Abs Cloud Computing Implementation Guide
Abs Cloud Computing Implementation Guide
Page 1 of 71
Version 2.0
ABS Cloud Computing Implementation Guide 2.0
Table of Contents
Section 1: Introduction ............................................................................................................................ 3
Objective .............................................................................................................................................. 3
Definitions ............................................................................................................................................ 3
Section 2: Cloud outsourcing classification ............................................................................................. 5
Section 3: Activities recommended as part of due diligence .................................................................. 7
1. Governance ................................................................................................................................. 7
2. Assessment of the Cloud Service Provider ................................................................................. 8
3. Contractual Considerations ......................................................................................................... 9
Section 4: Key controls recommended when entering into a cloud outsourcing arrangement ............. 14
A) Govern the Cloud ...................................................................................................................... 15
B) Design and Secure the Cloud ................................................................................................... 18
C) Run the Cloud ........................................................................................................................... 32
Acknowledgements ............................................................................................................................... 38
Checklist of considerations for standard and material workloads ......................................................... 39
Page 2 of 52
ABS Cloud Computing Implementation Guide 2.0
Section 1: Introduction
Objective
The Association of Banks in Singapore (ABS) has developed the second version of the
implementation guide for Financial Institutions (FIs) to use when entering into Cloud outsourcing
arrangements, as well as the on-going management thereof.
Technology and market practice has advanced rapidly since the guide was first released in June
2016. It was felt an updated version was required to address these changes, as well as to further
support the practice of migrating material workloads to the Cloud, including systems of record and
1
those classified as Monetary Authority of Singapore (MAS) Critical .
The recommendations that lie within have been discussed and agreed by members of the ABS
Standing Committee for Cyber Security (SCCS) with the intent to assist FIs in understanding
approaches to due diligence, vendor management and key controls that should be implemented on
an on-going basis in Cloud outsourcing arrangements.
Additionally it can be used by Cloud Service Providers (CSPs) to better understand what is required to
achieve successful Cloud outsourcing arrangements with FIs.
The guiding principle that controls in the Cloud must be at least as strong as those which the FIs
would have implemented had the operations been performed in-house should apply.
It should be noted that this document contains best practice recommendations and considerations
and is intended to support the safe adoption of Cloud. It is not a set of mandatory requirements.
The adoption of Cloud can offer a number of advantages, including faster time to market, scalability,
cost savings, enhanced security and access controls. This guide includes recommendations for due
diligence and controls that address the typical characteristics of cloud services, such as multi-tenancy,
data commingling and higher propensity for processing to be carried out in multiple locations.
These guidelines are set out in the three following sections:
Section 2 addresses Cloud outsourcing classifications and how these should influence
decision making in Cloud outsourcing agreements.
Section 3 addresses a minimum set of activities recommended as part of due diligence before
entering into a Cloud outsourcing agreement.
Section 4 addresses the minimum set of controls recommended when entering into a Cloud
outsourcing arrangement as well as the enhanced set of controls recommended for Material
outsourcing, including critical workloads.
Definitions
This definition of Cloud is taken from the National Institute of Standards and Technology (NIST).
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a
shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and
services) that can be rapidly provisioned and released with minimal management effort or service
provider interaction. This cloud model is composed of three service models, and four deployment
models.
Service Models
Infrastructure as a Service (IaaS). The capability provided to the organisation is to provision
processing, storage, networks, and other fundamental computing resources where the consumer is
able to deploy and run arbitrary software, which can include operating systems and applications. The
consumer does not manage or control the underlying cloud infrastructure but has control over
1
Please refer to MAS Notice 644 for the definition of MAS Critical
Page 3 of 52
ABS Cloud Computing Implementation Guide 2.0
operating systems, storage, and deployed applications; and possibly limited control of select
networking components (e.g., host firewalls).
Platform as a Service (PaaS). The capability provided to the organisation is to deploy onto the cloud
infrastructure consumer-created or acquired applications created using programming languages,
libraries, services, and tools supported by the provider. The consumer does not manage or control the
underlying cloud infrastructure including network, servers, operating systems, or storage, but has
control over the deployed applications and possibly configuration settings for the application-hosting
environment.
Software as a Service (SaaS). The capability provided to the organisation is to use the provider’s
applications running on a cloud infrastructure. The applications are accessible from various client
devices through either a thin client interface, such as a web browser (e.g., web-based email), or a
program interface. The consumer does not manage or control the underlying cloud infrastructure
including network, servers, operating systems, storage, or even individual application capabilities, with
the possible exception of limited user-specific application configuration settings.
Deployment Models
Private cloud. The cloud infrastructure is provisioned for the exclusive use by a single organization
comprising multiple consumers (e.g., business units). It may be owned, managed, and operated by
the organization, a third party, or some combination of them, and it may exist on or off premises.
On premises private Cloud may also be considered in a similar manner to this, where a CSP deploys
infrastructure at the premises of the organization for its exclusive use. The organization can also
assume responsibility for the environmental and physical security controls as a result. For On Prem
services the FI should reference the MAS Technology Risk Management Guidelines, but may want to
reference controls in this Guideline where appropriate.
Community cloud. The cloud infrastructure is provisioned for exclusive use by a specific community
of consumers from organizations that have shared concerns (e.g., mission, security requirements,
policy, and compliance considerations). It may be owned, managed, and operated by one or more of
the organizations in the community, a third party, or some combination of them, and it may exist on or
off premises.
Public cloud. The cloud infrastructure is provisioned for open use by the general public. It may be
owned, managed, and operated by a business, academic, or government organization, or some
combination of them. It exists on the premises of the cloud provider.
Hybrid cloud. The cloud infrastructure is a composition of two or more distinct cloud infrastructures
(private, community, or public) that remain unique entities, but are bound together by standardized or
proprietary technology that enables data and application portability (e.g., cloud bursting for load
balancing between clouds).
Outsourcing
An “outsourcing arrangement” means an arrangement in which a service provider provides the
institution with a service that may currently or potentially be performed by the institution itself and
which includes the following characteristics–
(b) the service is integral to the provision of a financial service by the institution or the service is
provided to the market by the service provider in the name of the institution
Please refer to the latest version of the MAS Outsourcing Guidelines and FAQ for further
clarifications.
Page 4 of 52
ABS Cloud Computing Implementation Guide 2.0
Guidance is also given as to what is likely to constitute material and non-material outsourcing in the
context of cloud.
This allows an FI to assess the inherent risk profile of a Cloud Outsourcing arrangement, and then
ensure that appropriate controls are in place to ensure that residual risks are appropriately managed
and monitored and thus remain within appetite.
For clarity as to the definition of materiality, an extract from the Monetary Authority of Singapore
(MAS) outsourcing guidelines is included:
(a) which, in the event of a service failure or security breach, has the potential to either materially
impact an institution’s
(ii) ability to manage risk and comply with applicable laws and regulations,
or
(b) which involves customer information and, in the event of any unauthorised access or disclosure,
loss or theft of customer information, may have a material impact on an institution’s customers.
For further guidance on material outsourcing arrangements please to the prevailing version of the
2
MAS Outsourcing Guidelines .
The materiality of an outsourcing arrangement should dictate the types of controls deployed, as well
as the depth and breadth of any initial, and on-going, due diligence.
The below table is for guidance only, please refer to the MAS Outsourcing guidelines for further
examples of material outsourcing. Any decision should be made based on the FI's risk appetite and
formalized at an appropriate governance forum. It should also be noted that not all use of Cloud may
constitute outsourcing: services such as content delivery networks, survey portals may be considered
a subscription service, and thus not subject to the same level of oversight as a Cloud outsourcing
arrangement.
Cloud
Outsourcing Common characteristics Examples
Category
Application binaries, or risk
Staff data which does not include
management quant libraries that
bank account or credit card data
are being tested on masked data
(e.g. information on name cards)
(i.e. performance & volume
Development and Test
Non Material testing, regression testing, or
environments
Monte Carlo simulations)
Services not defined as 'critical'
Information Security solutions
such as Managed Security
Services / Operations Centres,
2
As of the time of publication refer to Annex 2 of the 2016 Outsourcing Guidelines
Page 5 of 52
ABS Cloud Computing Implementation Guide 2.0
Once the classification of a Cloud Outsourcing arrangements has been defined, the below tables
maps the category to the recommended minimum control environment as laid out in Chapter 4.
