ISF Using Cloud Services Securely Harnessing Core Controls
ISF Using Cloud Services Securely Harnessing Core Controls
SERVICES SECURELY
HARNESSING CORE CONTROLS
Using Cloud Services Securely
Harnessing core controls
OCTOBER 2019
PUBLISHED BY
Information Security Forum
+44 (0)20 3875 6868
[email protected]
securityforum.org
PROJECT TEAM
Benoit Heynderickx – Lead
Paul Holland – Author
DESIGN
Abigail Palmer
WARNING
This document is confidential and is intended for the attention of, and use by, either organisations that are
Members of the Information Security Forum (ISF) or by persons who have purchased it from the ISF directly.
If you are not a Member of the ISF or have received this document in error, please destroy it or contact the ISF
on [email protected]. Any storage or use of this document by organisations which are not Members of
the ISF or who have not validly acquired the report directly from the ISF is not permitted and strictly prohibited.
This document has been produced with care and to the best of our ability. However, both the Information Security
Forum and the Information Security Forum Limited accept no responsibility for any problems or incidents arising
from its use.
CLASSIFICATION
Restricted to ISF Members, ISF Service Providers and non-Members who have acquired the report from the ISF.
CONTENTS
1. EXTEND SECURITY, CREATE OPPORTUNITIES 5
APPENDICES
A: GLOSSARY 85
B: CSP CLOUD SECURITY CERTIFICATIONS 86
C: CLOUD SECURITY CONTROLS APPLICABILITY 87
D: CLOUD-RELATED THREAT EVENTS 89
E: CLOUD CONTROLS MAPPING TO THE CLOUD-RELATED THREAT EVENTS 90
ACKNOWLEDGEMENTS 91
1 2 3 4 5 6 7 8
ORGANISATION
CLOUD SECURITY
GOVERNANCE
CORE CLOUD
SECURITY CONTROLS
IaaS SaaS
NETWORK SECURE
SECURITY CONFIGURATION
SECURITY
MONITORING
4 Using Cloud Services Securely: Harnessing core controls Information Security Forum
1 2 3 4 5 6 7 8
1 EXTEND SECURITY,
CREATE OPPORTUNITIES
Cloud computing has become a pervasive force, bringing economies of scale and
breakthrough technological advances to modern organisations, but it is more than just a
trend. Cloud computing has evolved at an incredible speed and, in many organisations,
is now entwined with the complex technological landscape that supports critical daily
operations.
This ever-expanding cloud environment gives rise to new types of risk. Business and security
leaders already face many challenges in protecting their existing IT environment. They must
now also find ways to securely use multiple cloud services, supported applications and
underlying technical infrastructure.
CSPs cannot be solely responsible for the security of their customers’ critical information assets. Cloud security
relies equally on the customer’s ability to implement the right level of information security controls. Yet the
cloud environment is complex and diverse, which hinders a consistent approach to deploying and maintaining
core security controls. It is vital that organisations are aware of and fulfill their share of the responsibility for
securing cloud services to successfully address the cyber threats that increasingly target the cloud environment.
“Through 2022, at least 95% of cloud security failures will be the customer’s fault.”
– Gartner1
Information Security Forum Using Cloud Services Securely: Harnessing core controls 5
1 2 3 4 5 6 7 8
This report presents a comprehensive approach to securing cloud services for organisations
that are considering using, or already actively use, one or multiple CSPs.
It does this by:
‒ exploring the key features of cloud services (Section 3)
‒ highlighting the main cloud security challenges (Section 4)
‒ outlining the main elements of cloud security governance (Section 5)
‒ presenting the core security controls that are applicable to cloud services (Section 6)
‒ exploring emerging trends in cloud security products and services (Section 7).
READERSHIP
This report is primarily directed at individuals who are responsible for securing cloud services in their
organisation, such as cloud security architects, cloud development managers and cloud engineers.
This report will also be of interest to individuals in executive management who have a governance and
oversight role for cloud security (e.g. Chief Information Security Officer (CISO), Chief Information Officer (CIO),
Chief Risk Officer (CRO) and Data Protection Officer (DPO)).
TERMS
The following terms are used throughout the report:
‒ Cloud services: computing services offered by a cloud service provider, including business applications,
document storage solutions, databases and virtual servers.
‒ Cloud environment: the combination of multiple cloud services that the organisation typically makes use of.
‒ Cloud customer: an organisation that is using cloud services.
‒ Cloud service provider (CSP): a vendor that provides cloud services, which can be purchased on demand by a
cloud customer.
Additional terms used throughout the report are referenced in the glossary in Appendix A.
METHODOLOGY
This report is informed by ISF research into leading organisations’ efforts to use cloud services securely.
The research is founded on:
‒ thought leadership from the ISF Global Team
‒ interviews with ISF Members and other industry experts
‒ ISF Members' contributions on ISF Live
‒ solution development workshops held with ISF Members in Paris, London, Helsinki, Munich, Amsterdam
and Dublin.
‒ a survey completed by ISF Members (data presented from this survey has been aggregated and anonymised)
‒ an interactive session with the ISF Advisory Council
‒ a review of the main cloud security standards and guidelines.
6 Using Cloud Services Securely: Harnessing core controls Information Security Forum
1 2 3 4 5 6 7 8
There are many cloud-related security standards and guidelines. Those reviewed for this report include:
‒ CSA Security Guidance for Critical Areas of Focus in Cloud Computing v4.0
‒ CSA Cloud Controls Matrix v3.0.1
‒ CIS Controls Cloud Companion Guide v7
‒ ISO/IEC 27017:2015, Code of practice for information security controls based on ISO/IEC 27002 for cloud services
‒ NIST SP 500-299, Cloud Computing Security Reference Architecture
‒ NIST SP 800-145, The NIST Definition of Cloud Computing.
Since this research focuses on how the cloud customer can secure the use of their cloud services, security aspects
of areas such as system acquisition, application development and resilience have not been covered in-depth in
this report.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 7
1 2 3 4 5 6 7 8
3 KEY FEATURES OF
CLOUD SERVICES
Organisations have rapidly adopted cloud services, attracted by the ease of procurement,
relatively low set-up cost and the opportunity to replace legacy technology that no longer
meets business needs. Yet, managing security is no simple task due to the unique and varied
features intrinsic to using multiple cloud services.
As organisations move to cloud computing to enhance their business operations, they tend
to favour the acquisition of cloud services over the expansion of conventional, on-premises
IT data centres. Often described as a cloud-first policy, this approach has been adopted by
41%
over half of surveyed ISF Members. For many organisations, this means that almost their
entire IT Infrastructure will eventually be hosted in the cloud environment. Yes No
Don’t Know
Organisations favour a multi-cloud environment because it allows them to pick and choose
their preferred cloud services across different CSPs (e.g. AWS, Microsoft Azure, Google
88%
Cloud, Salesforce). However, each individual CSP adopts its own jargon, its own specific
technologies and approaches to security management. The cloud customer therefore Single CSP
Two or more CSPs
needs to acquire a wide range of skills and knowledge to use different cloud services from
multiple CSPs securely.
Any organisation that contemplates using two or more CSPs (e.g. to retain vendor independence, for commercial
reasons or for strategic contingency) needs to ensure that strict internal standards are established for deploying
cloud services. The organisation should explicitly define architectural, operational and technological constraints such
that they can be assured that solutions developed for one CSP can easily be redeployed to a competitor service.
8 Using Cloud Services Securely: Harnessing core controls Information Security Forum
1 2 3 4 5 6 7 8
Organisations require a range of different users to securely access cloud services from within the organisation’s
network perimeter through secure network connections (e.g. via a gateway). However, organisations also
need their cloud services to be accessed from outside the internal perimeter by business partners and users
travelling off-site or working remotely, all connecting through a selection of secure network connections
as dictated by the organisation (e.g. via a virtual private network (VPN)). Figure 1 illustrates an example of
a typical multi-cloud environment, involving multiple CSPs and their corresponding cloud services, being
accessed by a wide range of individuals.
OneDrive
External
Office 365 Service customers
System Now
admin Salesforce
sales cloud
GATEWAY
SAP cloud Google Business
platform Cloud partners
Business IBM Cloud Google
Compute
users Cloud
Storage
AWS EC2
AWS S3 Microsoft
System
developers Microsoft Azure Files Remote
Azure Compute business users
VPN
Information Security Forum Using Cloud Services Securely: Harnessing core controls 9
1 2 3 4 5 6 7 8
A private or hybrid cloud will be more tailored to the individual needs of an organisation thereby requiring
further detailed analysis when it comes to the choice of security controls. When using a private cloud, the
organisation has more influence in defining the configuration of the underlying cloud infrastructure such as
the choice of location of the data centre, the type of operating system and the underlying hardware devices,
whereas in a public cloud, the organisation must rely upon some of the default configuration given by the CSP.
This report provides a comprehensive approach to securing cloud services that are used in a public cloud
environment. The ISF Approach can still be leveraged for the private and hybrid cloud but the implementation
of some of the controls will need to be calibrated according to the different levels of configuration used in the
private cloud.
Platform as a Service (PaaS): adds more services such as an operating system, software-defined
networking and middleware in addition to the IaaS services provided. This allows organisations
PaaS to deploy their preferred business applications without the need to be concerned about the
backend services.
Software as a Service (SaaS): delivers fully functioning business applications that include the
underlying infrastructure, networking and middleware, which can often be customised to meet
SaaS organisational needs, sometimes altering some of the built-in application logic.
70%
60% 92%
In the ISF Member Survey...
...reported high or
...reported high or medium usage of PaaS. ...reported high or
medium usage of IaaS. medium usage of SaaS.
10 Using Cloud Services Securely: Harnessing core controls Information Security Forum
1 2 3 4 5 6 7 8
The ISF Approach focuses on the controls that should be implemented by the cloud customer to manage
security in relation to each cloud service model (i.e. IaaS, PaaS and SaaS). While SaaS is typically adopted as a
stand-alone application, both IaaS and PaaS are development platforms used to create new applications and
services. This means that in IaaS for instance, there is a greater need to apply security controls to protect the
operating system and the network, whereas in SaaS, most of the cloud customer’s controls relate to access
management and data protection.
Figure 2 illustrates the different CSPs most used by surveyed ISF Members for each cloud service model, noting
the common services associated with each model.
Figure 2: Cloud service models and top three CSPs used by surveyed ISF Members
SaaS
Application services Top 3 SaaS CSPs
1. Office 365/OneDrive
2. ServiceNow
3. Salesforce
PaaS
Platform/Middleware Top 3 PaaS CSPs
1. Google Cloud
Software-defined networks
2. IBM Cloud
Operating system 3. Oracle Cloud
IaaS
Backend services: Top 3 IaaS CSPs
hardware, network, virtualisation 1. Microsoft Azure
2. AWS
Physical infrastructure
3. VMWare
Some CSPs do not adhere strictly to the distinction between these three cloud service models but may deliver
services that straddle more than one model. For instance, Microsoft Azure is typically treated as IaaS but can
also deliver PaaS services, providing the cloud customer with added services such as an operating system and a
platform in addition to the default IaaS offering.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 11
1 2 3 4 5 6 7 8
‒ Dashboard view: provides the customer with an overview of all cloud services actively in use at any point in
time. It can provide status reports, such as number of active instances, servers or applications deployed and
running. Security reports are also posted to share information regarding areas such as access management,
compliance status and security incidents.
