you have a clear
understanding of your security needs, assess the cloud security services offered
by different providers. Look for services that align with your needs and provide
robust protection for your data and applications. This includes encryption,
access control, threat detection and prevention, and regular security audits.
Reviewing the Service Level Agreement (SLA): The SLA provides a clear
outline of what security measures the service provider will implement and their
responsibilities in the event of a security incident. Make sure the SLA matches
your expectations and needs.
Checking the Provider’s Reputation and Track Record: Look for a service
provider with a strong reputation and a good track record in cloud security.
Check for customer testimonials, case studies, and third-party reviews to get an
idea of their reliability and effectiveness.
Scalability and Flexibility: Your cloud security needs might change as your
business grows or as new threats emerge. Choose a service that can scale with
your business and adjust to changing security needs.
Remember, selecting the right Cloud Security Services is not just about ticking
off a checklist but choosing a service that aligns with your business objectives,
ensuring you can operate securely and efficiently in the cloud.
3. 7 core principles of a cloud security architecture
The architecture of a cloud security system should account for tools, policies
and processes needed to safeguard cloud resources against security threats.
Among its core principles, it should include:
Security by design – cloud architecture design should implement security
controls that are not vulnerable to security misconfigurations. For example, if a
cloud storage container holds sensitive data, external access should be locked,
and there should be no way for an administrator to open access to the public
Internet.
Visibility – many organizations use multi-cloud and hybrid-cloud deployments
that traditional security solutions fail to protect. An effective strategy accounts
for both the tools and the processes to maintain visibility throughout an
organization’s complete cloud-based infrastructure.
Unified management – security teams are often overworked and understaffed,
and so cloud security solutions must provide unified management interfaces.
Teams must be able to centrally manage a wide range of cloud security solutions
from one pane of glass.
Network security – the cloud uses a shared responsibility model, and the
organization is responsible for securing traffic flows to and from cloud
resources, and between the public cloud and on-premise networks. Segmenting
networks is also important to limit an attacker’s ability to move laterally once
they have gained access to a network.
Agility – the cloud fosters development and deployment of new solutions.
Security should not inhibit this agility. Organizations can use cloud-native
security solutions that integrate seamlessly into the agile development lifecycle.
Automation – automation is critical to swift provisioning and updating of
security controls in a cloud environment. It can also help identify and remediate
misconfigurations and other security gaps in real time.
Compliance – regulations and standards like GDPR, CCPA, and PCI/DSS
protect both data and processes in the cloud. Organizations can leverage cloud
provider solutions, but will often need third party solutions to manage
compliance across multiple cloud providers.
4. AWS security
1) Limit security groups
Security groups limit network access to AWS resources. Make sure that you
only enable communication to and from ports and IP ranges that are absolutely
necessary for components to function. Amazon provides AWS Config and AWS
Firewall Manager services, which can automatically configure virtual private
cloud (VPC) network policies, and apply WAF rules to resources accessible
from the public Internet.
2) Automate backup
Backup is an important security practice, which can protect against data
corruption, accidental deletion, and attacks such as ransomware. The AWS
Backup service provides central control over backups in all main Amazon
services, including Elastic File Service (EFS), Elastic Block Storage (EBS),
DynamoDB, and Amazon Relational Database Service (RDS). Amazon also
provides API and CLI access to backup functions.
3) Centralize logs
Amazon CloudTrail is a service that collects logs and events from all Amazon
services. Store CloudTrail logs to S3 buckets, alongside logs from load
balancers, other monitoring services, or and own cloud native applications. By
creating a central log archive, you can analyze and correlate logs across all
Amazon systems. You can use a security information and event management
(SIEM) system to generate security alerts from the data.
4) Isolate Kubernetes Nodes
Another important practice is to isolate Kubernetes nodes, for example when
running Kubernetes clusters in Amazon Elastic Kubernetes Service (EKS).
Kubernetes is a powerful orchestration tool for managing containerized
applications. However, it can also be a potential attack vector if not properly
secured.