Page 6 of 52
ABS Cloud Computing Implementation Guide 2.0
1. Governance
The structure and manner that an on-going outsourcing arrangement is managed is paramount to
maximising the benefits derived from it, and minimising and managing the inherent risks associated
with outsourcing.
Cloud Computing Due Diligence Framework FIs should establish a risk management
framework and conduct appropriate due diligence to manage the risks associated with CSPs as well
as their material sub-contracting arrangements. It is recommended that an FI develop a framework to
assist in the identification and monitoring of risks during cloud adoption.
Contractual Agreement. Expectations should be agreed between the CSP and the FI, in particular
with regard to operational contract management, SLA management, technology risk management,
business continuity management and contract exit. These are covered in details in other sections;
however CSPs should provide assurance to FIs that there is stringent governance on their daily
operational procedures, and is validated via independent assurance process.
The FI should ensure that contractual terms and conditions governing the roles, relationships,
obligations and responsibilities of all contracting parties are set out fully in written agreements.
It is recognized that moving technology infrastructure into the cloud creates a shared responsibility
model between the consumer and the CSP for the operation and management of security controls.
Keeping in mind that the FI will remain accountable for protecting its information, it is strongly
recommended to ensure that roles and responsibilities for relevant IT and operations departments are
clearly understood, defined and contractually agreed before transferring any data into the cloud.
FI should perform due diligence to understand the services they are adopting and what their and the
CSPs responsibilities are. Below is an example showing areas of consideration when defining
responsibilities between an FI and CSP before entering into the outsourcing arrangement:
Page 7 of 52
ABS Cloud Computing Implementation Guide 2.0
Key Performance Indicators / Key Risk Indicators. Once responsibilities are understood and
agreed KPIs, key activities, inputs and outputs should be defined in an SLA, along with
accountabilities. The governance of the SLA as well as the tools recommended for the tracking should
also be defined in the contract. KRIs should indicate the effectiveness of key information security
controls, which are subject to periodic review. The control testing interval should be determined by the
FI based on a risk-based approach. The FI’s service level requirements and the metrics by which the
relevant service is to be measured should also be documented clearly.
Third Party Risk Management. The CSP should be able to demonstrate that it implements and
maintains a robust risk management and governance framework that effectively manages the cloud
service arrangements including any sub-contracting arrangements.
Asset Classification. The FI should have a clear policy on the classification of the assets that are
outsourced to CSP as part of its risk profiling. Such policy should include the FI’s ability to assess and
determine the controls necessary for protecting the data confidentiality and integrity and the location
where the data should be hosted.
Materiality Assessment. Prior to engagement with a CSP, FIs need to establish the CSP’s ability
to comply with necessary minimum controls based on the intended workloads (see section 2 Cloud
Outsourcing Classification).
Financials. The financial strength and resources should be assessed to ensure that the viability of
the service provider to service commitments even under adverse conditions.
Corporate Governance and Entity Controls. The good corporate practices and control
consciousness of CSP’s staff sets the priority and culture, and is the foundation for all the other
components of internal control, providing discipline and structure.
Data Centre. It is important for FI to be in position to ascertain and agree on which countries are
acceptable for an FIs’ data to be processed and reside. This determines the nature of the risk that
exists in the outsourcing arrangement, and is a basic requirement to demonstrate that the FI has
sufficient oversight of its outsourcing arrangement.
Physical Security Risk Assessment. A Threat & Vulnerability Risk Assessment (TVRA) or
equivalent independent assessments should be conducted on data centres in Singapore and
overseas where these data centres support the FI’s Singapore operations. The purpose of this
assessment is to identify security threats to and operational weaknesses in a data centre in order to
determine the level and type of protection that should be established to safeguard it.
The scope of assessment is dependent on many factors such as the criticality and the type of systems
hosted at the DC. Nevertheless, the scope should minimally include the DC’s perimeter, physical and
environmental security, natural disasters, and the political and economic climate of the country in
which the DC resides. This assessment is commonly undertaken by the CSP. FI should obtain and
validate the TVRA or equivalent independent reports from the CSP. The assessment must be
performed periodically to identify any security and operational weaknesses. The CSP should promptly
remedy any threats, risks or security issues identified as being material in the assessment report.
The assessment criterions are available at latest MAS Technology Risk Management Guidelines
under data centres protection and controls.
Page 8 of 52
ABS Cloud Computing Implementation Guide 2.0
Due Diligence Process. Due diligence of the CSP should cover all locations that support the FI’s
processing and data storage requirements. It should not be assumed that controls are consistent
across all locations. If the CSP confirms that controls are consistent across all relevant locations, then
a single assessment report for such locations should suffice.
The Association of Banks in Singapore (ABS) has established guidelines on Control Objectives and
Procedures for the FIs’ Outsourced Service Providers (OSPs) operating in Singapore, also known as
OSPAR. These guidelines form the minimum/baseline controls that OSPs (which may include CSPs
where relevant) which wish to service the FIs should have in place.
It is the FI's responsibility to assess the appropriateness of the scope and controls covered by the
report. Domains such as information security policies and awareness, due diligence and risk
assessment of practices related to sub-contracting, system vulnerability assessments and penetration
testing, and technology refresh management of end of life systems are particularly relevant.
The FI must also ensure that the controls covered by the report provide the necessary assurance to
support compliance with the MAS Technology Risk Management Guidelines (TRMG) and Outsourcing
Guidelines.
It is strongly recommended to review the scope of such reports to ensure that the sample set selected
by the independent auditor provides assurance of the services, facilities and locations that the FI
intends to utilise.
Subcontracting. The MAS expects FIs retain the ability to maintain similar control over the risks
from its outsourcing arrangements when a CSP uses a sub-contractor to support material services. As
such, FIs should establish risk management frameworks and conduct appropriate due diligence to
manage the risks associated with sub-contracting arrangements. FIs should retain the ability to
monitor and control its outsourcing agreements when a service provider uses a sub-contractor to
support material services. An appropriate notification method should be agreed between the FI and
the CSP for changes in material subcontracting so that the FI can exercise oversight.
Pre and Post Implementation Reviews. FIs should establish their own outsourcing risk
management framework and the necessary policies and procedures with respect to the scope of their
pre and post-implementation reviews. These should commensurate with the materiality of the
outsourcing arrangement.
Pre-implementation reviews should not be limited to the due-diligence on the CSP but also include
checks and controls to ensure a smooth handover of the functions from FIs and/or other service
providers to the new service providers. Post-implementation reviews may include reviewing the
effectiveness and adequacy of the institutions’ controls in monitoring the performance of the service
provider and checks to ensure that the risks associated with the outsourcing activity are managed
appropriately as planned. Post-implementation reviews are usually conducted shortly after the
commencement of the outsourcing arrangement. MAS expect institutions to determine an appropriate
timeframe for these post-implementation reviews.
3. Contractual Considerations
MAS consider cloud services operated by CSPs as a form of outsourcing. When negotiating a
contract with a CSP, the FI should ensure that it has the ability to contractually enforce agreed and
measurable information security and operational requirements. Without such authority, any controls
that are put in place as part of the outsourcing arrangement may not be enforced, as the FI will be
relying on good faith efforts of the CSP.
Data Confidentiality and Control ownership. The FI should ensure that the outsourcing
agreement includes the following requirements:
(a) State the responsibilities of contracting parties in the outsourcing agreement to address the
scope of the services and the applicable baseline security policies and practices, including the
Page 9 of 52
ABS Cloud Computing Implementation Guide 2.0
circumstances under which each party has the right to change security requirements. The
outsourcing agreement should also address:
(i) the issue of the party liable for losses in the event of a breach of security or confidentiality
and the CSP’s obligation to inform FI; and
(ii) the issue of access to and disclosure of FIs’ information assets by the CSP. FIs’
information should only be used by the CSP and its staff strictly for the purpose of the
contracted service, and in accordance with the terms of pertaining to such use
(b) Disclose the FI’s information to the CSP only on a need-to-know basis;
(c) Ensure the CSP is able to protect the confidentiality and integrity of FI’s information,
documents, records, and assets, particularly where multi-tenancy and/or data commingling
arrangements or practices are adopted by the CSP; and
(d) Review and monitor the security practices and control processes of the service provider on a
regular basis, including commissioning audits or obtaining periodic expert reports on
confidentiality, security adequacy and compliance in respect of the operations of the CSP,
and requiring the CSP to promptly disclose to the FI any breaches or serious incidents that
may impact FI’s data confidentiality. CSP should have a defined framework for assessment of
incidents (e.g. near-miss events resulting from repeated unsuccessful attempts or application
errors resulting in data breaches) so that FI can take the necessary precautions to safeguard
their data.