‒ Access to a marketplace: enables the customer to purchase additional products and services, including new
security services offered by vendors other than the CSP.
With new services and products continuously devised to help secure the use of cloud services, as well as multiple
cloud management consoles – each with their own functionalities and unique characteristics – organisations are
faced with a steep learning curve that requires mastery of a wide range of skills. According to an (ISC)2 sponsored
survey, knowledge about the specific cloud management consoles is the foremost skill in demand.2
Figure 3 shows an example of a typical cloud management console offered by the major CSPs. There are as
many different cloud management consoles as there are CSPs, with each console used to configure and secure
their respective cloud services.
The level of operational and security configuration available within each cloud management console will vary
significantly across the different CSPs, as will the style and format. It can take time and effort for organisations
to become accustomed to the various configurations necessary to secure their cloud environment. Added to
the burden of managing several cloud management consoles, organisations also need to deal with the various
vendor products that have been developed to optimise the security of cloud services (for further information,
see Section 7).
12 Using Cloud Services Securely: Harnessing core controls Information Security Forum
1 2 3 4 5 6 7 8
SUMMARY
Organisations operating in the cloud environment find themselves dealing with a complex mesh of IaaS, PaaS
and SaaS in private and public clouds, which are managed through a collection of cloud management consoles
by one or several system administrators. Amplifying the complexity, cloud services can also interact with one
another – for instance, a business application such as payroll may interface with a CRM system, both of which
are hosted in the cloud environment. All told, the cloud environment can only be described as intricate and
heterogeneous as exemplified in Figure 4.
Enterprise cloud
System admin Organisation
HYBRID CLOUD
Cloud
management
PUBLIC CLOUD
console
3 “Magic Quadrant for Cloud Management Platforms”, Gartner, 7 January 2019, https://www.gartner.com/en/documents/3897466/magic-quadrant-for-cloud-management-platforms
Information Security Forum Using Cloud Services Securely: Harnessing core controls 13
1 2 3 4 5 6 7 8
4 OVERCOMING CLOUD
SECURITY CHALLENGES
While CSPs provide a certain level of security for their cloud services, organisations need
to be aware of their security obligations and deploy the necessary security controls.
This requires organisations to understand and address the many security challenges
presented by the complex and heterogeneous aspects of the cloud environment.
The rapid explosion of cloud usage has accentuated these challenges and, in some instances, left organisations
insufficiently prepared to tackle the security concerns associated with using cloud services.
Identifying and maintaining the appropriate security controls ISF Member Survey
The unique features of cloud services and the realities of operating in a multi-cloud
environment can create misperceptions or uncertainty as to what is required to secure the 69%
use of cloud services. Many organisations struggle with identifying the relevant security
controls and implementing them consistently across the entire cloud environment. ...rated as high or very
high their challenges
in implementing
Even when the organisation has selected the appropriate security controls, there are and maintaining an
several factors that can impede the ease of implementation. As explained in Section 3, adequate level of
organisations typically need to use multiple could management consoles, as well as various security controls across
their cloud environment.
products and services to manage security, which introduces a high level of complexity and
precludes a centralised view of all the security controls that have been implemented. This
can create difficulties in terms of reviewing the effectiveness of these controls, and also
can blur visibility of anomalies within the multi-cloud environment. Moreover, if security
controls cannot be deployed consistently, some important omissions can easily be made,
resulting in significant security incidents that are often the fault of the organisation due to
poor implementation of security controls.
“It’s cloud chaos. Organisations have acquired a multitude of cloud vendors and have
not been able to put the right level of governance and controls in place.” – ISF Member
14 Using Cloud Services Securely: Harnessing core controls Information Security Forum
1 2 3 4 5 6 7 8
Balancing the shared responsibility for security between the CSP and the cloud customer
Securing the use of cloud services is a shared responsibility between the CSP and the cloud customer. The
security obligations incumbent on the CSP are to protect the multi-tenant cloud environment, including
the backend services and physical infrastructure, as well as to prevent the commingling of data between
different customers.
While the CSP maintains much of the underlying cloud infrastructure, the cloud customer is responsible for
securing its data and user management. Whether the customer’s responsibility extends to performing security
configurations for applications, operating systems and networking will depend on the cloud service model
selected as shown in Figure 5.
Figure 5: The shared responsibility for security according to the cloud service model
Data and user management Data and user management Data and user management
CSP RESPONSIBILITIES
This shared responsibility for security can create confusion and lead to over-reliance on the CSP to mitigate
threats and prevent security incidents. It is essential that the cloud customer does not depend wholly
on the CSP to deploy the appropriate security measures, but clearly understands how responsibility for
security is shared with each CSP in order to identify and deploy the requisite security controls to protect the
cloud environment.
The key question is how the CSP’s controls and those implemented by the cloud customer fit together so that there
is no daylight between them. A common failing is a misunderstanding on the part of the customer about how
the CSP’s controls actually work and what security responsibilities fall to each party. This potential schism will be
addressed throughout the report, particularly in Section 6 which outlines the customer’s responsibilities for each
control topic.
The issue of shared responsibilities between the CSP and the cloud customer was explored during the ISF
solution development workshops. While there is general consensus among ISF Members that shared levels
of responsibility need to be clearly defined in order to deploy the right level of security controls, one ISF
Member highlighted that an overwhelming majority of CISOs and CIOs still struggle to understand this split of
responsibilities, suggesting unfamiliarity with the intricacies of the many cloud features.
“The shared responsibility model is well understood by security and cloud experts but
not by the decision makers – even CIOs don’t necessarily understand the difference
between IaaS and SaaS.” – ISF Member
Information Security Forum Using Cloud Services Securely: Harnessing core controls 15
1 2 3 4 5 6 7 8
Meeting regulatory requirements to protect sensitive data in the ISF Member Survey
cloud environment
An organisation using an on-premises IT data centre will know exactly where its critical and 74%
sensitive data resides and can exert full control over the movement of its data. This helps
considerably when implementing security controls, whereas in the cloud environment, data ...rated as high or very
high their challenge
moves in and out of an organisation’s perimeter more freely. This can obscure where critical in meeting regulatory
and sensitive data is located, and how it can be protected, which can hinder an organisation’s requirements when
ability to effectively enforce the requisite security controls across all of its cloud services in moving their data to the
cloud environment.
line with compliance requirements.
While it is the cloud customer’s responsibility to ensure the security of its data in the cloud
environment (e.g. by encrypting data and applying access restrictions), the customer’s
control over its data is intrinsically limited since the data is stored by an external party – the
CSP – in an off-site location, often in a different country. Moreover, the CSPs will often
leverage several data centres in geographically distinct locations to ensure the organisation’s
data is stored on more than one server for reasons of resilience. This creates additional
complexity in terms of managing data across borders, understanding where it is located at a
given moment in time, determining the applicable legal jurisdiction and ensuring compliance
with relevant laws and regulations – an obligation that rests fully with the cloud customer,
not the CSP.
“Physical storage locations are moving further away from the traditional
organisational perimeter and so are the controls.” – ISF Member
The ISF Approach is divided into three parts. The table below explains how organisations can leverage each
part to address the key concerns associated with cloud usage.
‒ Developing an effective governance framework for cloud security (see Section 5).
Identifying and maintaining the ‒ Harnessing the core cloud security controls (see Section 6).
appropriate security controls ‒ Deploying security products and services to support successful implementation of
the core cloud security controls (see Section 7).
‒ Ensuring the CSP adheres to relevant standards through close scrutiny of security
clauses in cloud service contracts and reviewing whether legal and regulatory
Meeting regulatory requirements
obligations are met as part of the organisation’s security assurance programme
to protect sensitive data in the (see Section 5).
cloud environment
‒ Implementing the core cloud security controls for data protection and access
management (see Section 6).
16 Using Cloud Services Securely: Harnessing core controls Information Security Forum
1 2 3 4 5 6 7 8
CLOUD SECURITY
GOVERNANCE
SECTION 5
GOVERNANCE
CORE CLOUD
SECURITY CONTROLS
IaaS SaaS
SECTION 6
CONTROLS
NETWORK SECURE
SECURITY CONFIGURATION
SECURITY
MONITORING
SECTION 7
PRODUCTS
CLOUD SECURITY
PRODUCTS AND SERVICES
Information Security Forum Using Cloud Services Securely: Harnessing core controls 17
1 2 3 4 5 6 7 8
Cloud computing has become a topic of interest for organisations' executive management,
particularly when moving to a cloud-first policy. While senior executives are becoming more
supportive of their organisation transitioning to the cloud, they remain concerned about
cloud security incidents and increased regulatory pressures. A well-designed cloud security
governance framework will provide reassurance and greater visibility that the optimal level
of security controls has been deployed to mitigate the risks associated with using cloud
services.
This section explains the six fundamental elements of cloud security governance that a steering group should
oversee as presented in Figure 7.
Figure 7: Six key elements of cloud security governance, overseen by a cloud security steering group
“Ensure the approach to cloud security is not piecemeal; build policy and governance first.”
– ISF Member
18 Using Cloud Services Securely: Harnessing core controls Information Security Forum
1 2 3 4 5 6 7 8
Some ISF Members do not establish a stand-alone steering group dedicated to the topic of cloud security, but
instead include this issue on the agenda of an existing steering group with a broader remit.
The cloud security steering group should meet regularly to perform the following functions:
‒ coordinate a structured and consistent approach to using cloud services securely (e.g. carrying out the six key
elements of cloud security governance as shown in Figure 7 on page 18)
‒ translate the cloud security strategy promulgated by executive management into actionable items for the
teams responsible for securing the use of cloud services (e.g. overseeing the deployment of a set of core
cloud security controls)
‒ report to executive management on all important cloud security matters (e.g. advising on any significant
deviations from cloud security policy – exception management)
‒ support cloud security decisions in a fast and effective manner (e.g. making investment decisions on cloud
security products and services).
A cloud-first strategy will precipitate a gradual increase of cloud services and should be supported by effective cloud
security governance that ensures the build-up of cloud services is achieved in a controlled and secure manner.
The relevant sections of the cloud security policy (e.g. sanctioned CSPs and approved
data types) should be published and communicated to all employees and external
individuals (e.g. consultants, contractors and employees of external parties) with access
to the organisation’s use of cloud services. The policy should be regularly reviewed and
updated to take account of changing circumstances, with any significant changes to be
approved by the cloud security steering group.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 19
1 2 3 4 5 6 7 8
Informed by these sources of information, the register of cloud services should ideally be maintained as a
stand-alone register and include the following details:
‒ Name of the CSP.
‒ Brief description of the individual cloud service, including the criticality of the business processes it supports.
‒ Main cloud features used (e.g. private or public cloud; IaaS, PaaS or SaaS; and type of cloud
management console).
‒ Scale of usage of the cloud service (e.g. average daily usage in terms of number of users accessing the service
and volume of data processed).
‒ Sensitivity of the data that can be handled within the cloud service as determined by the business owner
(e.g. confidential, internal or public).
‒ Roles and contact details of individuals responsible for supporting the cloud service within the:
• Organisation (e.g. business owners and individuals responsible for administering and securing the
cloud service)
• CSP (e.g. commercial and technical advisors).
Once created, the register of cloud services should be leveraged to ensure that all cloud services used by the
organisation are adequately protected. The register can also be referenced to help determine the appropriate
core cloud security controls and review their implementation status.