Isolating nodes means segregating them into different security groups or virtual
private clouds (VPCs). This reduces the attack surface by limiting the potential
impact of a security breach. If one node is compromised, the attacker cannot
easily move to other nodes in the network. It is also advised to use network
policies to control traffic flow between pods in a Kubernetes cluster.
5) Scan Container Images
Container images can contain vulnerabilities that can be exploited by attackers.
Therefore, scanning container images for vulnerabilities is a critical part of
securing your AWS environment.
A common way to run containers in AWS is using Fargate, a serverless compute
engine. It allows you to run containers without having to manage the underlying
infrastructure. You can use CloudFormation to automate image scanning for all
containers deployed to Amazon Fargate (learn more in the Amazon blog post).
5.Azure security best practices
1) Encrypt your data
There are numerous ways to encrypt data in Azure:
Azure Disk Encryption, with encryption keys stored in Azure Key Vault (AKV),
or in your own key repository
Encryption at Rest, enabled by default for all Azure storage services, using FIPS
140-2 compliant 256-bit AES encryption
Encryption in Transit, with built in data link encryption in and between Azure
data centers, and TLS encryption for all communications
2) Limit data access
Follow these best practices to limit access to sensitive data and resources:
Always restrict access to Secure Shell (SSH), Remote Desktop Protocol (RDP),
and similar services in your Network Security Groups configuration, unless
absolutely necessary.
Close all ports that are not actively used by your services or applications.
Share data or files securely using Azure Information Protection service, which
lets you set a security priority for files, mark them as sensitive, and protect them
with relevant permissions.
Use Azure Rights Management (RMS) to define encryption and authorization
policies, which remain attached files wherever they are stored, ensuring only
authorized users can view them.
3) Identity management
Azure provides the state of the art in identity management supporting zero trust
practices. The primary service used for identity management is Azure Active
Directory (Azure ID). A few key access control best practices are:
 Use identity as the primary security perimeter
 Centrally manage identity management
 Enable single sign-on (SSO)
 Turn on conditional access to all cloud resources
 Enable automated password management
 Enforce ongoing multi-factor verification
 Use role-based access control (RBAC)
 Isolate privileged accounts to lower their exposure
 Use Azure AD to authenticate any access to storage
4) Use Just-In-Time (JIT) Virtual Machine Access
JIT access is a method of providing temporary, time-bound access to resources.
Azure Security Center’s JIT VM access reduces the attack surface by enabling
you to lock down inbound traffic to your Azure VMs. When someone needs to
connect to a VM, they request access, and if approved, Security Center
automatically configures the NSG rule to allow inbound traffic. After the time
window expires, Security Center automatically reconfigures the NSG to deny
traffic.
This practice not only reduces the potential for unauthorized access but also
provides an audit trail of who accessed what and when.
5) Use the Azure Security Center’s Compliance Dashboard and Security
Benchmark
The Azure Security Center’s Regulatory Compliance Dashboard provides a
centralized view of our security posture and helps meet industry compliance
standards. The dashboard provides insights into compliance status, and offers
recommendations on how to improve the compliance score and reduce potential
security risks.
The Azure Security Benchmark provides a set of high-impact security
recommendations following industry best practices. These recommendations go
beyond the baseline security policies and are tailored to the specific needs of
Azure workloads.
6.Google cloud security best practices
1) Resource hierarchy
GCP offers a flexible resource hierarchy that lets you define the structure of
cloud resources and apply permissions in a granular way. Create a hierarchy
using Folders, Teams, Projects and Resources that mimics your organizational
structure. Otherwise, follow the structure of your development projects or
cloud-based applications.
2) Managing firewalls and unrestricted traffic
Use VPC firewalls to manage network traffic to VPCs, virtual machines, and
other Google Cloud resources. Avoid allowing access to broad IP ranges, both
for inbound and outbound communications. Google Cloud VPC lets you assign
network targets using tags and Service Accounts, which makes it possible to
define traffic flows logically. For example, you can specify that a certain front-
end service can only connect to VMs using a specific service account.
