Example: biology

SECURITY GUIDANCE FOR CRITICAL AREAS OF …

SECURITY GUIDANCE FOR CRITICAL AREAS OF FOCUS IN cloud COMPUTING SECURITY GUIDANCE FOR CRITICAL AREAS OF FOCUS IN cloud COMPUTING 2011 cloud SECURITY ALLIANCE | 1 INTRODUCTION The GUIDANCE provided herein is the third version of the cloud SECURITY Alliance document, SECURITY GUIDANCE for CRITICAL AREAS of Focus in cloud Computing, which was originally released in April 2009. The permanent archive locations for these documents are: (this document) (version 2 GUIDANCE ) (version 1 GUIDANCE ) In a departure from the second version of our GUIDANCE , each domain was assigned its own editor and peer reviewed by industry experts. The structure and numbering of the domains align with industry standards and best practices.

Security Guidance for Critical Areas of Focus in Cloud Computing.” This work is a set of best security practices CSA has put together for 14 domains involved in governing or operating the cloud (Cloud Architecture, Governance and

Tags:

  Critical, Security, Cloud, Area, Guidance, Security guidance for critical areas

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of SECURITY GUIDANCE FOR CRITICAL AREAS OF …

1 SECURITY GUIDANCE FOR CRITICAL AREAS OF FOCUS IN cloud COMPUTING SECURITY GUIDANCE FOR CRITICAL AREAS OF FOCUS IN cloud COMPUTING 2011 cloud SECURITY ALLIANCE | 1 INTRODUCTION The GUIDANCE provided herein is the third version of the cloud SECURITY Alliance document, SECURITY GUIDANCE for CRITICAL AREAS of Focus in cloud Computing, which was originally released in April 2009. The permanent archive locations for these documents are: (this document) (version 2 GUIDANCE ) (version 1 GUIDANCE ) In a departure from the second version of our GUIDANCE , each domain was assigned its own editor and peer reviewed by industry experts. The structure and numbering of the domains align with industry standards and best practices.

2 We encourage the adoption of this GUIDANCE as a good operating practice in strategic management of cloud services. These white papers and their release schedule are located at: In another change from the second version, there are some updated domain names. We have these changes: Domain 3: Legal Issues: Contracts and Electronic Discovery and Domain 5: Information Management and Data SECURITY . We now have added another domain, which is Domain 14: SECURITY as a Service 2011 cloud SECURITY Alliance. All rights reserved. You may download, store, display on your computer, view, print, and link to the cloud SECURITY Alliance GUIDANCE at subject to the following: (a) the GUIDANCE may be used solely for your personal, informational, non-commercial use; (b) the GUIDANCE may not be modified or altered in any way; (c) the GUIDANCE may not be redistributed; and (d) the trademark, copyright or other notices may not be removed.

3 You may quote portions of the GUIDANCE as permitted by the Fair Use provisions of the United States Copyright Act, provided that you attribute the portions to the cloud SECURITY Alliance GUIDANCE Version (2011). SECURITY GUIDANCE FOR CRITICAL AREAS OF FOCUS IN cloud COMPUTING 2011 cloud SECURITY ALLIANCE | 2 TABLE OF CONTENTS Introduction .. 1 Foreword .. 3 Acknowledgments .. 4 Letter from the Editors .. 6 An Editorial Note on Risk .. 8 Section I. cloud Architecture .. 11 Domain 1: cloud Computing Architectural Framework .. 12 Section II. Governing in the cloud .. 29 Domain 2: Governance and Enterprise Risk Management .. 30 Domain 3: Legal Issues: Contracts and Electronic Discovery .. 35 Domain 4: Compliance and Audit Management.

4 45 Domain 5: Information Management and Data SECURITY .. 50 Domain 6: Interoperability and Portability .. 64 Section III. Operating in the cloud .. 73 Domain 7: Traditional SECURITY , Business Continuity, and Disaster Recovery .. 74 Domain 8: Data Center Operations .. 89 Domain 9: Incident Response .. 93 Domain 10: Application SECURITY .. 103 Domain 11: Encryption and Key Management .. 129 Domain 12: Identity, Entitlement, and Access Management .. 136 Domain 13: Virtualization .. 157 Domain 14: SECURITY as a Service .. 162 SECURITY GUIDANCE FOR CRITICAL AREAS OF FOCUS IN cloud COMPUTING 2011 cloud SECURITY ALLIANCE | 3 FOREWORD Welcome to the third version of the cloud SECURITY Alliance s SECURITY GUIDANCE for CRITICAL AREAS of Focus in cloud Computing.

5 As cloud computing begins to mature, managing the opportunities and SECURITY challenges becomes crucial to business development. We humbly hope to provide you with both GUIDANCE and inspiration to support your business needs while managing new risks. The cloud SECURITY Alliance has delivered actionable, best practices based on previous versions of this GUIDANCE . As we continue to deliver tools to enable businesses to transition to cloud services while mitigating risk, this GUIDANCE will act as the compass for our future direction. In , you will find a collection of facts and opinions gathered from over seventy industry experts worldwide. We have compiled this information from a range of activities, including international chapters, partnerships, new research, and conference events geared towards furthering our mission.