20 Using Cloud Services Securely: Harnessing core controls Information Security Forum
1 2 3 4 5 6 7 8
The six phases of Information Risk Assessment Methodology 2 (IRAM2) can be adapted to help perform an
information risk assessment of cloud services (e.g. when assessing the storage of confidential information in a
SaaS application), as shown in the table below.
B | Business Assess the potential business impact should A potential breach of sensitive information
impact the cloud service be compromised (e.g. data (e.g. personal data or intellectual property)
assessment breach, system downtime). would have a high business impact.
Establish and prioritise cloud threat events Adversarial and accidental cloud threat events
relevant to the environment being assessed are identified.
C | Threat profiling (e.g. exploit insecure interfaces and APIs;
misuse of cloud services and malfunction of See Appendix D for a full list of cloud-related
cloud services). threat events.
Assess the strength of core cloud security Control weaknesses detected in administrator
controls deployed by the cloud customer. access configured by the cloud customer.
D | Vulnerability
assessment Review the CSP’s control environment Configuration issues in the level of access
(e.g. by leveraging the SSE tool or the assigned to users, resulting in excessive
Security Healthcheck). access permissions.
The information risk assessment of cloud services should be performed on an annual basis and significant risks
(e.g. those rated as high or moderate) should be added to a risk register that is regularly reviewed by the cloud
security steering group.
Examples of the scope for an information risk assessment related to cloud services include:
‒ a business-critical application running in a SaaS implementation such as a payroll system
‒ an IaaS used by the organisation for developing customer-based applications
‒ sensitive data held in various cloud services and regularly used by the organisation.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 21
1 2 3 4 5 6 7 8
For more information on how to engage effectively with CSPs in terms of contract negotiation, including the
level of security requirements that should be asked of the provider, see the ISF report Supply Chain Assurance
Framework: Contracting in confidence.
The 2018 Standard provides guidance on cloud service contracts in Topic SC2.2, specifying some of the key
requirements that should be embedded within the security clauses. While every cloud service contract will
differ, at a minimum it should require the CSP to:
‒ protect the organisation’s information (e.g. restrict the sharing of information with other organisations using
the same CSP)
‒ disclose any significant security event that may affect the organisation’s reputation or disrupt business
operations (e.g. potential security incident, data breach or system downtime)
‒ adhere to relevant laws and regulations (e.g. process and store data in approved locations, inform the
customer of any cross-border arrangements)
‒ provide advance notification of any major changes (e.g. service upgrade, scheduled downtime or change of
underlying technologies)
‒ allow the organisation to recover information at termination of the contract (e.g. stipulate the format,
mechanism and content of information to be returned when the service is terminated)
‒ evidence safe destruction of the organisation’s information when required (e.g. define how the information
will be removed from the CSP’s hardware)
‒ notify the customer of any significant changes to the cloud service, including the use of sub-contractors (e.g.
use of other vendors to host the data centre)
‒ give the right to audit (e.g. allow the organisation to audit the CSP’s internal policies and controls that relate
to the services within scope of the contract)
‒ support the investigation of, and response to cloud security incidents (e.g. e-discovery requests or
forensic investigations).
When reviewing cloud contracts to ensure they meet the business and security requirements of the
organisation, focus should be placed on liability clauses that cover the implications of information security
incidents. These clauses represent one of the most important aspects of contracts to be agreed upon when
engaging with a CSP.
ISF Members have expressed some concerns regarding their CSP’s ability to satisfy their security obligations, as
specified within the contract, due to cost, complexity, time and/or technical capability. When there is a clear
deadlock such that the CSP refuses to meet the specified security requirement, the only alternative is to terminate
the contract and move the cloud data and processes to another CSP or back to an on-premises IT solution.
22 Using Cloud Services Securely: Harnessing core controls Information Security Forum
1 2 3 4 5 6 7 8
Security assurance
To gain assurance over the secure use of their cloud services, organisations should conduct security assurance
activities to assess the effectiveness of security controls implemented across their cloud environment (see
Section 6 for guidance on core cloud security controls).
Organisations should also perform a supplier evaluation of the CSP’s implementation of backend controls as
part of regular supply chain assurance activities. Testing the effectiveness of the CSP’s controls can sometimes
be achieved through regular audits of the CSP but this is often impractical and may not be authorised by the
CSP. Instead, the effectiveness of controls is often determined with reference to relevant documentation that
CSPs will release on request, including reports on their security posture and certifications (see Appendix B for
some of the more prevalent certifications pertaining to cloud computing).
As part of security assurance activities over a CSP, it is important to review their provision for internal support
operations. For instance, several ISF Members reported that although the CSPs provide accurate information
about their data centre location, information about their operational staff was not always easy to obtain. For
example, a cloud infrastructure could be located in Europe, whereas system operators of the CSP might be based
in a separate location (e.g. North America or East Asia). Such a scenario would add complexities to the data
processing location requirements and the cloud customer would need to add specific clauses in the contract that
clearly stipulate the required geographical location of the CSP’s support operators.
A key part of security assurance is to demonstrate compliance with legal and regulatory obligations. In the
context of using cloud services, this extends to ensuring relevant requirements can be met by an organisation’s
chosen CSPs. With increased regulation of data protection and privacy, organisations now need to take into
account many different laws and regulations when performing security assurance, ranging from generally
applicable laws, such as the EU General Data Protection Regulation (GDPR), to more industry-specific standards,
such as the Payment Card Industry Data Security Standard (PCI-DSS). It may also be necessary to consider
additional compliance requirements mandated by other sources, such as the US Federal Risk and Authorisation
Management Programme (FedRamp), which aims to achieve a consistent approach to cloud security
government-wide.
These activities will typically be realised using the various cloud management consoles and cloud security
products and services. Relevant individuals will need to be trained how to use each cloud management console
correctly and securely.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 23
1 2 3 4 5 6 7 8
As cloud innovation has progressed, it has become evident that successfully managing security in the cloud
environment requires specialist skills and expertise that span computer programming, database management
and the fundamentals of information security. Individuals are expected to have knowledge about a wide range
of topics, including the multi-cloud environment, virtualisation concepts, serverless architecture and security
assurance.
Those who specialise in cloud security or hold relevant certifications are in high demand, creating an acute
cloud skills gap such that many organisations lack the breadth of expertise desired. Nevertheless, as the
following section on the core cloud security controls demonstrates, good practice for securing the use of
cloud services is derived and often akin to security arrangements that apply on-premises. Organisations can
therefore take some comfort that existing skills and knowledge are transferable to managing security in the
cloud environment.
24 Using Cloud Services Securely: Harnessing core controls Information Security Forum
1 2 3 4 5 6 7 8
6 CORE CLOUD
SECURITY CONTROLS
As part of the ISF Approach, a set of 45 core security controls has been ISF Member Survey
developed to address ISF Member concerns about weak or insufficient
cloud security controls, which in turn can have detrimental implications for 58%
business operations. These controls are based on information security good
...have identified
practice and are tailored specifically to help organisations operate securely creating an effective
in a heterogeneous, multi-cloud environment. cloud security control
framework as their
top priority.
This section provides an overview of the 45 security controls, offering practical guidance
on how an organisation – as the cloud customer – can improve its security posture in the
cloud environment. These core controls do not encompass the full spectrum of all security
arrangements relevant to the cloud environment, but by focusing on these controls, an
organisation will create a solid foundation that will stand it in good stead for the long-
term security of its cloud services. The core cloud security controls are grouped into five
overarching control areas, each of which is split into three topics as shown in Figure 8.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 25
1 2 3 4 5 6 7 8
A | NETWORK SECURITY 1 2 3 4 5 6 7 8
the layout
HTTPS, virtual private in Figure
networks 9. area networks (WANs) are connectivity approaches that can
How organisations connect to their cloud services is an important decision and vital to business continuity.
(VPNs) and wide
be used on their own or together. They are capable of enhancing an organisation’s ability to access the cloud
environment securely by encrypting data in transit and restricting network access.
OBJECTIVE Objective
To prevent unauthorised connections and protect data in transit.
WAN
Purpose of applying the security controls within the control topic.
BENEFITS
‒ Provides appropriate levels of protection over data connections to the cloud environment.
VPN strong availability approaches for connecting to a cloud environment when using
‒ Delivers
Benefits
multiple approaches. Reasons for implementing the security controls.
‒ Restricts which IP addresses can connect to the cloud environment and what ports can be used.
HTTPS
‒ Guarantees the bandwidth connection to a cloud environment when utilising WAN.
77%
SaaS: the cloud customer needs to enable HTTPS for connections to the cloud. There will often be a need
90%
to liaise with the CSP to implement the SSL certificate. Smaller SaaS providers may not provide the option66%
In the
forISF
VPNMember Survey...
or WAN connections, but these should be considered if they are available.
...using PaaS have secured
...using IaaS have secured their connection to the cloud ...using SaaS have secured
their connection to the via VPN or WAN. their connection to the cloud
cloud via VPN or WAN. via VPN or WAN.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 29
Many ISF Member organisations have chosen to implement more than one control for the same cloud connections
– using only one could create a single point of failure, which could lock an organisation out of their cloud services.
VPN is a slightly more complex approach than HTTPS. It requires a greater effort to configure than HTTPS and
relies on the configuration changes being made by the organisation and the CSP in parallel.
26 Using Cloud Services Securely: Harnessing core controls Information Security Forum
1 2 3 4 5 6 7 8
By following the ISF Approach, an organisation will be well-positioned to protect its data, applications,
systems and infrastructure hosted within cloud services. As highlighted by the SANS 2019 Cloud Security
Survey (see Figure 10),4 organisations continue to experience a variety of security incidents within their cloud
environments. Implementing the core cloud security controls will help ISF Members to address some of
the vulnerabilities that lead to these security incidents and thereby support the mitigation of risks that are
inherent to using cloud services.
Figure 10: Causes of cloud-related security incidents identified by the SANS 2019 Cloud Security Survey
Shadow IT 29%
0 10 20 30 40 50
“With cloud computing, a lot of the traditional security principles still apply. How you
implement and maintain them changes significantly.” – ISF Member
4 D. Shackleford, “SANS 2109 Cloud Security Survey”, SANS, 30 April 2019, https://www.sans.org/reading-room/whitepapers/analyst/membership/38940
Information Security Forum Using Cloud Services Securely: Harnessing core controls 27
1 2 3 4 5 6 7 8
A | NETWORK SECURITY
In order to support the business effectively, many different devices need to securely
connect to a range of cloud services. Network security involves deploying secure network
connections, providing the required level of network segmentation and securely configuring
the right blend of firewalls to secure the cloud environment.
Most network security controls deployed on-premises should be extended to the cloud environment. Secure
connections can be made through a gateway using HTTPS, VPN and/or WAN, depending on requirements. To
enable critical components to be isolated from potential attack, the network should be segmented using virtual
local area networks (VLANs) and/or software-defined networks (SDNs). A variety of different firewalls should
also be deployed, restricting network traffic to and from cloud services.
The core network security controls are presented in the table below with their level of applicability to each of
the cloud service models.
A | NETWORK SECURITY
IaaS PaaS SaaS
28 Using Cloud Services Securely: Harnessing core controls Information Security Forum
A | NETWORK SECURITY 1 2 3 4 5 6 7 8
WAN
VPN
HTTPS
OBJECTIVE
To prevent unauthorised connections and protect data in transit.
BENEFITS
‒ Provides appropriate levels of protection over data connections to the cloud environment.