3) Retain admin activity logs
Google provides Admin Activity Logs which are retained for 400 days, and
provide insights into a range of services and resources in the Google Cloud
environment. Export them or save the logs to Google Cloud Storage if you want
to retain them for longer, or for compliance purposes.

What is a Certified Cloud Security Professional (CCSP)?


CCSP is a role that was created to help standardize the knowledge and skills
needed to ensure security in the cloud. This certification was developed by
(ISC)² and the Cloud Security Alliance (CSA), two non-profit organizations
dedicated to cloud computing security.
CCSP is designed to help professionals supplement and modify traditional
security approaches to better ensure cloud protection. It does this by helping
organizations train security professionals and recognize the level of competence
in their current teams. This ensures that professionals understand how to secure
the cloud and what tools are most effective.
Any professional in the information security or IT fields can gain a CCSP
certification. Those who most commonly seek one include:
 Systems and security engineers
 Enterprise, system, or security architects
 Security administrators or managers
Why do you need a CCSP certification?
There are many professional and organizational benefits that can come with
getting CCSP certified. The most common benefits include:
Career advancement
Validation and authentication of your skills and knowledge in cloud computing
and security best practices and requirements
Maintenance of certification level ensures that you remain up-to-date on best
practices and technologies related to to cloud based security
Access to a community of equally or more highly-skilled security professionals
How to become a CCSP
To gain your CCSP certification, you need to study for and pass the examination
offered by (ISC)². This certification is only one of six certifications offered by
the organization but is the only one focused solely on secure cloud computing.
To obtain your CCSP certification, you need at least five years of paid
experience, including three years in information security and one year in one or
more of six CCSP areas:
 Architecture and design concepts
 Data security
 Platform and infrastructure security
 Application security
 Security operations
 Legal, risk and compliance
4. What is a cloud security policy?

Having a cloud security policy is crucial for all-round cybersecurity. Cloud


security policies are documents featuring rules about how to use the cloud (and
how not to use it). Elements can include:
Data handling regulations. What data types workers can move into the cloud
and data types that are prohibited. Information about the risks associated with
each data type, and measures to mitigate those risks.
Who is accountable for cloud security? Under the RACI model, policies must
explain who is accountable for meeting security goals. The policy also clearly
explains who is responsible for security tasks such as migrating data to the
cloud, running regular security audits, and managing cloud workloads.
What resources need to be secured? A good cloud security policy defines
what cloud resources require protection. Every cloud endpoint, application,
storage container, and infrastructure service must be included.
Authorization and access control. Cloud security requires in-depth access
control to admit authorized users and block malicious entry. The policy may
include measures like two-factor authentication, use of VPNs, and rules
about safe remote access.
Risk analysis. Security policies should show evidence of thorough risk
analysis. Cloud security risks should follow regulations, showing clear evidence
of compliance. The document should reflect risk priorities and focus on the
most urgent cloud security threats.
Threat responses. The security policy should cover the most important cloud
security threats with clear guidelines about how to respond.
Enforcement – How the company enforces the terms of the security policy.
Includes reporting and user monitoring, as well as the levying of penalties for
breaching policy rules.

 How to behave securely when accessing cloud resources


 What are the main cloud security threats?
 Who is responsible for securing cloud assets?
 The penalties for breaching the cloud security rules
When every user knows this information, cloud resources will be as secure as
possible.
At the same time, cloud security policies must combine with other security
policies. Rules about network security, remote working, physical security, and
cybersecurity threats should work alongside cloud security rules. The policies
work together, not as stand-alone tools.
Why is it important to have a cloud security policy?
There are many reasons to prioritize policy creation before making transitions to
the cloud. Some key reasons to devote resources to your cloud security setup
include:
Cloud security threats are extremely damaging. Cloud apps and storage
systems are convenient but vulnerable to hacking attempts. Attackers can
exploit poorly secured endpoints or cloud assets. Data breaches cost money, but
also damage corporate reputations.