6 You can follow our activities at The path to secure cloud computing is surely a long one, requiring the participation of a broad set of stakeholders on a global basis. However, we should happily recognize the progress we are seeing: new cloud SECURITY solutions are regularly appearing, enterprises are using our GUIDANCE to engage with cloud providers, and a healthy public dialogue over compliance and trust issues has erupted around the world. The most important victory we have achieved is that SECURITY professionals are vigorously engaged in securing the future, rather than simply protecting the present. Please stay engaged on this topic and continue to work with us to complete this important mission. Best Regards, Jerry Archer Dave Cullinane Nils Puhlmann Alan Boehme Paul Kurtz Jim Reavis The cloud SECURITY Alliance Board of Directors SECURITY GUIDANCE FOR CRITICAL AREAS OF FOCUS IN cloud COMPUTING 2011 cloud SECURITY ALLIANCE | 4 ACKNOWLEDGMENTS Domain Authors/Contributors Domain 1: Chris Hoff, Paul Simmonds Domain 2: Marlin Pohlman, Becky Swain, Laura Posey, Bhavesh Bhagat Domain 3: Francoise Gilbert, Pamela Jones Harbour, David Kessler, Sue Ross, Thomas Trappler Domain 4: Marlin Pohlman, Said Tabet Domain 5: Rich Mogull, Jesus Luna Domain 6: Aradhna Chetal, Balaji Ramamoorthy, Jim Peterson, Joe Wallace, Michele Drgon, Tushar Bhavsar Domain 7.

7 Randolph Barr, Ram Kumar, Michael Machado, Marlin Pohlman Domain 8: Liam Lynch Domain 9: Michael Panico, Bernd Grobauer, Carlo Espiritu, Kathleen Moriarty, Lee Newcombe, Dominik Birk, Jeff Reed Domain 10: Aradhna Chetal, Balaji Ramamoorthy, John Kinsella, Josey V. George, Sundararajan N., Devesh Bhatt, Tushar Bhavsar Domain 11: Liam Lynch Domain 12: Paul Simmonds, Andrew Yeomans, Ian Dobson, John Arnold, Adrian Secombe, Peter Johnson, Shane Tully, Balaji Ramamorthy, Subra Kumaraswamy, Rajiv Mishra, Ulrich Lang, Jens Laundrup, Yvonne Wilson Domain 13: Dave Asprey, Richard Zhao, Kanchanna Ramasamy Balraj, Abhik Chaudhuri, Melvin M. Rodriguez Domain 14: Jens Laundrup, Marlin Pohlman, Kevin Fielder Peer Reviewers Valmiki Mukherjee, Bernd Jaeger, Ulrich Lang, Hassan Takabi, Pw Carey, Xavier Guerin, Troy D.

8 Casey, James Beadel, Anton Chuvakin, Tushar Jain, M S Prasad, Damir Savanovic, Eiji Sasahara, Chad Woolf, Stefan Pettersson, M S Prasad, Nrupak Shah, Kimberley Laris, Henry St. Andre, Jim Peterson, Ariel Litvin, Tatsuya Kamimura, George Ferguson, Andrew Hay, Danielito Vizcayno, Abhiraj, Liam Lynch, Michael Marks, JP Morgenthal, Amol Godbole, Damu Kuttikrishnan, Rajiv Mishra, Dennis F. Poindexter, Neil Fryer, Andrea Bilobrk, Balaji Ramamoorthy, Damir Savanovic Editorial Team Archie Reed: Domains 3, 8, 9 SECURITY GUIDANCE FOR CRITICAL AREAS OF FOCUS IN cloud COMPUTING 2011 cloud SECURITY ALLIANCE | 5 Chris Rezek: Domains 2, 4, 5, 7, 13, 14 Paul Simmonds: Domains 1, 6, 10, 11, 12 CSA Staff Technical Writer/Editor: Amy L. Van Antwerp Graphic Designer: Kendall Scoboria Research Director: Santos SECURITY GUIDANCE FOR CRITICAL AREAS OF FOCUS IN cloud COMPUTING 2011 cloud SECURITY ALLIANCE | 6 LETTER FROM THE EDITORS Over the past three years, the cloud SECURITY Alliance has attracted around 120 corporate members and has a broad remit to address all aspects of cloud SECURITY , including compliance, global SECURITY -related legislation and regulation, identity management, and the challenge of monitoring and auditing SECURITY across a cloud -based IT supply chain.

9 CSA is becoming the focal point for SECURITY standards globally, aligning multiple, disparate government policies on cloud SECURITY and putting forward standards for ratification by international standards bodies. CSA sees itself as a cloud SECURITY standards incubator, so its research projects use rapid development techniques to produce fast results. To this end, the CSA GUIDANCE editorial team is proud to present the third version of its flagship SECURITY GUIDANCE for CRITICAL AREAS of Focus in cloud Computing. This work is a set of best SECURITY practices CSA has put together for 14 domains involved in governing or operating the cloud ( cloud Architecture, Governance and Enterprise Risk Management, Legal: Contracts and Electronic Discovery, Compliance and Audit, Information Management and Data SECURITY , Portability and Interoperability, Traditional SECURITY , Business Continuity and Disaster Recovery, Data Center Operations, Incident Response, Notification and Remediation, Application SECURITY , Encryption and Key Management, Identity and Access Management, Virtualization, and SECURITY as a Service).

10 CSA GUIDANCE in its third edition seeks to establish a stable, secure baseline for cloud operations. This effort provides a practical, actionable road map to managers wanting to adopt the cloud paradigm safely and securely. Domains have been rewritten to emphasize SECURITY , stability, and privacy, ensuring corporate privacy in a multi-tenant environment. Over the past two years, version of the GUIDANCE has served as the foundation for research in multiple AREAS of cloud SECURITY . Deliverables now in use from the TCI Architecture to the GRC Stack were inspired by previous versions of the GUIDANCE , and it is our hope that this version will be no different. The GUIDANCE serves as a high level primer for chief executives, consumers, and implementers wishing to adopt cloud services as an alternative or supplement to traditional infrastructure.


Related search queries