‒ Delivers strong availability approaches for connecting to a cloud environment when using
multiple approaches.
‒ Restricts which IP addresses can connect to the cloud environment and what ports can be used.
‒ Guarantees the bandwidth connection to a cloud environment when utilising WAN.
SaaS: the cloud customer needs to enable HTTPS for connections to the cloud. There will often be a need
to liaise with the CSP to implement the SSL certificate. Smaller SaaS providers may not provide the option
for VPN or WAN connections, but these should be considered if they are available.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 29
1 2 3 4 5 6 7 8 A | NETWORK SECURITY
CONTROL IMPLEMENTATION
HTTPS, VPN and WAN all help to secure communications to an organisation’s cloud services, but provide
differing levels of security. HTTPS is typically used as the default method with WAN connection being
the most secure – albeit more expensive – approach. As part of determining the most suitable approach
to cloud connectivity, the cost of the solution should be weighed against an organisation’s business and
security requirements.
77%
90% 66%
In the ISF Member Survey...
...using PaaS have secured
...using IaaS have secured their connection to the cloud ...using SaaS have secured
their connection to the via VPN or WAN. their connection to the cloud
cloud via VPN or WAN. via VPN or WAN.
Many ISF Member organisations have chosen to implement more than one control for the same cloud connections
– using only one could create a single point of failure, which could lock an organisation out of their cloud services.
HTTP should never be used to connect to a cloud service as the protocol does not contain any security measures
to protect data connections to the cloud.
VPN is a slightly more complex approach than HTTPS. It requires a greater effort to configure than HTTPS and
relies on the configuration changes being made by the organisation and the CSP in parallel.
A WAN solution is potentially the most secure of the three approaches, with a dedicated bandwidth direct to
an organisation’s cloud environment. It is similar to multiprotocol label switching (MPLS) in that it is a virtual
private network not accessible via the internet. However, it is also the most complex to implement since both
the customer and CSP will require additional infrastructure to establish a dedicated network connection.
30 Using Cloud Services Securely: Harnessing core controls Information Security Forum
A | NETWORK SECURITY 1 2 3 4 5 6 7 8
Information Security Forum Using Cloud Services Securely: Harnessing core controls 31
1 2 3 4 5 6 7 8 A | NETWORK SECURITY
IaaS
PaaS
PaaS: the cloud customer will sometimes have access to the virtual networking layer, allowing the cloud
customer to configure a level of network segmentation. VLANs would rarely be used within a PaaS set-up
as this level of access normally remains with the CSP.
SaaS: the cloud customer is never responsible for network segmentation. This is usually managed by
the CSP.
32 Using Cloud Services Securely: Harnessing core controls Information Security Forum
A | NETWORK SECURITY 1 2 3 4 5 6 7 8
CONTROL IMPLEMENTATION
Network segmentation is reasonably common within on-premises infrastructure even at a basic level, with
non-production, production and DMZ networks. The security controls below allow an organisation to make
their segmentation as simple or as complex as befits their requirements for the cloud environment.
VLANs are not as widely used within the cloud environment in comparison to internal networks, and are generally
only implemented for IaaS.
SDN reduces the complexity of statically defined networks by separating the network management functions
from the underlying infrastructure. This helps to speed deployment, automate many network functions and
simplify deployment of network resources. This in turn eases the administrative effort usually associated with
setting up and maintaining both the security and quality of service expected of networking. Implementing
SDNs should therefore reduce the number of mistakes that are otherwise made in manual configuration so
that fewer network vulnerabilities are introduced into the cloud environment.
SDN Architecture
SDN architecture is based on a layered approach comprised of:
‒ an application layer, which can host load balancers, firewalls, web application firewalls (WAFs) and
business applications
‒ a control layer, which hosts the SDN controller and network services
‒ an infrastructure layer, which hosts the virtual switches.
Traffic between these layers is controlled by APIs.
A standard firewall can manage and monitor all network protocols and offers more granular control than using
a WAF but will take more effort to configure. By comparison, a WAF can only deal with web traffic protocols
although it does bring the added benefit of being able to block web application attacks, such as an SQL injection.
Network configuration should be regularly reviewed as changes (which can be made easily and at any time) can
affect the overall security of the cloud environment. Peer reviews of network configuration are recommended
where possible to ensure that mistakes and vulnerabilities do not start to appear within the network code or
configuration settings.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 33
1 2 3 4 5 6 7 8 A | NETWORK SECURITY
34 Using Cloud Services Securely: Harnessing core controls Information Security Forum
A | NETWORK SECURITY 1 2 3 4 5 6 7 8
FW FW FW
EXTERNAL
INTERNAL FW FW FW
System
admin
OBJECTIVE
To prevent unauthorised or malicious traffic from gaining access to or leaving the cloud environment.
BENEFITS
‒ Restricts network traffic flowing in and out of the cloud environment.
‒ Provides visibility of network traffic within the cloud environment.
‒ Prevents anomalous traffic from reaching cloud applications, servers and infrastructure.
PaaS: the cloud customer may be able to enable their own virtual firewalls and control access themselves;
the customer can use a management interface for their firewalling instance with access granted by the
CSP or provide details to the CSP on what access is required.
SaaS: the cloud customer can typically only specify details of network access requirements to the CSP.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 35
1 2 3 4 5 6 7 8 A | NETWORK SECURITY
CONTROL IMPLEMENTATION
Cloud-based firewall technology works in a similar way to typical on-premises architecture. The main difference
is that cloud-based firewalls are deployed as software appliances and do not run on traditional hardware
devices. Organisations may choose to use the firewalls offered by the CSP or purchase their preferred firewall
from a security vendor.
For organisations using only one CSP, leveraging the CSP’s inbuilt firewalls can make it easier
to configure and manage rules across the cloud environment.
CSP firewalls can have limited functionality compared to a full virtual firewall, therefore an organisation should
understand the different firewall offerings and their technical limitations before deciding which approach best
aligns with their cloud security policy and architectural design.
Compared to other firewall approaches, using a WAF in the cloud environment can provide the following
additional advantages:
‒ inspects web traffic and data flows
‒ stops malicious requests (e.g. SQL injection or cross-site scripting) reaching an application
‒ improves security event logging, providing an increased level of detail to assist a security operation centre
(SOC) in detecting potential threats
‒ supports network segmentation if using multiple WAF installations.
Responsibility for determining what network traffic is allowed to flow in and across the cloud environment rests
with the cloud customer, not the CSP.
36 Using Cloud Services Securely: Harnessing core controls Information Security Forum
A | NETWORK SECURITY 1 2 3 4 5 6 7 8
The more complex the firewall configuration, the harder the management and monitoring of firewalls becomes.
‒
Information Security Forum Using Cloud Services Securely: Harnessing core controls 37
1 2 3 4 5 6 7 8
B | ACCESS MANAGEMENT
Individuals should be able to access a wide range of cloud services in a fast, reliable and
secure manner, with their differing requirements and roles also taken into account. Access
management involves defining and managing the right level of access and authorisation,
supported by a secure sign-on process and strong controls over system administrators.
Organisations need to deploy effective and consistent user authentication and access control mechanisms
across their cloud environment. This can be achieved using an identity and access management system such
as identity as a service (IDaaS) and augmenting it with secure sign-on processes such as single sign-on (SSO)
and multi-factor authentication (MFA). Given that administrators have powerful privileges allowing them to
configure, create and remove important cloud devices, administrator access should be managed tightly. The
core access management controls are presented in the table below with their level of applicability to each of
the cloud service models.
Segregation of duties
An important area within access management is segregation of duties. Although not specifically covered within this
report, organisations should not ignore it. With a move to the cloud, an organisation often faces the challenge of a
dramatic increase in the number of administrative accounts.
Administrators are at a greater risk of ‘toxic combinations’ (e.g. create a development server, install an application
and then promote to a live server without the input of anyone else), so it is vital that the ‘least privilege’ principle
is applied and the effect of the level of access is fully understood. The cloud customer needs to be confident that
they understand what each user (and especially administrators) can do within the cloud environment, ensuring that
there is no conflict that could allow them to perform multiple tasks that could assist in creating vulnerabilities or
causing a breach.
38 Using Cloud Services Securely: Harnessing core controls Information Security Forum
B | ACCESS MANAGEMENT 1 2 3 4 5 6 7 8
INTERNAL EXTERNAL
Business
partners
Business
users
IAM
System
developers
IaaS PaaS SaaS
External
customers
Information Security Forum Using Cloud Services Securely: Harnessing core controls 39
1 2 3 4 5 6 7 8 B | ACCESS MANAGEMENT
CONTROL IMPLEMENTATION
The simplest approach to accessing a cloud service is to rely on the CSP’s own authentication mechanisms,
which means the CSP holds the users’ credentials. While this approach can be practical for an organisation
using a single CSP and with only a small number of users accessing cloud services, it is not recommended
for those organisations with a multi-cloud environment, since it entails a duplication of effort and
account credentials.
IAM solutions use one or more identity stores (e.g. Active Directory) to maintain a central repository of users
that needs to be kept up-to-date and consistent with the organisation’s access control policies (e.g. password
strength, length and re-use). For this reason, organisations should use federated access when implementing
IAM for cloud services.
This involves creating a trust relationship between the on-premises identity store and the CSP identity store
to enable synchronisation of user identities. This allows existing identities (users, groups and roles) to access
cloud devices when an organisation allocates the relevant permissions to an identity.
The two most common options when creating a trust relationship are:
‒ A one-way trust: identities are shared with the cloud identity service whenever a user attempts to authenticate,
giving the organisation more control in terms of sharing identities. This is a ‘read-only’ view given by the
organisation to the cloud identity service. In some instances, a copy of the identity database is provided to
the cloud identity service and changes to the originating system are pushed to the cloud service copy as they
are made.
‒ A two-way trust: identities are shared between the organisation and the cloud identity service, which means
changes can be made via either system and then synchronised to the other service, giving more flexibility but
less control over identities.
Whenever a user attempts to login – whether to an on-premises system or to a cloud service – it will query the
cloud-based identity store. All user access control is managed entirely in the cloud.
40 Using Cloud Services Securely: Harnessing core controls Information Security Forum
B | ACCESS MANAGEMENT 1 2 3 4 5 6 7 8
Information Security Forum Using Cloud Services Securely: Harnessing core controls 41
1 2 3 4 5 6 7 8 B | ACCESS MANAGEMENT
INTERNAL EXTERNAL
Business
partners
MFA
Business
users
SSO
IAM
System
developers IaaS PaaS SaaS
External
customers
OBJECTIVE
To provide access to cloud services in a secure, fast and efficient manner.
BENEFITS
‒ Enables authorised users to access multiple cloud services and applications via single sign-on, limiting the
number of passwords required.
‒ Reduces the administrative burden of creating multiple accounts across different systems.
‒ Limits the potential for making errors in the provisioning process.
‒ Helps to prevent an attacker compromising a user account to gain access to corporate information and systems.
PaaS: the cloud customer is responsible for enhancing the access control systems offered by the CSP,
although there is often a requirement to liaise with the CSP to ensure the customer’s tools integrate
effectively with those of the CSP.
SaaS: the cloud customer is responsible for applying enhancements to secure the access control systems
but will need to work closely with the CSP to implement the CSP tools on offer and integrate them with the
customer’s existing solutions.