Customers expect solid cloud security. Clients realize that companies rely on
cloud resources. But customers need reassurance that their data is secure at all
times. Companies must protect confidential data and financial information via
transparent policies. This builds trust and shows that companies take cloud
security seriously.
Security policies manage complexity. Multi-cloud environments involve many
cloud providers. Several teams or third-parties may require access to a complex
range of cloud assets. But no matter how complex your network, every cloud
asset requires protection. Security policies bring everything together, providing
a set of rules applicable to all cloud resources.
Staff need direction and information. Workers using the cloud want to work
securely. A cloud security policy provides clear information about how to do so.
Workers can consult a transparent, easily accessible document. Training
regularly updates staff knowledge, reinforcing cloud security best practices.
Regulatory compliance. A cloud security policy is a critical aspect of data
protection. Regulators expect companies to create clear rules about how to
handle data, access the cloud, maintain apps, and prevent cyberattacks. Under
regulations like HIPAA or [PCI-DSS](/learn/pci-dss/what-is-pci-dss/0.
companies are eligible for huge penalties without this evidence.
Cloud security policies vs. standards
Cloud security policies apply over the whole cloud computing
environment. They specify regulations for accessing and using all digital assets
in the cloud, without exception.
Cloud security standards operate at a level below policies. They explain the
tools and methods needed to execute a cloud security policy. So in practice,
security protocols and standards work together as part of the same unit.
Cloud security standards cover major operational challenges in securing cloud
operations. This could include DevOps management and rules for using cloud
apps. Standards apply to API usage, how cloud resources are segmented, and
the way assets are tagged and classified on the network.
There should also be a set of security standards setting out how to assess risks
and security postures. Standards specify threat responses and the tools required
to monitor and neutralize attacks.
Standards are flexible and subject to change. As the cloud environment changes,
standards change as well. The same applies to the threat environment.
Security policies are more static. The rules they contain are fixed, but the way
companies apply them changes all the time.
How to create a cloud security policy
The ingredients of a cloud computing security strategy vary between
companies. However, every company using the cloud requires a cloud security
policy, and these security guidelines tend to have a similar structure.
Follow this step-by-step guide to create a cloud security policy meeting your
requirements.
Step 1: State the purpose of the policy
The first step is identifying why you need a cloud security policy. Create a short
explanation of what the policy seeks to achieve. Use this as the introduction to
your policy, so readers have a good idea of what the document contains.
Step 2: Define your regulatory requirements
Security policies for cloud computing must meet relevant data protection and
cybersecurity regulations. Assess which compliance regulations apply to your
business. Ensure that every part of the policy contributes to meeting those
regulatory requirements.
Step 3: Create a policy writing strategy
Writing a good cloud security policy requires careful planning. Bring senior
management in early to approve the process. Create an overall plan that sets
milestones and timescales. Then bring together a team from all stakeholders to
strategize, draft, and disseminate the policy.
It helps to include regular management consultations during the writing process.
Input from your legal and HR teams is also valuable. Gather all relevant
expertise and ensure everyone is on board from the start.
Step 4: Understand your cloud providers
The next step is assessing your existing cloud services. List every cloud service
provider. Investigate the security features they provide. This information allows
you to understand areas of focus. Providers may handle some security issues
such as access control well. But other providers may provide very few security
options.
Step 5: Document data types covered by the policy
This is the core of the cloud security policy. Drafting teams must list the data
types covered by the policy. This explains the scope of the policy, and provides
a clear overview of what needs to be protected.
Generally, cloud security policies divide data into practical categories. For
example, you should include sub-sections for financial data, customer
information, employee personal information, and any proprietary data used in
everyday workloads.
Prioritize data types by sensitivity and risk. Focus on the most valuable and
most exposed data when assigning responsibilities and security controls.