FI should understand and agree with CSP on the change management process in relation to the
services provided, and the impact assessment criterions in relation to the SLA in the contract. The FI
should ensure that the outsourcing agreement includes an obligation for the CSP to provide
notification to the FI in the event of any significant changes that may impact service availability
(including controls and/or location).
In the event of contract termination with the CSP, either on expiry or prematurely, the FI should have
the contractual right to promptly render data inaccessible at the CSP’s systems (including backups).
Provision to address specific regulatory requirements, such as the right to audit by the MAS and
prompt notification of security incidents or technology outages that have a material impact, must also
be included in the outsourcing agreement if relevant.
Data Transfers and Location of Data. The FI should consider the social, political and economic
climate of a country before an FI agrees to have its data placed there. FIs should at the outset obtain
legal advice to ascertain that the service cloud provider is operating in jurisdictions that generally
uphold confidentiality clauses and agreement. An FI should enter into outsourcing arrangements only
with service providers operating in jurisdictions that generally uphold confidentiality clauses and
agreements.
Where the FI does not control the location of its data the FI and CSP should come to an agreement
where the FI’s data can reside in respect of which countries or states if there are differences between
the jurisdiction of federal and state courts. (For example, in federations like the United States, areas of
jurisdiction apply to local, state, and federal levels.). A contractual clause requiring advance
notification by the CSP of any changes to these locations should be included in the outsourcing
agreement. Where the FI does not have the contractual right to reject any proposed change to the
location of its data, it is recommended that the FI should retain a right to terminate the outsourcing
agreement in the event of an unsatisfactory change or new location.
To ensure that data remains protected even if it leaves the jurisdiction of Singapore, unless prohibited
by applicable laws, it is recommended that FIs establish contractually binding requirements that
require the CSP to notify the FI in the event the local legal requirements compel the CSP to disclose
the data to a 3rd party, bearing in mind the section 47 of the Singapore Banking Act.
Page 10 of 52
ABS Cloud Computing Implementation Guide 2.0
An FI should not enter into outsourcing arrangements with service providers in jurisdictions where
prompt access to information by MAS or agents appointed by MAS to act on its behalf, at the service
provider, may be impeded by legal or administrative restrictions.
3
Refer to MAS outsourcing guidelines for details .
Audit and Inspection. An outsourcing arrangement should not interfere with the ability of FIs to
effectively manage its business activities, risk or impede MAS in carrying out its supervisory functions
and objectives.
If an audit inspection cannot be performed by FI’s appointed auditors, FIs may rely on the audit
opinion of a service provider’s external auditor. The party performing the audit should possess the
requisite knowledge and skills to perform the engagement, and be independent of the units or
functions involved in the outsourcing arrangement.
A right to audit by the MAS should be included as a stipulation in the contract.
CSP should provide reasonable access to necessary information to assist in any FI investigation
arising due to an incident in the cloud or audit inspection, to the extent that it is does not contravene
any other legal obligations. FIs would be required to follow up with the CSP to ensure that all
appropriate and timely remediation actions are taken to address any audit findings.
Consideration should also be given to the support provided by a CSP during an audit, including
resources, costs, and turn-around times for requests for information. Typically this will be a value add
service by the CSP.
Business Continuity Management. FI should take steps to evaluate and satisfy itself that the
interdependency risk arising from the outsourcing arrangement can be adequately mitigated such that
FI remains able to conduct its business with integrity and competence in the event of a service
disruption or failure, or unexpected termination of the outsourcing arrangement or liquidation of the
CSP. These should include taking the following steps:
(a) Determine that the CSP has in place satisfactory business continuity plans (“BCP”). Prior to
contracting with the CSP, the FI should verify the CSP’s ability to recover the outsourced
systems and/or IT services within the stipulated RTO.
(b) Proactively seek assurance on the state of BCP preparedness of the CSP, or participate in
joint testing in specific nature of outsourced services (such as SaaS or PaaS), where
possible. FIs should ensure the CSP and FI regularly test its BCP plans and that the tests
validate the feasibility of the RTO, RPO and resumption operating capacities.
(c) Ensure that there are plans and procedures in place to address adverse conditions or
termination of the outsourcing arrangement such that the FI will be able to continue business
operations and that all documents, records of transactions and information previously given to
the CSP should be promptly removed from the possession of the service provider or deleted,
destroyed or rendered unusable.
Subcontractors. Where a CSP elects to use subcontractors to perform the services which have a
material impact to the provision of the Cloud service, an appropriate notification method should be
agreed between the FI and the CSP for changes in material subcontracting so that the FI can
exercise oversight. The CSP remains primarily accountable to the FI for the provision of service, and
effectiveness of agreed controls including IT Security and Contractor On-boarding controls. The
outsourcing agreement should include clauses making the CSP contractually liable for the
performance and risk management of its sub-contractor. The CSP should also be accountable for
3
At the time of publication section 5.10 Outsourcing outside Singapore and MAS Notice 634 Banking
secrecy – Condition for outsourcing
Page 11 of 52
ABS Cloud Computing Implementation Guide 2.0
managing their subcontractors and remediating any non-performance issues identified. Where the FI
does not have the contractual right to reject any proposed subcontractor, it is recommended that the
FI should retain a right to terminate the outsourcing agreement in the event of an unsatisfactory
performance of the subcontractors, or the subcontractor is or has become prohibited by the regulator.
Service Level Agreements. Enforceable and measurable Service Level Agreements (SLAs)
should be negotiated where possible, particularly for material outsourcing arrangements. These
should include a definition of the governance to be put in place to manage the contract on an on-
going basis. This should define any management information and other deliverables that will form the
basis for that governance. FIs should be aware of compound SLAs and ensure they meet their overall
requirements. Where SLAs are negotiated, these must be aligned with business requirements, and
where possible appropriate contractual remedies or enforceable liquidated damages clauses
included.
Data Retention. FI must be able to stipulate access to its data, both those used for daily operational
purposes as well as for contingency, disaster recovery or backups.
An area of concern would be the management of data in online or offline backups. Where data can be
isolated or logically segregated this is simpler to manage. However in a shared environment, the FI
should ensure that its data is protected by verified and appropriate technical means through
assessment as part of the due diligence process.
For encrypted data, FI must ensure that appropriate cryptographic key management is in place, as
well as validate the CSP’s ability to restore the service from backups effectively.
Upon exiting a contract with a CSP where FI does not have direct access to its data, FI needs to
ensure that the CSP covers the design and process for data deletion in the scope of an independent
audit and that the operational effectiveness of these controls are tested. In this way, CSP can provide
assurance to the FI that its data is rendered permanently inaccessible in a timely manner, in particular
any backup or distributed online media after the exit of the contract.
Default Termination. The contract should clearly stipulate the situations in which FIs should have
the right to terminate the outsourcing agreement in the event of default, or under circumstances
where:
The minimum period to execute a termination provision should be specified in the outsourcing
agreement. The outsourcing agreement should also contain provisions to ensure smooth transition
when the agreement is terminated or amended.
Refer to the MAS outsourcing guidelines for details pertaining to default termination and early exit.
Exit Plan. The extent of exit planning should be dependent on the materiality of the outsourcing
arrangement and potential impact to the on-going operations of the FI. The following considerations
should be taken into account:
1. Agreed procedure and tools used for deletion of data in a manner that data is rendered
irrecoverable.