42 Using Cloud Services Securely: Harnessing core controls Information Security Forum
B | ACCESS MANAGEMENT 1 2 3 4 5 6 7 8
CONTROL IMPLEMENTATION
Identity access management solutions used for cloud services provide a good foundation for managing the
sign-on process but have their limitations. To improve the user’s experience and offer a more secure sign-
on process, these basic access control methods can be built on by using single sign-on (SSO) and a strong
authentication method such as multi-factor authentication (MFA). SSO and MFA complement each other as a
paired implementation and should be adopted in tandem.
MFA should be applied whenever possible and always when it relates to privileged access
(e.g. a cloud administrator) or access to confidential data within the cloud environment.
Many CSPs offer a range of sophisticated access control mechanisms, including biometrics
and cryptographic tokens, which can be used as part of MFA to create a resilient and secure
sign-on process.
A geolocation-based factor can also be added as a form of authentication to take into account the physical
location of the user. An organisation may want to restrict certain locations from being able to authenticate or
block an attempted logon from an unrealistic location given where the user last logged off. This should only be
treated as a third or fourth factor authentication.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 43
1 2 3 4 5 6 7 8 B | ACCESS MANAGEMENT
44 Using Cloud Services Securely: Harnessing core controls Information Security Forum
B | ACCESS MANAGEMENT 1 2 3 4 5 6 7 8
Cloud
management System
console admin
System
System admin
admin IaaS PaaS SaaS
OBJECTIVE
To provide authorised cloud service administrators with access privileges, which are sufficient to enable them
to perform their duties but do not permit them to exceed their authority.
BENEFITS
‒ Detects unusual or unauthorised activity from an administrative account by monitoring and reviewing usage
of the account via alerts and logs.
‒ Reduces the chances of an attacker being able to use and leverage an administrator’s privileged levels of access.
‒ Makes administrators aware of their responsibilities, the level of access they have and the consequences of
poor security hygiene.
SaaS: the cloud customer will need to ensure that any administrative access is tightly controlled as the
administrator can often launch and terminate services, manage user access and perform application
configuration.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 45
1 2 3 4 5 6 7 8 B | ACCESS MANAGEMENT
CONTROL IMPLEMENTATION
Privileged accounts that administer and manage cloud services are vital for these services to operate
effectively but also have access to many important parts of the cloud environment. It is therefore crucial to
properly protect administrative access, which can be achieved by adopting a stringent process for creating and
overseeing administrator accounts. For instance, before a user can be added as an administrator, a justification
should be submitted and approval granted by designated individuals. A register of cloud service administrator
accounts should also be maintained.
Other recommended practices for securing administrative access include restricting the use of administrator
accounts to narrowly defined circumstances and requiring all administrators to sign onto their accounts using
MFA and an alternative authentication method. The use of administrator accounts for cloud services should be
reviewed regularly (e.g. weekly), as well as when suspicious or malicious security events occur.
With the expanding number of cloud services that organisations are using, each with their own, unique
management console, more administrative functions are needed. Additional attention is therefore required to
control these cloud administrator accounts since it increases the footprint that an attacker can attempt to subvert
and utilise.
The Root account typically can perform any activity which involves billing, such as the start or termination of a
cloud service, as well as being the primary account for system configuration and user access control. The exact list
of actions that such an account can perform should be documented and approved by the business stakeholders
responsible for each cloud service.
Each cloud administrator should assign several of the lesser administrative responsibilities to different roles
and administrators, applying the ‘least privilege’ principle. They should only be given the access that their job
role requires and nothing more (also referred to as role-based access control).
Segregation of duties cannot always be enforced in a cloud environment. System administrators have different
levels of responsibilities based upon their areas of expertise, such as infrastructure, networking and application
development. In the cloud management console, all activities are grouped within the same entry point and it is not
always possible to find staff with these combined skills especially when dealing with multiple cloud management
consoles.
It is particularly important that there are regular checks on this inventory, which should be performed at least
monthly. The account approver should check and verify that the access is correct, altering or revoking access as
necessary (e.g. if a staff member assumes an administrator’s role or leaves the organisation).
46 Using Cloud Services Securely: Harnessing core controls Information Security Forum
B | ACCESS MANAGEMENT 1 2 3 4 5 6 7 8
A standard cloud user may sometimes require administrative privileges to perform a specific task. Temporary access
should be granted on an ‘as required’ basis and removed once the task has been completed. These instances need to
be approved and recorded as a temporary exemption with the same information detailed above.
As an example, a PAM tool can grant a user access to administrative privileges without the user having
that access linked to their standard account and without a need to know the password for that access.
Administrative users are assigned roles and when they require use of that privilege, it is assigned to their
account for the duration of the task and then removed (sometime referred to as ‘just-in-time’ access).
Information Security Forum Using Cloud Services Securely: Harnessing core controls 47
1 2 3 4 5 6 7 8
C | DATA PROTECTION
Organisations store, process and transmit mission-critical and sensitive data in the cloud
environment. It is therefore essential to identify the types of data traversing the cloud
environment that require protection at each stage of the information lifecycle in accordance
with security requirements.
To protect data within the cloud environment, an organisation should determine what types of data will be
processed, in which geographic location it will be located (during each stage of the information lifecycle) and
what level of protection it will require. Data needs to be encrypted in the cloud, supported by robust key
management services, while sensitive data should be prevented from unauthorised disclosure by enforcing a
data leakage prevention (DLP) programme for cloud services. The core data protection controls are presented
in the table below with their level of applicability to each of the cloud service models.
48 Using Cloud Services Securely: Harnessing core controls Information Security Forum
C | DATA PROTECTION 1 2 3 4 5 6 7 8
IaaS
SEC
RET
PaaS
Backups
SaaS
OBJECTIVE
To manage and protect data that is stored, processed and transmitted to, from and within the cloud environment.
BENEFITS
‒ Instils confidence for the business that they have control over their data in the cloud environment.
‒ Aids the understanding of what data types are residing in the cloud environment.
‒ Reduces the risk of fines for storing data in inappropriate locations.
‒ Provides assurance to regulators that data is understood and adequately protected.
69% 67%
In the ISF 90% 68%
Member Survey...
...handle payment ...hold strategic
...have PII data in their card data. ...store intellectual business plans.
cloud environment. property.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 49
1 2 3 4 5 6 7 8 C | DATA PROTECTION
CONTROL IMPLEMENTATION
Managing data is as important within the cloud environment as it is with on-premises data. While the cloud
environment does offer some additional benefits such as flexibility in terms of data location, standard
approaches such as classifying and restoring data still need to be addressed. All of the following controls should
therefore be considered and implemented where possible.
Many CSPs offer the ability to select where to store an organisation’s data (through the cloud contract or in
some cases, via the cloud management console). The data can be stored in multiple locations in different
geographic regions to satisfy an organisation’s business or security requirement. Whether selecting one or
more cloud storage locations, organisations need to take into account relevant data protection laws and
regulations to ensure compliance requirements are met.
Keeping a duplicate copy of cloud-stored data in a secondary location will help satisfy legal and regulatory
requirements as well as support business continuity plans. If an organisation’s systems fail, connectivity to the
CSP is disrupted or there is an outage with the CSP, the organisation can failover to the secondary location and
continue to operate.
Some CSPs are also offering tiered backup solutions with cheaper storage costs for longer retrieval periods
when restoring backed up data. While replicating data between data centres of the same CSP provides a form
of online backup, organisations will gain more assurance if backup arrangements do not rely on a single CSP as
it will enable data to still be restored in unforeseen circumstances (e.g. if a CSP goes out of business).
In many instances, data can be replicated to a secondary location such that the cloud servers and applications sit
dormant until required (e.g. powered down virtual devices), so only the storage costs need to be paid. As well as
saving money, this reduces the IT footprint, giving an attacker less devices to discover and potentially attack.
Labelling data will help with enforcing an effective data retention policy, which should be applied to control the
amount of data stored in the cloud environment. By requiring the removal of data from cloud services after
a certain period, there is less data available for an attacker to access or exfiltrate. This has the added non-
security benefit of reducing cloud storage costs since data is not stored indefinitely.
50 Using Cloud Services Securely: Harnessing core controls Information Security Forum
C | DATA PROTECTION 1 2 3 4 5 6 7 8
Information Security Forum Using Cloud Services Securely: Harnessing core controls 51
1 2 3 4 5 6 7 8 C | DATA PROTECTION
Cloud
customer Cloud
customer CSP
IaaS
PaaS
SaaS
SaaS: the cloud customer will seldom have control over what data is encrypted and how encryption is
performed by the CSP, but should still review and understand what encryption options are available and
whether encryption is applied to their data.
An important element to encryption is how best to manage the encryption and decryption keys. The CSP can often
assist in key management but this decision will be influenced by the organisation’s circumstances, noting that:
‒ Loss of keys or poor key management will put sensitive data at risk.
‒ Any access to the encryption keys should also be restricted to system administrators using MFA (see control B.2.2).
52 Using Cloud Services Securely: Harnessing core controls Information Security Forum
C | DATA PROTECTION 1 2 3 4 5 6 7 8
CONTROL IMPLEMENTATION
Approaches to encryption will vary depending on the cloud service model, the type of CSP and cloud devices in
use, but implementation typically covers encryption at rest, encryption in transit and key management. Some
CSPs offer encryption of data by default and offer more detailed implementation approaches which provide an
organisation with greater choice and features.
Encryption of data is vital. It can be performed in a variety of ways for both data at rest and in transit (to or from
cloud services) either at the:
‒ server-side (in the cloud), where the cloud service encrypts client data before saving it on disks in their data
centres and then decrypts it when the client downloads it, managing the whole process
‒ client-side (on-premises), where data is encrypted on-premises and uploaded to the cloud service, so the client
manages the encryption process, keys, and related tools.
This approach would be enough to satisfy most regulatory requirements as it is common for regulations to
stipulate that encryption keys must be managed by the organisation that owns the data.
This is sometimes the only approach available to organisations in heavily regulated industries due to regulatory
requirements for organisations to generate, manage and store their own encryption keys.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 53
1 2 3 4 5 6 7 8 C | DATA PROTECTION
Many organisations see encryption as a way of meeting certain regulatory requirements. Although encryption
will assist with compliance, it is not a replacement for a comprehensive security portfolio of tools, processes and
procedures designed to satisfy legal and regulatory obligations.
.
54 Using Cloud Services Securely: Harnessing core controls Information Security Forum
C | DATA PROTECTION 1 2 3 4 5 6 7 8
IaaS
PaaS
SaaS
IaaS and PaaS: the cloud customer is responsible for protecting their data and should
have the access necessary to deploy a DLP tool. The CSP will have little involvement
with DLP implementation.
SaaS: the cloud customer is responsible for protecting their data but with a SaaS
application may have limited options regarding how they can manage and control
that data through a DLP programme. The CSP may have options for DLP but the cloud
customer will need to liaise with them to find the best solution.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 55
1 2 3 4 5 6 7 8 C | DATA PROTECTION
CONTROL IMPLEMENTATION
An organisation may already have a DLP programme or at least a DLP tool, in which case, the same technical
DLP policies used to monitor and control the flow of sensitive data can be applied to the cloud environment.
Whether it will be necessary to recreate these policies will depend on the implementation approach selected.
An organisation without a DLP programme will need to first understand the different types of sensitive data
it handles and in collaboration with business stakeholders, prioritise what data requires protection before
implementing DLP for cloud services.