Step 6: Set out responsibilities and ownership
Knowing who is responsible for cloud data protection is essential. This section
should show which roles are responsible for protecting cloud applications.
Show who has authority to add applications, make changes to cloud
infrastructure, or migrate data from the cloud.
This section should also document who is responsible for auditing the cloud
security policy. Explain what information is logged, and who has access to this
information.
Include more general information about the responsibility of employees. Note
any role-based access rules such as different privileges for management tiers.
Everyone should know their security requirements.
Step 7: Document data protection standards
Concisely explain the standards used to execute your cloud security
policy. Cloud security architecture includes technical controls, physical security
measures, and any special rules for mobile security.
Security controls listed here could include:
Data encryption
Access management tools such as IAM, Public Key Infrastructure or 2FA
Network segmentation
Endpoint protection systems such as SSL, VPNs, or network traffic scanning
These security controls should be defined for each cloud provider. Readers
should know how to access cloud providers securely, with specific guidance for
each service.
Mobile security controls may include:
 Information about secure cloud access from mobile devices
 Monitoring tools used to track mobile devices
 Anti-malware controls
 Physical security controls may include:
 Anti-theft systems in data centers
 Device theft prevention
Step 8: Policies for adding additional cloud services
Your policy should include information about how to safely add a cloud
service to existing setups. Each cloud service has its own security features and
potential vulnerabilities. Set out a clear risk assessment process for each
provider.
Link this section to information about roles. Staff should know who has the
authority to add a cloud service and how to do so securely.
Step 9: Plan for threat response and disaster recovery
Provide a concise threat response procedure to deal with cloud attacks. Cover
the main cloud threats, including ransomware, advanced persistent threats,
insider attacks, and DDoS attacks. List the response for each attack, and note
down who is responsible for taking action.
Plan for cloud disaster recovery as well. Schedule regular cloud backups of high
priority data. Document how the company will handle data breaches, system
outages, and large-scale data loss.
Step 10: Establish auditing and enforcement rules
Explain how network managers will audit the security policy. Set timescales for
audits and reporting to senior management. Note down the penalties for non-
compliance, and methods of enforcement.
Step 11: Disseminate and entrench the policy
When the policy is approved by stakeholders and management, the final step is
dissemination. Make the policy accessible to all users of cloud services. Send
copies to all employees and make reading the policy mandatory.
Include the cloud security policy in cybersecurity training, with regular
assessments of employee knowledge. This will embed the policy standards in
everyday behavior, and build staff knowledge about cloud security best
practices.
These steps are general guidelines that should make it easier to plan and write a
cloud security policy. This sample template provides a clear structure to follow
when writing the final document.
Cloud security policy takeaways
Cloud security does not need to be complex. Follow the template and guidelines
above to write a security policy that protects sensitive data and resources while
making life easy for employees.
Before you start planning, here are some quick takeaways to bear in mind:
Focus on all endpoints and attack surfaces
Implement Zero Trust security as much as possible
Train staff to implement your policy
Adapt standards regularly with up to date security knowledge
Prioritize the most important data
Expect human error and plan for threat responses
Make information available. Be transparent about your security goals and
policies.
5. What is a Service Level Agreement (SLA)?
A service level agreement (SLA) is an outsourcing and technology vendor
contract that outlines a level of service that a supplier promises to deliver to the
customer. It outlines metrics such as uptime, delivery time, response time, and
resolution time. An SLA also details the course of action when requirements are
not met, such as additional support or pricing discounts. SLAs are typically
agreed upon between a client and a service provider, although business units
within the same company can also make SLAs with each other.
What are the types of service level agreements?
Here are some common types of service level agreements (SLAs).
Customer-level SLA
A customer-based SLA is an agreement that covers all of the services used by a
customer. A customer service level agreement covers specific details of services,
provisions of service availability, an outline of responsibilities, escalation
procedures, and terms for cancellation.