2. Costs associated with the exfiltration of an FI's data.
Page 12 of 52
ABS Cloud Computing Implementation Guide 2.0
3. Removal of all financial institution’s data (e.g. customer data) and confirmation that all data
has been rendered irrecoverable on termination of the outsourcing arrangement.
4. Transferability of outsourced services (e.g. to a third party or back to the FI) for the purpose of
continuity of service.
For recovery of data for the purpose of continuity of service, FIs should ensure that the following
are in place where appropriate:
5. A legal agreement that commits the CSP to assist in the exit process so as not to
unreasonably impede the exit, or the testing of an exit plan. These should include the format
and manner in which data is to be returned to the FI, as well as support from the CSP to
ensure the accessibility of the data.
6. Data elements to be extracted and returned to the FI should be agreed upon at the start of the
outsourcing arrangement and reviewed whenever there are material changes to the
outsourcing arrangement.
Page 13 of 52
ABS Cloud Computing Implementation Guide 2.0
Design &
Govern the
Secure the Run the Cloud
Cloud
Cloud
Page 14 of 52
ABS Cloud Computing Implementation Guide 2.0
Control Objectives
Execute robust and timely oversight of risks associated with cloud outsourcing arrangements
Ensure there is accountability and governance in place that bridges the FI and CSPs
Ensure that the FI has the appropriate skills and knowledge to execute oversight and manage
demand
Have a consistent, empowered interface between FI's business and operations divisions and
the CSP
Risk Assessment should be considered from two angles: firstly to assess the CSP, and secondly to
assess a particular service or pattern to ensure required controls are implemented and operating
within acceptable thresholds.
Page 15 of 52
ABS Cloud Computing Implementation Guide 2.0
Control Objectives
Demonstrate compliance position against regulatory requirements, corporate policies and
standards
Regularly test key controls provide assurance of the effectiveness of the overall control
framework
Where non-compliance is detected trigger an appropriate and timely response for remediation
3. Billing Models
Strategic adoption of cloud is usually supported by a business case. Additionally with a distributed
model of consumption it is important to track usage to ensure clear ownership of costs and facilitate
internal distribution of these expenses.
Control Objectives
Ensure clear ownership of cloud usage costs
Ensure that excessive or unnecessary usage is prevented, or identified and managed in a
timely manner
Facilitate transparency in overall cloud usage for management information and strategic
decision making
Page 16 of 52
ABS Cloud Computing Implementation Guide 2.0
5. Work with CSPs to create usage reports at regular intervals which are made available to
account owners and for presentation to appropriate governance forums. Ensure that these
reports are consumed in line with technology financials and internal billing standards.
6. Define quotas for each sub account and put in place alerts or triggers for accounts once a
threshold of spending has been reached.
7. Cloud usage MI should consider both software licensing, compute and storage costs.
8. Organisations should ensure that sufficient funds are available to cover licensing costs, and
that controls are in place to prevent key services being shut down.
Page 17 of 52
ABS Cloud Computing Implementation Guide 2.0
To ease the cloud adoption journey many CSPs have developed cloud architecture reference
solutions to help customer jumpstart their cloud implementation. These references are collections of
solutions and design ideas to solve common cloud adoption problems.
Additionally due to the commoditized nature of cloud service consumption, the importance of
architecting a standard catalogue of services which adhere to the business, technology and security
standards of the FI is paramount.
Control Objectives
Design and implement cloud services which are optimised to create the largest financial and
non-financial benefits to the FI
Create a service catalogue of cloud products that adheres to the FI's internal policies and
regulatory requirements
CSPs will usually provide segregation via logical controls in a virtual environment, an FI should risk
assess these in combination with other controls such as encryption or tokenisation.
In certain circumstances, such segregation may be bypassed or in the event of a system failure, data
could be accessible by exploiting data dumps and accessing infrastructure shared memory.
Operational complexity of virtual architectural models can also result in a weakened security model.
To assist in development of Cloud infrastructure, FIs should assess the level of maturity, information
and support available to assist with virtual architectural models.
Page 18 of 52
ABS Cloud Computing Implementation Guide 2.0
The traditional virtual machine is not the only option available to FIs to host their workloads.
Containers enable FIs to decouple applications from operating systems by using a lightweight image
that includes the necessities for an application at runtime. This can include binaries, libraries and
settings. The ability to decouple the application from the operating system allows FIs to focus purely
on managing the application. Serverless is another offering that the CSPs are providing to FIs
dynamically manage the allocation of systems to the workload processing requirements. The adoption
of these new offerings combined with DevOps allows FIs to easily administer their Cloud environment
in a more automated manner
DevOps is a hybrid of development and operations that is becoming more mainstream and the heart
of agile development is to improve the quality of the software being delivered. It is also best suited
developing and testing for security and vulnerabilities. There are various tools that can be used for
DevOps and DevSecOps but it is up to the FIs to determine which one is best suited.
Control Objectives
Manage the confidentiality and integrity risks associated with data co-mingling or shared
tenancy environments.
In the event of a software or hardware failure, ensure that information assets remain secure
or are securely removed
Define a standard set of tools and processes to manage containers, images and release
management
Page 19 of 52
ABS Cloud Computing Implementation Guide 2.0
Customers of the cloud services can choose to distribute their workload across multiple regions to
improve the latency for their users or mitigate against regional outage of the cloud services. However,
customers can also choose to constrain their workload to a single region or cluster. This allows
customers with specific requirements such as data sovereignty to control the residency of their data.
FIs should be cognizant that such a design potentially negates the resiliency and availability offered
by cloud services.
Hence, FIs need to carefully consider and plan their cloud adoption to ensure that the resiliency and
availability of the cloud services commensurate with their needs.
Control Objectives
Ensure that the resiliency, recoverability and availability design of the workload is
commensurate with its criticality
Page 20 of 52
ABS Cloud Computing Implementation Guide 2.0
4. Network Architectures
Network architecture is a key consideration especially given the nature of open access and shared
services of public cloud. FI should plan and implement security controls to secure the cloud workload
against common internet based attacks (e.g. network intrusion attempts, DDoS attacks) and cloud
specific attacks.
Control Objectives
Reduce contagion risk between the FI’s on premise and cloud environment
Account for the use and adoption of cloud services to prevent shadow IT
Ensure access to the cloud environment are granted on a need to basis
Ensure that cloud work load is protected against network based attacks e.g. network intrusion
attempts, application and DDoS attacks
Page 21 of 52
ABS Cloud Computing Implementation Guide 2.0
CSP environments typically offer a number of configurations for key management including a CSP
managed option, an option to "Bring Your Own Key" where an FI's key can be injected into the CSP
Hardware Security Module (HSM) infrastructure, or an entirely FI managed option where it is possible
to deploy an FI owned HSM into the Cloud.
These deployment offer advantages and disadvantages: in the case of FI owned and deployed HSMs
this typically means that the cloud environment can only be managed and operated by the FI, thus is
less suitable for PaaS or SaaS environments, and can restrict the adoption of cloud services.
Furthermore, if keys are compromised or lost, the entire Cloud environment may become
inaccessible. The benefit of this model is that it provides the highest level of control for the FI over the
Cloud environment.
Control Objectives
Manage cryptographic material so that the confidentiality and integrity of the FI's data is not
compromised
Page 22 of 52
ABS Cloud Computing Implementation Guide 2.0
6. Encryption
Controls for encryption and tokenisation can be used interchangeably and can be used in a
complementary or stand-alone fashion depending on the solution.
Encryption is the process of encoding messages or information in ways such that the output is
rendered unintelligent. Encryption can be used to protect the confidentiality of sensitive data, provide
some assurance that data has not been tampered with, and is also useful for non-repudiation.
Conversely, improper design of encryption systems and processes can lead to insecure
implementations that provide a false sense of security. This can also occur when key management is
weak.
Encryption can be applied in most cloud computing use cases and should be an integral control to
secure sensitive information such as authentication credentials, personally identifiable information,
credit card information, financial information, emails, and computer source code.
CSP environments typically offer a number of configurations for key management including a CSP
managed option, an option to "Bring Your Own Key" where an FI's key can be injected into the CSP
Hardware Security Module (HSM) infrastructure, or an entirely FI managed option where it is possible
to deploy an FI owned HSM into the Cloud.
These deployment options offer advantages and disadvantages: in the case of FI owned and
deployed HSMs this typically means that the cloud environment can only be managed and operated
by the FI, thus is less suitable for PaaS or SaaS environments, and can restrict the adoption of cloud
services. There is also an associated cost, and in the event that keys are lost, all data in the Cloud
maybe unrecoverable.
CSPs will usually provide segregation via logical controls in a virtual environment, an FI should risk
assess these in combination with other controls such as encryption or tokenisation.
Control Objectives:
Provide assurance that only authorized parties can gain access to the data in transit and at
rest
Provide assurance that the confidentiality and/or integrity of the data has not been
compromised
Provide authentication of source and non-repudiation of message
Page 23 of 52
ABS Cloud Computing Implementation Guide 2.0
7. Tokenisation
Controls for encryption and tokenisation can be used interchangeably and can be used in a
complementary or stand-alone fashion depending on the solution.
Cloud computing generally involves the transmission of data to the CSP for processing or storage. In
some cases, data not essential for the delivery of the cloud service is transmitted to and stored by the
CSP, resulting in excessive sharing and unnecessary exposure of potentially sensitive information.
It is in the best interest of the FI to minimise its data footprint so as to reduce the vulnerability surface
and potential threat vectors. Tokenisation can provide effective risk reduction benefits by minimising
the amount of potentially sensitive data exposed to the public.
Tokenisation is the process of replacing the sensitive data with a non-sensitive equivalent value (also
referred to as token) that has no correlation or meaning with the dataset. A tokenised dataset retains
structural compatibility with the processing system and allows the data to be processed without any
context or knowledge of the sensitive data, thereby potentially allowing a different set of security
requirements to be imposed on the recipient of the tokenised data. The FI can de-tokenise and
restore context to the processed tokenised data by replacing the tokens with their original values.
Tokenisation can be applied to all data that is not required to be processed by the service provider,
and is commonly used to protect sensitive information such as account numbers, phone numbers,
email addresses, and other personal identifiable information.
Tokenisation does not reduce the security or compliance requirements, but it could reduce the
complexity of their implementation.
Control Objectives:
Minimise the amount of data that needs to be shared with a third party
Provide assurance that only authorized parties can gain access to the data
1. Careful risk assessment and evaluation should be performed on the tokenisation solution to
identify unique characteristics and all interactions and access to the sensitive data.
2. The Cloud service provider must not have any means to restore the tokens to the original
data values such as access or control over the tokenisation system or tokenisation logic.
3. Systems that perform tokenisation should remain under the direct management of the FI.
Page 24 of 52
ABS Cloud Computing Implementation Guide 2.0
Control Objectives
Ensure the confidentiality and integrity of FI’s data
Permit user access only to the information assets they require to perform their role
Ensure segregation of duties is in place for sensitive roles
Page 25 of 52
ABS Cloud Computing Implementation Guide 2.0
the accuracy of requirements, and that the configuration in the document matches the system
state.
Control Objectives
Ensure the confidentiality and integrity of FI’s data
Manage privileged user access appropriately
Detect unauthorised or erroneous changes
Page 26 of 52
ABS Cloud Computing Implementation Guide 2.0
Control objectives
Provide assurance that remote access to systems is secured against threats of impersonation
Provide assurance that user management controls are present and monitored for suspicious
activity
Grant privileges in accordance with the requirement of the role, with appropriate segregation
of duties
In addition, the adoption of cloud services also makes it a challenge to detect and differentiate
between the legitimate and unauthorized data exfiltration. Shadow IT use of unapproved cloud
applications introduces compliance and security risk where the services do not adhere to compliance
and security requirements. It is therefore essential that FIs monitor and control both sanctioned and
unsanctioned data transfers and access to the cloud services.
Page 27 of 52
ABS Cloud Computing Implementation Guide 2.0
Considerations for the protection of data transmitted to and stored in the cloud must include all
methods of ingress and egress. The FI should have in place a holistic data loss prevention strategy
which includes data in transit, at rest and end point security controls.
Control Objectives
Enforce the use of sanctioned cloud services
Manage data processed and stored in the cloud environment in accordance to the FI’s
information security policy
Permit users access only to information assets they require to perform their role
Prevent unauthorized or unintended dissemination of data
Control Objectives:
Ensure confidentiality and integrity of source codes, other code artefacts (e.g. compiled and
non-compiled codes, libraries, runtime modules)
Prevent unauthorized alteration of code and system configurations
Page 28 of 52
ABS Cloud Computing Implementation Guide 2.0
Control Objectives
Identify vulnerable configurations and provide assurance as to the security posture of a
service
Provide assurance of security processes including security patching and hardening
Page 29 of 52
ABS Cloud Computing Implementation Guide 2.0
that the final testing encompasses all of the systems involved in the provision of the
service(s).
2. The tests should take into consideration threats that are unique to cloud computing, such as
hypervisor jumping and weak application program interfaces.
3. Testers should be aware of typical security issues that are particular to cloud environments
and virtualisation in order to have an understanding of the types of issue that may exist in
such an environment.
4. FIs should engage the CSP prior to engaging PT to understand any technical limitations of
testing and ensure awareness.
5. All vulnerabilities should be risk assessed, tracked and managed / treated appropriately.
6. Where the vulnerability is on a system not managed by the FI, there needs to be an agreed
upon remediation SLA that the CSP aligns to and disclose to the FIs.
7. In case responsibility for penetration tests on CSP side (i.e. in a SaaS model) proper
governance over this program should be in place. The FI should ensure that all weaknesses
and vulnerabilities are identified, risk assessment is conducted and gaps closed with priority
adequate for specific risk rating and in agreed timelines. Closing gaps conditions may be
regulated with the service contract between CSP and FI. In case of gaps that cannot be
mitigated an exception process should be triggered.
Control Objectives
Ensure log information are secured against unauthorized access and tampering
Verify that activities in the cloud are logged and correlated to detect security events and
scenarios
Ensure security events and incidents in the cloud environment are detected and responded to
in a timely manner
Page 30 of 52
ABS Cloud Computing Implementation Guide 2.0
2. FIs should identify specific cloud security incident scenarios and develop specific correlation
rules to detect such events. Where necessary, log parsers and correlation rules should be
customized for such events and incident.
3. An approach to leverage the data from the CSP’s SIEM architecture into the FI’s core
Intrusion Detection capability should be considered if possible.
4. FIs should consider the use of security analytics with machine learning capabilities to develop
baseline to detect potential anomalies in the cloud environment.
5. The FIs should ensure that CSPs have snapshots of critical databases or systems of record
for disaster recovery / business continuity.
Control Objectives
Log data should have robust controls to ensure their confidentiality and integrity.
Log data should not contain sensitive information
Ensure the confidentiality and integrity of backup data
Page 31 of 52
ABS Cloud Computing Implementation Guide 2.0
1. Change Management
It is expected that the FI maintains effective control over their data although it resides at the CSP. The
CSP should have in place controls that facilitate management, near real time capability to review any
privileged activities to ensure they are in line with approved processes. Consideration should be given
to Application, OS, Database and Network layers.
Where PaaS, or SaaS is used, the FI should consider the mode by which they are notified of material
changes to critical features or functions. CSPs can help FIs maintain appropriate oversight of material
changes by establishing dedicated compliance programs that facilitate engagement between the FIs
and the CSPs, and support notification of such changes.
Control Objectives
Ensure that all the changes follow a robust change management process that provides
oversight commensurate with their risk. This includes changes controlled by the CSP for
IaaS, PaaS and SaaS environments
Ensure oversight of major changes that could impact the stability and/or security of the cloud
operating environment.
Detection of unauthorised or erroneous changes
2. Configuration Management
Cloud is a dynamic environment where the core infrastructure can be set up and modified rapidly in
response to business and operational needs. Hence the configuration management of the software
defined environment is critical for the safe and secure operations of the cloud and information assets.
FIs should implement monitoring to detect unauthorized changes to the cloud environment. Where
possible, FIs should implement automated recovery to mitigate high risk changes.
Page 32 of 52
ABS Cloud Computing Implementation Guide 2.0
Control Objectives
Prevent unauthorized changes to the cloud environment, and ensure such changes are
detected and remediated to prevent high impact incidents
3. Event Management
The monitoring of infrastructure events is a responsibility that both the FIs and the CSP share. The
FIs are responsible for monitoring events that can impact the stability and or availability of their
applications and systems. Based on the service model, the CSP is usually responsible for events that
impact the underlying infrastructure of the FI's workloads, which could include the virtual environment,
containers or customer workloads.
Control Objectives:
Define and monitor key events to ensure the confidentiality, availability and integrity of the
cloud environment is not compromised
Provide early detection of network and system anomalies in the IT environment to facilitate
timely response to potentially developing technology and security incidents
Manage and escalate events appropriately according to their criticality and assigned
ownership
Page 33 of 52
ABS Cloud Computing Implementation Guide 2.0
Control Objectives:
Provide a reasonable level of retrospective detection of security incidents in the IT
environment as and when new threat intelligence is available
Provide assurance that technology and security incidents are appropriately escalated and
notified to the relevant stakeholders for management action
Provide assurance the incidents in the environment are properly reviewed and identified gaps
are remediated to prevent a reoccurrence
Ability to adhere to the relevant regulatory requirements (i.e. Notice 644 Technology Risk
Management)
Page 34 of 52
ABS Cloud Computing Implementation Guide 2.0
5. Capacity Management
The FI should have a clear view of its requirements to operate its resources to ensure that business
functions can proceed without any interruptions. The FI and CSP both have clear lines of
responsibility but it is imperative that the FI have insight into their workloads running on the cloud and
an SLA defined.
Business functions may have period spikes or strategic growth ambitions which technology should be
aware of.
Control Objectives
Business volumes are well understood and that capacity exists to support them
Resources are monitored appropriately to understand average utilisation and peaks
Systems have appropriate resources to allow for resiliency in the event of failure or unplanned
outage
Page 35 of 52
ABS Cloud Computing Implementation Guide 2.0
Control Objectives
Ensure there is clear ownership of all assets in the cloud environment, and that their criticality
is rated
Swiftly identify potential vulnerabilities and system instabilities
Swiftly and safely deploy security and operating system patches
Control Objectives:
Ensure the continued availability of services commensurate with their criticality in the cloud
environment
Ensure that data, systems and applications can be recovered within the time-frame required
by the FI
Page 36 of 52
ABS Cloud Computing Implementation Guide 2.0
3. There should be a communications plan or an automated call tree that covers both CSP and
FI staff.
4. Ensure that the FI’s crisis Management team is fully aware of the CSP’s recovery plan.
Page 37 of 52
ABS Cloud Computing Implementation Guide 2.0
Acknowledgements
The ABS Task Force Members:
1. ANZ Bank
2. DBS Bank
3. Credit Suisse
4. Singapore Exchange
5. Standard Chartered Bank
6. UBS
Page 38 of 52
ABS Cloud Computing Implementation Guide 2.0
1. Organisational 1. A FI should design and implement a suitable 1. Where critical services have been outsourced
governance body and roles, where appropriate representation on the governance body
Considerations with representatives of both the CSP and the should be of appropriately senior technology
for the FI. The governance body should be empowered and business representatives.
to oversee adherence to SLAs, review KPIs and 2. A single point of contact from the CSP should
Management
KRIs, incidents, security incidents and other be formally identified and given a sufficient
of CSPs relevant matters to the risks associated with mandate.
outsourcing. This governance body should 3. A defined escalation procedure should be put
meet periodically, the frequency determined in place for both the CSP and the FI to use.
by the materiality of the arrangement.
2. It is recommended that metrics provide a
complete view, both where controls are owned
and operated by the FI or the CSP. Interfaces to
internal governance bodies should also be
considered for FI owned controls.
3. Execution of oversight of cloud outsourcing
arrangements requires a specific skill-set. FIs
should be mindful that when outsourcing that
key staff and roles are identified and that their
knowledge is kept up to date by training or
other methods.
4. FIs should consider creating a specific role to
execute oversight of cloud outsourcing
arrangements.
5. When performing due diligence activities, or
during Audits and regulatory inspections it is
recommended to use appointed individuals
and a central point to coordinate activities
between the CSP, FI and the auditor.
6. Any incremental changes to outsourcing
controls should be managed via the
governance forum.
2. Control 1. Prior to embarking on any cloud outsourcing 1. FIs should assess their existing controls
arrangement a thorough technical risk assurance framework for the suitability of
Assessment & assessment of key controls should be managing cloud outsourcing. Key procedural
Monitoring performed based on the use cases. controls must be identified, mapped and
2. Where possible an FI should ensure that a effectiveness thresholds defined.
control failure triggers an automated response 2. Establish Management Information and
and notification. dashboard material for reporting on control
3. The FI should consider leveraging the controls assessments. Define an appropriate oversight
available in the cloud environment to enforce and escalation model to execute remediation
consistent security standards and baselines as activities which takes into consideration both
well as automated remediation where possible. FI and CSP owned activities.
3. FI should consider the use of analytics with
machine learning (ML) and other best in breed
technologies to develop baselines for
compliance checks to highlight and avoid non-
compliance.
Page 39 of 52
ABS Cloud Computing Implementation Guide 2.0
structure of the FI
4. Ensure there is training and educational
material for users of the cloud environment
which is tailored to help them understand the
best adoption methods and prevent wasteful
use of cloud resources.
5. Work with CSPs to create usage reports at
regular intervals which are made available to
account owners and for presentation to
appropriate governance forums. Ensure that
these reports are consumed in line with
technology financials and internal billing
standards
6. Define quotas for each sub account and put in
place alerts or triggers for accounts once a
threshold of spending has been reached
7. Cloud usage MI should consider both software
licensing, compute and storage costs.
8. Organisations should ensure that sufficient
funds are available to cover licensing costs, and
that controls are in place to prevent key
services being shut down.
Page 40 of 52
ABS Cloud Computing Implementation Guide 2.0
2. Virtualisation, 1. The FI should define a standard for 1. If the source code repository is hosted at the FI,
Containerisation containerization and DevOps methodologies. the binaries should be compiled on premise
While the CSP may provide the tools for the and only the source code artefacts need to be
and DevOps
FIs to manage and administer containers, the promoted and sent to the CSP.
FIs are responsible authorizing which ones are 2. Integrity checks should be performed on
available for use. container templates and any inconsistencies
2. Roles and responsibilities between the CSP and made detectable prior to use.
FI for the container strategy must be agreed 3. The FIs should have the appropriate checks to
upon and documented for operational prevent production data being used during
references. Ensure that source code testing in non-production environments. The
repositories are defined and managed at both use of masked or synthetic data is strongly
the FI and CSP. recommended.
3. The FI should carefully define its user access
and authentication strategy, particularly for
administrative users who have the ability to
manage and change these fundamental tools
supporting its cloud ecosystem.
4. The container images should contain a
standard set of configurations that are
designed and signed off by the FI. Standards
should be created for both production and
non-production images.
5. The ability to add security and vulnerability
patching where applicable to the containers
and virtual machine are done to the base
image in a controlled manner and adheres to
the standard change management process.
6. Ensure that changes to the container images
are fully audited.
Page 41 of 52
ABS Cloud Computing Implementation Guide 2.0
3. Resiliency in 1. FIs could maximize the redundancy by 1. FIs should design their workload to leverage on
Cloud designing and distributing their production available functionalities such as
workloads across the available clusters within containerization and auto-scaling to automate
Architectures
each region. the swift recovery of their services.
2. FIs should implement automated health checks 2. FIs should also adopt fault tolerant techniques
and monitoring to detect service faults or such as Retry, Circuit Breakers and Bulkhead
outages in the cloud environment. Isolation in their design of their workload
3. Where possible, FIs should design their which are sensitive to faults or failures.
workload and applications to automatically 3. For workloads that are sensitive to latency FIs
handle known exceptions or failures to ensure should implement the workload in the region
their cloud service can recover swiftly in an that is closest to their customers or consider
event of an incident. options to optimise customer experience (such
as content delivery networks).
4. For workloads that require higher availability,
FIs can consider distributing the workload
across multiple regions. At minimum, the FIs
should make plans to recover their services in a
different region to mitigate against the regional
service outages.
5. While data within each region is automatically
replicated across the available clusters, FIs
should consider strategies for replicating data
across regions to ensure data availability in an
event of failures or service faults within each
region.
6. FIs should put in place a resumption plan for its
critical services in an event of a total outage of
cloud services. Some of the options that the FI
cloud consider include implementing critical
workload on two different CSPs or retention of
on premise capabilities for added resiliency.
4. Network 1. FI should implement measures to secure the 1. Dedicated network connectivity should be
Architectures cloud and on premise environments to implemented from the FI to the cloud
mitigate contagion risks. Controls should be environment, and remote administrator access
implemented between the cloud and the FI’s to the cloud environment over the Internet
on premise environment and at the should be restricted.
ingress/egress points to mitigate against such 2. The controls in the cloud environment should
threats. be equivalent if not more secure than the FI’s
2. It is considered best practice for administrative on premise environment.
interfaces to be on a segregated management 3. Alternatively, FIs can consider rerouting the
network that is not accessible from the cloud traffic through the FIs’ on premise
operational subnets. environment to benefit from their existing on
3. Network access and security controls such as premise security controls.
firewalls, IPS, advance threat protection and 4. FI should set up a dedicated security network
web proxy should be implemented to secure segment to control all ingress and egress traffic
the on premise environment from the cloud. from the cloud environment.
4. The FI should have network access and 5. If possible Micro Segmentation to be
Page 42 of 52
ABS Cloud Computing Implementation Guide 2.0
5. Cryptographic 1. Keys should be rotated regularly in accordance 1. FIs should generate their own unique
Key Management with the industry best practices. Certificate cryptographic keys and secure the keys in the
revocation should also be tested from time to Cloud environment.
time. 2. At minimum, the cloud based HSM should
2. Detailed policies and procedures should be in meet the FIPS and Common Criteria for
place to govern the lifecycle of cryptographic cryptographic products.
material from generation, storage, usage, 3. Where encryption is used, the encryption keys
revocation, expiration, renewal, to archival of should be stored separately from virtual
cryptographic keys. images and information assets.
3. Backups of cryptographic material should be 4. FIs may consider HSM as a service or deploying
considered. These should ensure that the keys their own HSM for particularly critical
cannot be compromised and are subject to workloads.
strict oversight and segregation of duties 5. Carefully designed processes including
principles. No one key custodian should have appropriate key ceremonies should be in place
access to the entire key. if cryptographic keys and SSL private key
containers belonging to the FI need to be
introduced into the CSP environment.
6. Offline storage in a suitably secure and
fireproof environment should be considered
for critical cryptographic material, the loss of
which may materially impact the FI's ability to
recover data or operate. This should be
included in disaster recovery planning
scenarios.
7. FIs should leverage on a FIPS 140-2 Level 3
validated HSMs to secure their cryptographic
keys, and access to the HSM should be secured
with multi-factor authentication.
8. Where possible, access to the HSM should be
secured using multi-factor authentication.
Page 43 of 52
ABS Cloud Computing Implementation Guide 2.0
8. User Access 1. For each Cloud deployment there will be a 1. Multifactor authentication should be
Management & master account. It is recommended only to use considered for user access to critical
this account by exception. workloads.
Authentication
2. Identity and Access management should be a 2. Where CSPs have access to the FI’s systems or
paramount consideration when performing a software, this should be captured in an identity
cloud outsourcing arrangement, and should and access management document, which
incorporate both technical and business user should be reviewed at least annually for the
access management. A clear business owner accuracy of requirements, and that the
should be identified to ensure accountability, configuration in the document matches the
and ownership of each role defined. system state.
3. An FI’s Identity and Access management
policies and standards should be applied in full
in the CSP for Production and UAT
environments used by the FI to ensure
consistency.
4. For end users, especially where corporate users
are concerned, federation of Active Directory
credentials could be used to allow an FI’s
existing processes and infrastructure to be
leveraged.
5. Where federation is used, or another cloud
based directory leveraged, the directory
synchronization model, security requirements
and redundancy controls for any
synchronization tools should be reviewed and
Page 44 of 52
ABS Cloud Computing Implementation Guide 2.0
9. Privileged User 1. Users with privileged system access should be 1. There should be a mechanism in place to
Access clearly defined and subject to regular user detect when unauthorised accounts are
access reviews. created that can access criticality rated
Management
2. Privileged User access should be clearly tracked information assets.
(PUAM)
and reported, and be linked to an agreed and 2. Multifactor authentication should be mandated
approved change request when related to the for privileged access to material workloads.
FI's data. Note it is not always necessary for the
CSP to disclose change requests to the FI
3. The Privileged User Administration function
should be subject to segregation of duties and
separate from any user administrator function.
4. Privileged User Access should be in line with
the "never alone" principles laid out in the MAS
Technology Risk Management guidelines. There
may be high risk situations where a break glass
procedure is required and dual controls
circumvented. These situations should be
defined in advance and subject to rigorous
after the face reviews to provide assurance
that no erroneous or unauthorized changes
were introduced.
5. Multifactor authentication should be strongly
considered for all privileged access.
Page 45 of 52
ABS Cloud Computing Implementation Guide 2.0
10. Administrative 1. Detailed documentation of all systems remote 1. FIs should implement a direct private
Remote Access access procedures including security controls connection from their data centre to the cloud
management. This documentation should be environment, and restrict all direct remote
regularly reviewed to ensure accuracy and access to the cloud environment over the
currency. Internet.
2. All interfaces to cloud computing infrastructure 2. Where Internet access to the CSP cloud
should be consistent where possible so that management console cannot be disabled, FIs
remote access controls are uniformly should implement a complex passwords and
controlled. multi-factor authentication for the login
3. These interfaces should provide discrete account. These accounts should be limited to
segregated data flows to ensure that there is a emergencies only and not used to support day
secured and auditable method of accessing to day operations.
systems and data. 3. As the administrator account to the CSP cloud
4. Remote access security measures such as two management console cannot be locked out, FI
factor authentication, and Virtual Private should monitor for unauthorized access to the
Network (VPN) encryption should be accounts or password guessing attempts to
implemented. break into the account. FIs should consider
5. Where possible remote access network traffic changing the password periodically.
should have defined source and destination. 4. The FI should consider restricting access to
6. End User Computing device controls should be certain parts of the network by remote access
considered, for instance access only from users. Jump boxes should also be considered
recognized hardware using machine for additional security.
authentication, or virtual desktops interfaces to
reduce risk of malware contamination or
unauthorized access.
7. Privileged remote access should only be
permitted by authorized exception or break
glass procedures and be time bound. Privileged
remote access is inherently risky and must be
strictly controlled.
8. All privileged remote access is to be reviewed
for appropriateness by independent and
qualified personnel.
11. Data Loss 1. The FI should review their information asset 1. The FI should perform periodic reviews of the
Prevention classification framework to ensure that users that are able to approve exceptions to
encompasses considerations for the cloud. The DLP policies.
FI may wish to consider enhanced controls for 2. FIs should monitor the ingress and egress
high value information assets that reside in the points for the use or adoption of unsanctioned
cloud such as strong encryption, tokenization cloud services or shadow IT to support internal
and logical segregation. business processes or operations.
2. Where data in transit crosses cloud 3. Data loss prevention controls should be
deployments content inspection technologies implemented to secure access from the
should be deployed to identify and, where internet to the cloud services, and control
appropriate, quarantine information assets downloading and extraction of information
that contain personally identifying information from the cloud services.
(PII) or customer information (CI). Policies 4. FIs should analyse changes in the use of the
containing the identification criteria should cloud services to detect suspicious and
have defined owners and be subject to periodic anomalous activities in cloud environment and
review. unusual access to the data.
3. Where cloud services are accessible via the 5. FI should have a Data Loss Governance and risk
Internet, data loss prevention controls such as management framework defined which should
cloud access security broker should be integrate with its capabilities in the cloud.
implemented to monitor and control the access Templates and patterns for sensitive data
of the information. should be defined, and metrics regularly
reviewed. An appropriate consequence
management framework should also be
defined and agreed between the CSP and the
FI.