For guidance on how to establish and optimise a DLP deployment, see the ISF briefing paper, Data Leakage
Prevention, which outlines the ten key attributes of a successful DLP programme.
The most common method of extending an on-premises DLP programme to cloud services is to use the
configuration options available from a Cloud Access Security Broker (CASB) (see Section 7 for more details). The
advantage of using a CASB is that an organisation can create and manage DLP policies across all data leakage
channels, including cloud services, from the same central DLP console already used on-premises.
By implementing this solution, the initial installation of the tool will be relatively straightforward, but DLP
policies will need to be created within the new tool. This can be labour intensive and lead to errors or
omissions, particularly when recreating existing policies.
The CASB can integrate with many cloud technologies (e.g. proxies, APIs and firewalls) to monitor multiple egress
methods through which data could potentially leave the cloud environment. The CASB DLP solution will not
provide coverage of data leaking through on-premises systems without connecting to an on-premises DLP tool.
56 Using Cloud Services Securely: Harnessing core controls Information Security Forum
C | DATA PROTECTION 1 2 3 4 5 6 7 8
It is important to understand how the organisation deals with violations of DLP policy, whether it is to log, notify or
block. This requires engagement with the business – if incorrect actions are applied in response to violations, it can
create extra workloads for analysts to review or stop legitimate data transfers from occurring.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 57
1 2 3 4 5 6 7 8
D | SECURE CONFIGURATION
Cloud devices are the core of the cloud environment and need to be protected effectively,
especially since they are often targeted by adversarial threats. Organisations can configure
cloud devices securely by using standardisation, Application Programming Interfaces (APIs)
and virtualisation technologies.
When configuring the cloud environment, organisations should implement up-to-date software, patches and
secure code, which can be achieved by using standard builds and adopting an infrastructure as code (IaC)
approach. As organisations adopt APIs, which can be an effective way of extending the functionality of cloud
services, an API management tool or API gateway should also be deployed to manage the security of APIs.
Whilst the underlying cloud infrastructure is virtualised by default, the organisation can add its own layers of
virtualisation, supported by virtual machines (VMs) or containers to isolate critical applications.
The core secure configuration controls are presented in the table below with their level of applicability to each
of the cloud service models.
D | SECURE CONFIGURATION
IaaS PaaS SaaS
58 Using Cloud Services Securely: Harnessing core controls Information Security Forum
D | SECURE CONFIGURATION 1 2 3 4 5 6 7 8
System
developer/admin
IaaS
FW
PaaS
FW FW FW
OBJECTIVE
To deploy cloud devices in a consistent manner, including security tools and controls, which in turn will assist in
reducing vulnerabilities.
BENEFITS
‒ Helps developers to consistently build secure environments by providing guidance on the technical
infrastructure that should underpin an application developed in the cloud.
‒ Reduces the number of technical security vulnerabilities introduced into the cloud environment.
‒ Reduces errors that can contribute to vulnerabilities in the cloud environment by simplifying the build process.
‒ Aids quicker deployments that include more stringent security measures.
PaaS: the cloud customer will in some instances be able to use a standard image to build some devices or
services, but may have to rely on other methods to standardise their build process depending on the type
of PaaS chosen, and the access granted by the CSP.
SaaS: the cloud customer is not responsible for building devices or services when utilising a SaaS
application; this is all within the remit of the CSP.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 59
1 2 3 4 5 6 7 8 D | SECURE CONFIGURATION
CONTROL IMPLEMENTATION
Implementing a standard build approach requires an organisation to have in place clearly defined processes,
which provide guidance to ensure the build of cloud devices remains consistent. It is important for an
organisation to adhere to standard builds – deviation can cause unexpected vulnerabilities to be introduced
into the cloud environment that may go undiscovered.
The manual build process is labour-intensive and leaves significant scope for human error if the standard
process, including relevant checks, is not followed. However, the advantage of the manual process is that
it does not replicate errors in the same way as automated builds, where any error in the image or script is
compounded and can affect multiple cloud devices.
Organisations whose policy does not allow automation will favour this approach as the human element is still the
key part of the build process.
For cloud devices created by writing code, relevant patches and agents (e.g. malware protection or DLP) should
be installed automatically as part of the scripting process. Testing of each device needs to be undertaken to
ensure it performs as expected and there are no known vulnerabilities that could be exploited. Once the device
is in use, it should be reviewed following any changes in the cloud environment to check that vulnerabilities
have not been introduced.
Sometimes code will require username and password combinations, which should be hashed (or encrypted
in some form) at a minimum to prevent exploitation should a threat gain access to the code. One method for
protecting the passwords is a secrets manager or key vault.
To create an approved ‘gold standard’ template, an organisation should perform a manual build of each cloud
device and then configure each device to:
‒ the appropriate security levels (e.g. rename all administrator accounts and change default passwords)
‒ adhere to relevant standards and regulatory requirements.
Internal testing, including user acceptance testing (UAT), should be performed to ensure that the device
operates as required. The resulting ‘gold standard’ image can also be used for virtualisation (see control topic
D.3). Each image should be updated regularly with new patches, firmware and software as these are released
by relevant vendors.
Some ISF Members employ a specialist cloud security company to either create the ‘gold standard’ image or
perform a penetration test of the organisation’s own image to identify any vulnerabilities, controls or settings that
need to be addressed to increase the level of security applied to cloud devices.
60 Using Cloud Services Securely: Harnessing core controls Information Security Forum
D | SECURE CONFIGURATION 1 2 3 4 5 6 7 8
Information Security Forum Using Cloud Services Securely: Harnessing core controls 61
1 2 3 4 5 6 7 8 D | SECURE CONFIGURATION
External
services
API
IaaS
External
services PaaS
API
SaaS: the cloud customer will rarely be responsible for securing APIs but may need to liaise with the
CSP regarding connection to APIs that are external to the customer’s cloud environment to ensure the
configuration is successful.
62 Using Cloud Services Securely: Harnessing core controls Information Security Forum
D | SECURE CONFIGURATION 1 2 3 4 5 6 7 8
CONTROL IMPLEMENTATION
APIs allow an organisation to extend functionality of cloud services using a common method that links
applications to other useful services, often in the supporting cloud environment. APIs are very versatile in their
use and cloud adoption has only helped to increase their popularity. For example, an API request can be used
to provide a postal address lookup service when entering a postcode on a webpage form.
Any organisation leveraging API technology in the cloud environment should configure APIs securely, use an API
management tool and deploy an API gateway to help protect their systems and data. These approaches are not
mutually exclusive, and more than one can be used to improve API security.
APIs increase the visibility of an organisation’s infrastructure and therefore increase the attack surface for various
threats, such as a hacker, who can attempt the subversion of an API by conducting a:
‒ parameter attack (e.g. SQL injection)
‒ identity attack (e.g. credential theft)
‒ man-in-the-middle attack.
Web APIs are usually based on SOAP (Simple Object Access Protocol) or REST (Representational State
Transfer) – these protocols should be used to configure the appropriate authentication and authorisation to
provide security to the API.
As a web API effectively opens an organisation’s web servers to the internet, great care needs to be taken in
planning and implementing these services to ensure that security is built in from the start.
When selecting an API management tool, an organisation should consider the business objectives of using APIs
and the corresponding features and functionality that the prospective tool will need to provide.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 63
1 2 3 4 5 6 7 8 D | SECURE CONFIGURATION
An API gateway, if configured correctly, can reduce vulnerabilities since all the API requests will traverse this
gateway and therefore be processed in the same way. Once the API gateway receives a request, it will:
‒ check where the request initiated
‒ determine what service the request is intended for
‒ forward the request only after it has checked that the connection is allowed.
An API gateway also provides greater granular control and visibility of the requests, helping analysts in a SOC to
identify and respond to potential threats. An additional benefit that can be derived from an API gateway is the
termination of SSL certificates, which are required for a secure HTTPS connection. The API gateway manages
any HTTPS request that is initiated, checks the validity of the certificate and will forward on any genuine
requests to the relevant cloud device.
64 Using Cloud Services Securely: Harnessing core controls Information Security Forum
D | SECURE CONFIGURATION 1 2 3 4 5 6 7 8
Within the cloud environment, virtualisation provides an organisation the opportunity to create, manage
and control their own devices, whether to mimic their current set-up or to create and innovate new ideas
and applications.
Virtualisation Containerisation
VM VM Container Container
Application Application
Application Application
Operating system Operating system
Libraries Libraries
Cloud
customer Hypervisor Kernel/Daemon
CSP
CPU – Memory – Disk
OBJECTIVE
To leverage the computing power the cloud offers and enhance current systems while maintaining a secure
working environment.
BENEFITS
‒ Improves patching of systems, as they can be implemented and tested quickly and efficiently in
duplicated environments.
‒ Reduces the number of accessible devices and vulnerabilities that could be a target for a potential attacker.
‒ Improves availability of systems by helping to increase the speed with which new devices are provisioned to
enhance capacity or replace a failed device.
An advantage of virtualisation is that it provides the ability to control when cloud devices are active. Rather than
these devices being live constantly, they should only be active when required to reduce the attack surface. This
also provides additional cost savings as CSPs normally charge for devices only when they are in use.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 65
1 2 3 4 5 6 7 8 D | SECURE CONFIGURATION
CONTROL IMPLEMENTATION
Organisations can use virtualisation technologies through virtual machines (VMs) or containers. Plans should
be established to help secure VMs or containers when organisations design (or retrofit) the cloud environment.
If the cloud customer implements their own instances of virtualisation then security can be applied in the
cloud environment by establishing a connection to existing on-premises security tools, either via the cloud
management console or through a specific security vendor solution (e.g. patching or malware protection).
VMs should be secured in the same way as any standard hardware, for example, by implementing malware
protection software, applying regular patching and disabling unused functionality.
Virtual machines are not static, unlike non-virtual versions of the same devices – consequently, some standard
security controls will not work effectively within a cloud environment (e.g. vulnerability scanning and malware
protection). For these controls to provide the most value, they should be incorporated into ‘gold standard’ images
or automated scripts (for further details, see control topic D.1).
Containerisation
Within the software context, containerisation is a virtual environment that enables an application to run without the
need for external dependencies. It removes the need for an operating system (OS), hypervisor or other services to be
installed and running before the application can load and run. This can be advantageous as it means the application is
very lightweight and requires fewer resources to operate.
As the container is not tied to an OS, it is portable and can be transferred to other segments of the cloud environment
or to another CSP with very little effort or compatibility issues. With its small footprint and portability advantages, it
suits the DevOps and agile methodologies often used for cloud services.
Containerisation brings with it new security challenges. With no OS, there is no simple way to install agents
(e.g. vulnerability scanners, anti-malware or patch management tools) or to patch systems, therefore
application security is a vital component of securing a container environment. Reviewing the code used to build
an application for vulnerabilities is an important factor and can be achieved with peer reviews, external expert
reviews or software tools.
Developers should also be trained in secure coding and understand the OWASP Top 10,5 in order to avoid
introducing common vulnerabilities into applications and to secure passwords or secrets. The cloud customer
needs to adopt a secure development lifecycle approach so that security is considered at each step (design,
development, delivery and support).
5 "OWASP Top 10 Most Critical Web Application Security Risks", OWASP, 2017, https://www.owasp.org/images/7/72/OWASP_Top_10-2017_%28en%29.pdf.pdf
66 Using Cloud Services Securely: Harnessing core controls Information Security Forum
D | SECURE CONFIGURATION 1 2 3 4 5 6 7 8
Organisations should consider the following challenges when mitigating security concerns associated with
virtualisation in the cloud:
‒ Additional tools will often need to be acquired, which can increase the cost of running devices in the cloud.