Service-level SLA
A service-level SLA is a contract that details an identical service offered to
multiple customers. For example, if a service provider had multiple clients
using its virtual help desk, the same service-based SLA would be issued to all
clients.
Multi-level SLA
This type of agreement is split into multiple levels that integrate several
conditions into the same system. This approach is suitable for providers that
have many customers using their product at different price ranges or service
levels. These differing service levels can be built into a multi-level SLA.
What are the common elements of a service level agreement?
There are a number of common elements that you can include in a service level
agreement (SLA).
Agreement overview
An agreement overview includes the start and end dates of an SLA, details of
the parties involved, and an overview of the services included.
Description of services
A description of services outlines all services provided within an SLA. It details
information such as turnaround times, technologies and applications,
maintenance schedules, and processes and procedures.
Exclusions
This section describes all exclusions and exemptions that are agreed upon by
both parties.
Service level objective
A service level objective (SLO) is an agreement within an SLA about a specific
metric like response time or uptime. Both parties agree to key service
performance metrics backed by data.
Security standards
Both the service provider and the client use security standards to demonstrate
the security measures and protocols in place. This section also commonly
includes non-disclosure agreements (NDAs) and anti-poaching agreements.
Disaster recovery process
An SLA will often detail the process of disaster recovery and outline the
mechanisms and processes to follow in case of service failure of the vendor.
This section also includes information on the restarting process, including
restart times and alerts.
Service tracking and reporting agreement
In this section, performance metrics are agreed upon by both parties. Most
customers closely track their service performance. A reasonable baseline for this
tracking would be before and after using a new service provider.
Penalties
This section clearly states the penalties, financial or otherwise, that either side
incurs if they fail to live up to their SLA obligations.
Termination processes
There may come a time when you want to bring your agreement to an end. In
addition to requiring a notice period from either party, the SLA also clearly
outlines the circumstances that permit termination or expiration.
Review and change processes
It is important that you regularly review your SLA and any key performance
indicators (KPIs) that you are using to measure performance. Any large-scale
changes in your requirements need to be recorded in the agreement.
Signatures
The agreement to each item contained in the document is reviewed and signed
by authorized individuals and pertinent stakeholders from both sides. As long as
the agreement is in effect, both parties are bound by it.
What are some examples of metrics that service level agreements cover?
There are several common metrics you can expect service level agreements
(SLAs) to cover. These enable you to measure your service provider's
performance levels as agreed upon in your service level agreement. Here are
some common SLA metrics.
Service availability
Service availability is the amount of time that a provider’s service is available
for use. This is sometimes measured in a time slot. For example, your SLA
might specify that a provider’s service will be available for a minimum of
99.5% capacity for a specific 12-hour window each day. If you have an
ecommerce platform that receives orders around the clock, an SLA that
guarantees availability of 99.99% for 24 hours a day would be more
appropriate. Though, it’ll come at an added cost.
Error rates
Clients monitor error rates to measure how often their IT service provider
delivers a level of service that falls below customer expectations. For example,
clients can set defect rates as a metric to monitor the performance of a virtual
service desk. If the number of negative interactions rises above a certain level,
this will be flagged. Another example is software testing, where you can set
acceptable error rates for coding.
Security
It’s critical to measure controllable security metrics, such as antivirus updates
and patches, to demonstrate that the vendor takes preventive measures to reduce
unintended access.
Response times
This metric sets out the acceptable response time for a monitor. If the maximum
response time is two seconds, for example, then the metric measures the average
time from multiple locations. As long as the average from all of the sites is
below two seconds, it would be considered sufficient.
Business results
You can measure business results directly attributable to your SLA through the
use of key performance indicators (KPIs) that both parties agree to.
First-call resolution rates
This metric shows how many customers were able to have their issues solved by
the service provider during their first contact with a help desk or chatbot.
Abandonment rates
Abandonment rates are appropriate to measure for customer service providers.
The abandonment rate shows how many customers ended their communication
before getting an answer to their query from the customer service team. A
service level agreement would typically include a very low abandonment rate.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy