When you submit an enquiry via our website, we use the personal data you supply to respond to your query, including providing you with any requested information about our products and services. We may also email you several times after your enquiry in order to follow up on your interest and ensure that we have answered your it to your satisfaction. We will do this based on our legitimate interest in providing accurate information prior to a sale. Your enquiry is stored and processed as an email which is hosted by Microsoft within the European Economic Area (EEA). We keep enquiry emails for two years, after which they are securely archived and kept for seven years, when we delete them.
For our last instalment for Cyber Security Awareness Month in October, we’ve got a blog on Cloud Security Best Practices.
The cloud offers huge benefits in terms of flexibility, scale and functionality and, if they haven’t already, many organizations are in the process of moving towards cloud computing, either wholesale or according to a hybrid model. But, as the saying goes (by Spiderman’s Uncle Ben I’m told), with great power comes great responsibility. Due to the fact that cloud computing is by definition available via the Internet, it comes with its own share of information security risks.
Because of the different ways in which the cloud can be used by an organization, cloud security can cover a wide variety of areas. The commonly accepted forms of cloud computing are as follows:
For each of these types of cloud computing, the security duties that fall to the cloud service customer (CSC) vary according to what is generally known as the shared responsibility model. In simple terms, this means that the CSC has to do more in security as they move down the above list from SaaS to IaaS.
A very useful description of how this works is given in the ISO/IEC 27017 standard (Code of practice for information security controls based on ISO/IEC 27002 for cloud services) which covers the application of the Annex A controls from the ISO/IEC 27001 standard specifically to cloud services. Well worth a look.
Let’s look at the security considerations for each type of cloud computing in more detail.
If you’re making use of an application that is hosted in the cloud, then you’re using SaaS. The great thing from an ICT point of view is that the CSP looks after all the difficult aspects of security such as patching, firewalls and networking. That’s a huge help to getting up and running with a new system but it doesn’t let the customer off the hook completely when it comes to security. Some of the key security issues to address when you’re using SaaS are as follows:
If you’re using the cloud to host your own applications, then in addition to the security considerations for SaaS, you’ll also typically need to address the following:
There may be more considerations if you’re making use of some of the more unique aspects of cloud services, such as serverless computing and containers.
You may have requirements where you need to control everything about your cloud environment, from the operating system upwards, in which case the issues which may now fall to you to address could include:
Finally, however you decide to exploit the potential of cloud services, here are a few tips to guide you on the way.
As explained above, each of the models of cloud services come with their own responsibilities. If there is a SaaS application that meets your needs, this may save you a significant amount of effort over the more DIY approach that PaaS and IaaS involve. The depth and amount of technical resource you have available will be a big factor in this decision.
Once you’ve chosen which way to go, make sure it’s clear what the relative responsibilities are between you and the CSP. Read the contractual information and ensure your part in the deal is enshrined in procedures and training as part of the implementation. Don’t allow anything to fall between the cracks.
There are a significant number of excellent software tools available for jobs such as patching and the creation of virtual components (infrastructure as code). Used wisely, these can save a lot of time and reduce errors across all three cloud models.
In a cloud environment your admin user accounts are very powerful and, if compromised, can be very dangerous. Ensure strong, unique passwords are in place and MFA is used.
Cloud services are incredibly powerful and can revolutionise your organization’s approach to ICT. Particularly if using PaaS and IaaS, invest in training and recruitment to ensure that the people managing your virtual environment know what they are doing and can maximise that potential.
The cloud can be a game changer for many organizations and the breadth and quality of services available from it are truly impressive (you want to rent time on a quantum computer? – no problem!). But moving to the cloud can be a risk if not managed carefully. Hopefully these tips may help.
CertiKit is a provider of ISO toolkits, consultancy and internal auditing services, and has helped more than 4000 organizations worldwide with their compliance.
For more guidance on implementing the ISO27001:2022 standard, we’ve put together a list of our best free resources including video guides, blogs and downloadable documents.