‒ Monitoring can be difficult as a result of transferring device workloads between backend devices, which the
organisation does not have access to.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 67
1 2 3 4 5 6 7 8
E | SECURITY MONITORING
Monitoring the security posture of the cloud environment is crucial in addressing potential
security vulnerabilities, identifying threat patterns and reducing the likelihood and impact of
information security incidents.
Security monitoring can be achieved through an ongoing vulnerability management programme that entails
vulnerability scanning, penetration testing and code reviews. Security events should be monitored using a
SIEM, typically managed by a SOC. Any information security incidents detected in the cloud environment
should be addressed through an incident management capability, supported by an incident management plan
agreed with each CSP and tested on a regular basis.
The core security monitoring controls are presented in the table below with their level of applicability to each
of the cloud service models.
E | SECURITY MONITORING
IaaS PaaS SaaS
68 Using Cloud Services Securely: Harnessing core controls Information Security Forum
E | SECURITY MONITORING 1 2 3 4 5 6 7 8
Risk rating
Source
1st
Testing
OBJECTIVE
To address technical vulnerabilities in the cloud environment quickly and effectively, thereby reducing the
likelihood of these vulnerabilities being exploited.
BENEFITS
‒ Identifies technical vulnerabilities in an organisation’s cloud environment, which enables planning and
budgeting for remediation according to their severity.
‒ Reduces the number and severity of vulnerabilities in the cloud environment.
‒ Provides visibility to a SOC of which cloud devices may be vulnerable to certain attacks, helping analysts to
determine if an observed event is a genuine threat.
‒ Informs the original build process for those cloud devices created using build standardisation (see control
topic D.1), reducing the number of vulnerabilities when new devices are created.
PaaS: the cloud customer should perform all vulnerability management tasks where possible; the agreed
levels of assessment will either be detailed in the cloud contract or can be arranged directly with the CSP.
SaaS: the cloud customer is typically not responsible for vulnerability management with regard to SaaS
applications. Many CSPs do not allow customers to perform scans or reviews of their cloud applications
but will typically provide customers with a copy of their own vulnerability or penetration testing reports.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 69
1 2 3 4 5 6 7 8 E | SECURITY MONITORING
CONTROL IMPLEMENTATION
Organisations are often already running a vulnerability assessment programme and deploying a range of
associated tools on-premises. With respect to cloud devices, the contract with the CSP should list permissible
scanning and testing. The security controls below are not mutually exclusive and if more than one is used to
form a cloud security testing programme, a greater level of assurance can be gained.
Given many CSPs run multi-tenanted environments (using the same underlying hardware to serve multiple
customers), vulnerability assessments may unintentionally affect other customers. In some instances,
organisations will be required to complete a form to clarify the scope of testing – details requested by the CSP
typically include timeframes, IP addresses and clarification on liabilities.
Some organisations, however, are reluctant to install multiple software agents as there can be considerable
resource overheads on the host device running multiple agents. Additionally, when installing multiple agents
there is an increased chance of causing conflicts that negatively impact the host device and in extreme cases,
even stop the host working. Alternative options to using vulnerability agents include:
‒ deploying a virtual scanner within the cloud environment
‒ implementing host scanning as opposed to network scanning
‒ broadening the scope of an existing vulnerability scanner.
A vulnerability agent should be incorporated into the cloud device build configuration, enabling devices to be
checked as soon as they are built and while they remain in use (see control topic D.1).
Some security vendors offer a crowdsourced solution for penetration testing, harnessing the skills of
ethical hackers to provide organisations with results that usually take much longer to produce (e.g. by using
techniques such as brute force password attacks and social engineering). The hackers are paid a reward by the
vendor for each genuine vulnerability they discover and disclose.
70 Using Cloud Services Securely: Harnessing core controls Information Security Forum
E | SECURITY MONITORING 1 2 3 4 5 6 7 8
Some organisations leverage an external bug bounty programme, which involves external individuals (in
the form of hackers) targeting an organisation’s cloud environment and rewarding the hackers financially
for providing any details about discovered vulnerabilities. Before embarking on an external bug bounty
programme, organisations need to ensure that all legal paperwork has been completed and regulatory
requirements are satisfied.
An organisation benefits from crowdsourced testing as it mimics the methods a real hacker would use if they
were attempting to breach an organisation. Compared to a normal penetration test, which is limited by time
and the specific scope of testing, a crowdsourced approach brings the added advantage of a global workforce
with a diverse array of skills and testing techniques.
Reviewing the code as part of the build process will ensure devices are built accurately and without
vulnerabilities from the start. Periodic reviews should also be carried out once the device has been deployed
(especially after changes to the code). These can take the form of internal peer reviews or more commonly,
be conducted by an expert supplier. There are some software tools (e.g. source code analysers) that can be
procured to perform a code review but at present, these are relatively immature and therefore the results may
not be accurate.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 71
1 2 3 4 5 6 7 8 E | SECURITY MONITORING
Logs
ALERT!
SIEM SOC
FW
ALERT!
BENEFITS
‒ Provides early visibility of threats in the cloud environment that may affect the cloud customer.
‒ Increases speed of response to potential security incidents.
‒ Provides greater clarity of a potential threat, provided that security event management for cloud services is
integrated with an existing on-premises solution.
PaaS: the cloud customer is responsible for the applications and some of the infrastructure within the
cloud environment and therefore can gain access to the majority of requisite logs but will need to work
with the CSP to access logs from the core infrastructure elements within the PaaS set-up.
SaaS: the cloud customer has to work closely with the CSP to understand whether they can gain access to
any logs and what alerting options are on offer to assist the cloud customer with monitoring their systems.
72 Using Cloud Services Securely: Harnessing core controls Information Security Forum
E | SECURITY MONITORING 1 2 3 4 5 6 7 8
Since most SaaS solutions run on multi-tenanted cloud set-ups, it may not be possible to gain access to the relevant
logs as the infrastructure is shared – this could restrict the ability to detect a threat.
This issue also exists within PaaS and IaaS, but with these cloud service models, an organisation has greater control
over more of the systems involved.
CONTROL IMPLEMENTATION
There are several ways an organisation can monitor security-related events in the cloud environment. At a
minimum, a SIEM tool should be used to provide an organisation with increased visibility of anomalous activity.
A SIEM needs to have the correct inputs to be an effective tool. An organisation needs to understand its infrastructure
and critical assets so that it knows what needs to be protected and can identify the relevant cloud service logs and
requisite security events that should be ingested by the SIEM.
Running two separate SIEM systems could mean that a sophisticated attack is missed since events are seen in
isolation instead of being correlated.
Many MSSPs are also experienced in investigating and responding to security events, so an organisation
may wish to take advantage of this expertise, particularly if they do not have their own security incident
management function.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 73
1 2 3 4 5 6 7 8 E | SECURITY MONITORING
74 Using Cloud Services Securely: Harnessing core controls Information Security Forum
E | SECURITY MONITORING 1 2 3 4 5 6 7 8
e.g.
Data breach
Repair
problem
Incident report
ALERT!
Type
System developers Business users System admin
Date
ALERT! ALERT! ALERT! CSP
affected
OBJECTIVE
To identify and resolve security incidents affecting the cloud environment, minimise their business impact and
apply lessons learned to minimise future risk.
BENEFITS
‒ Assists in reducing the impact of cloud-related security incidents.
‒ Identifies lessons learned and performs root cause analysis on previous incidents so to improve systems and
processes and reduce the frequency of incidents.
PaaS: the cloud customer is responsible for incident management but will need support from the CSP,
particularly to access logs from the underlying infrastructure.
SaaS: the cloud customer is responsible for initiating and managing most security incidents but the CSP is
responsible for reporting any incident to the cloud customer and conducting much of the investigative work.
It is rare for the cloud customer to have access to the relevant systems and logs that would be involved.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 75
1 2 3 4 5 6 7 8 E | SECURITY MONITORING
CONTROL IMPLEMENTATION
Managing and responding to security incidents that occur in, or affect, the cloud environment does not differ
significantly from any other type of information security incident. The cloud environment should therefore be
incorporated into an organisation’s existing security incident management processes and relevant corporate
response plans, ensuring that the nuances of using cloud services are taken into account.
When dealing with cloud-related security incidents, organisations should focus on contractual
arrangements, collaboration, data breach notification, gaining access to security event logs and performing
forensic investigations.
Cloud incident detection and response can seem challenging because of:
‒ a lack of visibility into the underlying cloud infrastructure
‒ insufficient detail and/or the difficulty of accessing event data or evidence
‒ skills shortages in technical areas, such as cloud configuration and cloud incident response.
Security orchestration and automated response tools (SOAR) can assist the cloud customer by automating some
parts of the incident management process. Automation can help with some of the more repetitive, simpler tasks
involved in incident response, improving efficiency and response time.
Some CSPs offer a range of incident management tools including SOAR that the cloud customer can leverage.
76 Using Cloud Services Securely: Harnessing core controls Information Security Forum
E | SECURITY MONITORING 1 2 3 4 5 6 7 8
Security incident response simulations should be conducted regularly, typically in conjunction with one or
more significant CSPs, to test the incident response plan. By simulating security incidents that might occur in or
affect cloud services, an organisation can validate that the plan and process performs as expected. By using this
approach, an assessment can be made about whether an organisation will be able to effectively respond and
recover when an incident occurs.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 77
1 2 3 4 5 6 7 8
Figure 26: The main categories of cloud security products and services
78 Using Cloud Services Securely: Harnessing core controls Information Security Forum
1 2 3 4 5 6 7 8
CSP security services serve as a fundamental mechanism for the cloud customer to fulfil 13%
their security obligations. When using the different tools and features offered by the CSP,
organisations should be cognisant that CSP security services:
‒ are designed to support individual security topics such as firewall configuration, access
87%
management, encryption or DLP
‒ are only accessible from the cloud management console of the given CSP Yes No
‒ do not always integrate with other generic security solutions that an organisation has
deployed on-premises.
While organisations should not depend solely on CSP security services, their low cost,
simple management and wide coverage provide enough attraction to rely on them as
a starting point. To supplement CSP security services, there is an increasing array of
products that are being developed with the multi-cloud environment in mind.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 79
1 2 3 4 5 6 7 8
“CASBs have taken centre stage as a set of critical controls for securing
an organisation’s use of cloud services.” – Oracle6
80 Using Cloud Services Securely: Harnessing core controls Information Security Forum
1 2 3 4 5 6 7 8
CSP security
Generic
cloud vendor
services
Specialised
products
products
vendor
A.1.1 Apply HTTPS (SSL/TLS) X X
A | NETWORK SECURITY
Information Security Forum Using Cloud Services Securely: Harnessing core controls 81
1 2 3 4 5 6 7 8
CSP security
Generic
cloud vendor
services
Specialised
products
products
vendor
C.1.1 Use data location services X X
C | DATA PROTECTION
82 Using Cloud Services Securely: Harnessing core controls Information Security Forum
1 2 3 4 5 6 7 8
There are several examples of new products that exemplify these trends such as:
‒ cloud management platforms: combine the functionalities of multiple cloud management consoles into a
single portal
‒ cloud security posture management tools: assess an organisation’s cloud environment against good practice
security configurations and perform the necessary steps required to remediate them
‒ container security products: conduct in-depth analysis of container images and block the use of images with
specific vulnerabilities
‒ artificial intelligence (AI) systems: enhance certain security products and services, particularly those used for
advanced threat protection and behavioural network traffic analysis.
An example of an AI enhanced product is a network monitoring tool that observes the network traffic coming
in and out of an organisation. Such a tool can build up knowledge of a complex multi-cloud environment by
analysing the typical patterns of network traffic so that any unusual activity can be detected at an early stage,
helping to respond to cloud-related threat events before they escalate into major security incidents.
For advice on using defensive AI see the ISF briefing paper Demystifying Artificial Intelligence in
Information Security.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 83
1 2 3 4 5 6 7 8
8 MAXIMISE POTENTIAL,
TAKE RESPONSIBILITY
Modern organisations must operate at a fast pace, delivering new products and services to
stay ahead of the competition. Many are therefore choosing to move ever further towards
cloud computing, as the elasticity and scalability offered by cloud services provide the
desired flexibility needed to compete. For an organisation to have confidence that it can
move to the cloud whilst ensuring that vital technological infrastructure is secure, a robust
strategy is required.
The cloud environment has become an attractive target for cyber attackers, highlighting the pressing need for
organisations to enhance their existing security practices. Yet consistently implementing the fundamentals of
cloud security can be a complicated task due to the diverse and expanding nature of the cloud environment.
This is but one of many challenges that organisations need to overcome to use cloud services securely.
Organisations cannot rely purely on CSPs to secure their critical information assets but must accept their own
share of responsibility. This responsibility calls for a combination of good governance, deployment of core
controls and adoption of effective security products and services. Controls that cover network security, access
management, data protection, secure configuration and security monitoring are not new to information
security practitioners, but they are critical to using cloud services securely.
Going forward, organisations can select from a variety of trends and technologies that will enable them to use
cloud services securely – from the adoption of new products to the embedding of improved processes, such as
a focus on secure containers, where security is given greater emphasis during development.
Assuring that services are used securely will provide business leaders with the confidence they need to fully
embrace the cloud, maximising its potential and driving the organisation forward into the future.
84 Using Cloud Services Securely: Harnessing core controls Information Security Forum
APPENDIX A: Glossary
This appendix provides a description of the main cloud-related terms used in this report.
Cloud computing: distributed, on-demand computing services delivered across networks, typically using the
internet.
Cloud environment: the combination of multiple cloud services that an organisation typically makes use of.
Cloud deployment types: the type of cloud infrastructure that an organisation is looking to operate or acquire
(i.e. Private, Public or Hybrid).
Cloud devices: different types of virtual appliances configured and used by cloud customers, including virtual
servers, virtual networking devices (e.g. virtual firewall) and relevant application containers.
Cloud infrastructure: the physical hosting and related devices such as servers, network equipment and an
underlying OS for virtualisation.
Cloud management console: a single entry-point portal, specific to the CSP, used to configure cloud services.
Cloud security vendor: a vendor of security products and services related to the cloud environment.
Cloud services: computing services offered by an external provider, including business applications, document
storage solutions, databases and virtual servers.
Cloud service model: the type of cloud service that is offered by CSPs. There are three main types of cloud
service models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS).
Cloud service provider (CSP): a vendor that provides cloud services, which can be purchased on demand by a
cloud customer.
DevOps: a set of practices where organisations use the principles of an agile method (i.e. iterative and
incremental changes) for the ongoing development and operation of their applications.
Hypervisor: a combination of software and hardware that creates and runs multiple virtual computers or
servers on the same physical machine.
Multi-tenancy: an architectural model where CSPs store data from different customers on virtual servers using
the same physical servers, which are logically segregated via the hypervisor (i.e. the technology that enables
multi-tenancy).
On-premises computing: represents the traditional IT equipment and facilities that an organisation possesses
and is logically separated from the cloud environment by a network boundary or gateway.
Serverless: a technology used to develop scalable applications, whilst avoiding the administrative functions
to maintain virtual and physical servers. Fundamentally, the server still exists, but is ‘hidden’ to individuals
working on application development.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 85
APPENDIX B: CSP cloud
security certifications
This appendix provides examples of the main certifications and standards that CSPs typically
seek to obtain. Some are specific to a cloud environment whereas others are generic to
information security certifications and accreditations.
Cloud CSA STAR CSA STAR program (Security Trust Assurance and Risk)
specific
There are three levels of certification:
‒ Level 1: Self-assessment
‒ Level 2: Third-party certification
‒ Level 3: Continuous auditing
Most of the major CSPs (e.g. Microsoft, Google) have obtained a STAR certification. The CSA publishes the list
of CSPs with their level of certification and their validity on their website.
Cloud ISO/IEC Code of practice for information security controls based on ISO/IEC 27002 for cloud services
specific 27017:2015 The standard gives guidelines for information security controls based upon ISO/IEC 27002:2013, applicable to
the provision and use of cloud services. It can lead to certification (e.g. Google, Salesforce).
Cloud ISO/IEC Code of practice for protection of personally identifiable information (PII) in public clouds acting
specific 27018:2014 as PII processors
The standard covers the protection of PII in public clouds and can lead to certification (e.g. Microsoft, AWS).
86 Using Cloud Services Securely: Harnessing core controls Information Security Forum
APPENDIX C: Cloud security
controls applicability
This appendix presents the applicability ratings of the 45 core cloud security controls to the
three cloud service models.
LEVEL OF APPLICABILITY TO SERVICE MODEL
Information Security Forum Using Cloud Services Securely: Harnessing core controls 87
LEVEL OF APPLICABILITY TO SERVICE MODEL
88 Using Cloud Services Securely: Harnessing core controls Information Security Forum
APPENDIX D: Cloud-related
threat events
This appendix provides a list of the most common cloud-related threat events.
Adversarial threat events:
‒ Compromise business partners to gain access to cloud services (ADV024)
‒ Conduct denial of service attack (ADV005)
‒ Exfiltrate sensitive data from cloud services (No mapping)
‒ Exploit cloud design or configuration weaknesses (ADV008)
‒ Exploit insecure interfaces and APIs (No mapping)
‒ Exploit vulnerable authorisation mechanisms (ADV003)
‒ Introduce malware to cloud services (ADV007)
‒ Introduce unauthorised code into applications or software (ADV0023)
‒ Misuse of cloud services (ADV011)
‒ Session hijacking of cloud services (ADV001)
‒ Unauthorised access to cloud service authentication credentials (ADV002)
‒ Unauthorised monitoring of communications (ADV004)
‒ Unauthorised network scanning or probing (ADV0016)
Additional notes
‒ The ISF cloud-related threat event list focuses on adversarial and accidental threat events as environmental threat
events are outside the control of the cloud customer.
‒ To support an information risk assessment of a cloud environment using IRAM2, the reference code of the most
closely aligned IRAM2 threat event is provided in brackets after each cloud-related threat event.
‒ This list has been cross-checked with publicly available references, such as the CSA threat list.7
7 “Top Threats to Cloud Computing: Egregious Eleven”, CSA, 8 June 2019, https://cloudsecurityalliance.org/artifacts/top-threats-to-cloud-computing-egregious-eleven/
Information Security Forum Using Cloud Services Securely: Harnessing core controls 89
APPENDIX E: Cloud controls mapping
to the cloud-related threat events
The ability of the 45 core cloud security controls to protect against one or more cloud-related threat events
has been analysed based upon industry-wide surveys and ISF Members' input throughout the workshops. The
relevant mapping has been provided at a control topic level within Section 6 and is summarised in the following
table:
A | NETWORK B | ACCESS C | DATA D | SECURE E | SECURITY
SECURITY MANAGEMENT PROTECTION CONFIGURATION MONITORING
A.1 Cloud connections
A.2 Network
A.3 Firewall
B.2 Secure
B.3 Administrator
D.1 Build
D.2 Application
D.3 Virtualisation
E.1 Vulnerability
configuration
management (IAM)
sign-on process
access
prevention (DLP)
standardisation
interface (API)
programming
and containerisation
management
management
management
Compromise business
ADVERSARIAL
services X
Misconfiguration of X X X
cloud services
Mishandling of critical
or sensitive information X X X X X
by authorised users
Undesirable effect of X X X X
change
User error (negligence X X X X X X X X
or accidental)
90 Using Cloud Services Securely: Harnessing core controls Information Security Forum
ACKNOWLEDGEMENTS
The ISF would like to thank all ISF Members and external experts who contributed to
this report by being interviewed, posting comments on ISF Live and attending solution
development workshops.
As always, because ISF Members are providing information that may be about their own organisation, their
contributions are anonymous. These acknowledgements show the individuals and the organisations they
represented at the time they contributed to this project. Some workshop participants preferred not to have
their attendance acknowledged here.
ISF MEMBERS
Suyi Guo ABN AMRO Tunç Bilgin Ingenico ePayments
Dragan Stevanovic Allianz Technology SE Clive Payne* JP Morgan Chase
Lawrie Lee A. P. Moller-Maersk Group Kieran Mongan KM Security Consulting Ltd
Abdelberi Chaabane AXA Hans Blankestijn Legian
Mathieu Cousin AXA Ruud Jongejan Legian
Manoj Mathai AXA Andre Poeltuyn Liberty Global
Sarah Schuckert Capgemini Invent Aline Barthelemy Louis Dreyfus Company
Thierry de Brabandere Coca Cola European Partners Michael Nebauer Munich Re
Venkatesh Ravindran Colt Technologies Services Cédric Eiffling National Bank of Belgium
Juergen Diehl* Commerzbank Eugene Gryazin Nordea
Hugh Gilmour Compass Group PLC Aleksi Luhtamäki OP Financial Group
Tim Wilson Córas Iompair Éireann Sami Hölsömäki Outokumpu Oyj
Geir Berglind DNB Bank ASA Johan Bom Robeco
Robert Frandsen DSV A/S Jelle Elzinga Royal FrieslandCampina
Jacques Sibué Engie Ove Liljeqvist Samlink
Jean-Christophe Vidon Essity Fabian Fuhrmann SAP Deutschland SE & Co. KG
Wes Sheppard Exact Software B.V. Bert Kloor Sociale Verzekeringsbank (SVB)
Julia Hermann Giesecke+Devrient Dinesh Shah Swiss Re
Michael Koepferl Giesecke+Devrient Andrew Donaldson Swivel Secure
Didier Mas GSK ltd. Clive Blake Symantec Corporation (UK)
Marcus Schmid IBM Germany Thomas Hemker Symantec Corporation (Germany)
Thierry Matusiak IBM Security (France) Jari Pirhonen Tieto Corporation
Dr. Werner Gutau Infineon Technologies AG
*Contributors marked with an asterisk reviewed part of this document. Additional thanks for their time and feedback.
Information Security Forum Using Cloud Services Securely: Harnessing core controls 91
ABOUT ISF
Founded in 1989, the Information Security Forum (ISF)
is an independent, not-for-profit association of leading
organisations from around the world. It is dedicated
to investigating, clarifying and resolving key issues in
cyber, information security and risk management and
developing best practice methodologies, processes and
solutions that meet the business needs of its Members.
FOR FURTHER
INFORMATION CONTACT:
Information Security Forum
+44 (0)20 3875 6868
[email protected]
securityforum.org
REFERENCE: ISF 19 10 01
©2019 Information Security Forum Limited. All rights reserved.