Page 46 of 52
ABS Cloud Computing Implementation Guide 2.0
12. Source Code 1. Guidelines for secure by design software 1. For source code relating to material systems it
Reviews development should be clearly defined and is recommended that enhanced reviews
all developers trained on these approaches. including manual source code review are
Common considerations include coding performed.
approaches to ensure that OWASP Top 10 2. The source code should be updated and
security risks do not occur, and that tested regularly for new security and
applications fail safe in the event of vulnerabilities.
unexpected behaviour. 3. Where source code is used for any material
2. Content version controls, and strict processes purposes, it is strongly recommended to
for the migration of source code from one perform a risk assessment to determine if it is
environment to another should be clearly necessary to compile binaries within the FI’s
defined as part of a release management own networks and copy the binaries into the
process. Cloud. The recommendation is to compile on
3. Segregation of duties can be accomplished in the FI’s network and push the artefacts to the
an automated fashion by introducing a CI/CD cloud.
pipeline for controlled testing across the
different environments
4. Access to source code repositories and
privileged access to the development and
testing environments are restricted to only
specific authorized individuals.
5. Unencrypted customer data should not be
used for testing in the Cloud environment.
Test data must be de-personalised before it is
transferred into the CSP’s environment.
6. The processes supporting release
management should ensure that source code
which has been subjected to reviews
(automated or manual) and cannot be
tampered with by the author after it has been
reviewed.
7. Automated source code applications should
be regularly updated and reviewed to ensure
currency and accuracy of their findings.
13. Penetration 1. CSP penetration test reports can be used to 1. An FI should consider using a Red Teaming
Testing gain assurance over the security of underlying approach to testing the CSP's environment. It
systems but the scope should be reviewed to is also recommended that testing is
fully understand what has been tested to performed on live systems subject to safety
ensure that the final testing encompasses all protocols to prevent any disruption of service.
of the systems involved in the provision of 2. PT scope should include application upstream
the service(s). and downstream dependencies, as well as any
2. The tests should take into consideration centralised release management or source
threats that are unique to cloud computing, code systems that the application utilises.
such as hypervisor jumping and weak
application program interfaces.
3. Testers should be aware of typical security
issues that are particular to cloud
environments and virtualisation in order to
have an understanding of the types of issue
that may exist in such an environment.
4. FIs should engage the CSP prior to engaging
PT to understand any technical limitations of
testing and ensure awareness.
5. All vulnerabilities should be risk assessed,
tracked and managed / treated appropriately.
6. Where the vulnerability is on a system not
managed by the FI, there needs to be an
agreed upon remediation SLA that the CSP
Page 47 of 52
ABS Cloud Computing Implementation Guide 2.0
14. Security Events 1. Secure and robust security logging 1. Appropriate monitoring infrastructure such as
Monitoring infrastructure should be leveraged. a Security Incident and Event Monitoring
Consolidation of logs to a centralized system (SIEM) system should be in place to provide
should be in place to ensure that the integrity automatic analysis, correlation, and triage of
and availability of the logs are maintained. security logs from the various monitoring
2. The centralized log server should be secured systems.
and segregated from the operational 2. FIs should identify specific cloud security
environment to prevent unauthorized or incident scenarios and develop specific
accidental purging of the log information. correlation rules to detect such events. Where
3. Logs should be streamed back to the FI for necessary, log parsers and correlation rules
security incident and event correlation. should be customized for such events and
incident.
3. An approach to leverage the data from the
CSP’s SIEM architecture into the FI’s core
Intrusion Detection capability should be
considered if possible.
4. FIs should consider the use of security
analytics with machine learning capabilities to
develop baseline to detect potential
anomalies in the cloud environment.
5. The FIs should ensure that CSPs have
snapshots of critical databases or systems of
record for disaster recovery / business
continuity.
15. Securing Logs 1. FI application development teams should 1. Snapshots should be considered to enhance
and Backup ensure that no CID is logged. RPO capabilities particularly for critical
2. The FI should establish requirements for databases or systems of record. These should
forensic investigation including how to ensure be timed ahead of key activities such as cut
that log data can be acquired in a streamlined off times or End of Day batch procedures.
sound manner.
3. The FI should have the appropriate access
control in place for backups and log data.
4. FIs should consider the contents of backups
and encrypt sensitive data where appropriate.
5. FIs should give due consideration to the
management of encryption keys used for
backup purposes.
6. The capability to recover data in a usable form
should be regularly tested by the FI. Such
restoration tests must be conducted securely
to minimise any risk of data leakage.
Page 48 of 52
ABS Cloud Computing Implementation Guide 2.0
1. Change 1. Change management procedures should be 1. FI should ensure that there is a process in
mutually agreed between the CSP and the FI. place and scenarios defined where the CSP is
Management
Such procedures should be formalised, and required notify in advance of changes to
include change request and approval
critical services. Where appropriate, the FI
procedures, as well as a reporting component.
2. Procedures for emergency and standard should consider opportunities to test the
changes should be agreed, including the roles deployment before those changes are
and responsibilities, and defined change implemented in their environment.
windows for patching and software releases. 2. Change management governance should be
3. Where DevOps practices are being used, incorporated into regular Service Level
conditions and scenarios that allow Management meetings.
automated testing and releases should be 3. FIs should review the change management
defined. It is important to ensure that there is procedures of the CSP, which should be
a full audit trail, record of the changes and independently assessed in line with OSPAR,
evidence of pre-approval. SOC2 or other controls assessments.
4. FI should ensure that CSPs have well-defined
change windows, testing and rollback plans,
and an internal signoff procedure for any
material changes that need to be
implemented by the CSP. This can be
evidenced via independent control testing.
5. FI should consider conducting post change
testing where critical business functions may
be impacted, including documented and
evidenced test cases.
2. Configuration 1. Roles for the configuration of the cloud 1. FIs should create environmental baselines,
Management environment should be clearly defined, and establish a process to review the baselines
segregation of duties should be considered periodically, and monitor deviations from the
for the design of the cloud roles for both the baselines. These metrics should be reported at
FIs and CSP. the Cloud governance forum and to
2. At minimum, the infrastructure, security and appropriate service owners.
application roles should be segregated to
prevent environmental changes which would 2. Where possible, FIs should implement auto-
allow the security controls to be bypassed. remediation to revert the environment to the
3. Privilege for the infrastructure changes should baseline configurations where strict
be managed centrally, and the configuration enforcement of the baselines is required.
of the environment should be closely
monitored for unauthorized changes.
4. FIs should consider establishing standard
server images for consistent and secure
creation of new servers
5. Key environment changes should be
monitored and automated alerts should be
triggered to alert the security or the
infrastructure team.
6. FIs should consider auto-remediation for high
impact changes such as configuration of
internet gateways or server images.
3. Events 1. FIs should ensure there is a framework for 1. SLAs for critical events should be established
Management event categorization, impact, responsibility between the FI and the CSP. This should be
and the actions taken to address them. done in accordance with an escalation matrix
2. Appropriate detection mechanisms should be to notify the appropriate parties.
in place at the network, system, and 2. Events that have been rated as material
application level to analyse events that could should be immediately visible in network or
affect the security and stability of the cloud technology operations centres so that they
service. can be responded to in a timely manner.
3. Security and technology events and the 3. The FI should define playbooks for recovery
Page 49 of 52
ABS Cloud Computing Implementation Guide 2.0
4. Incident & 1. Criteria and performance requirements i.e. 1. A Computer Emergency Response Team
Problem SLA for the escalation, notification, (CERT) or Security Incident Response Team
containment, and closure of relevant security (SIRT) should be in place to provide timely
Management
and technology incidents should be response to security incidents. Coordination
appropriately defined and agreed between between the CSP and FIs’ teams should be
the FI and the CSP, especially where formalised.
regulatory instruments such as Directives and 2. Appropriate security systems and measures,
Notices stipulate timelines such as network intrusion
2. Learning points captured from past incidents detection/prevention systems (NIDPS), web
as knowledge articles for continuous application firewall (WAF), DDoS mitigation,
improvement to the process. and data leakage prevention systems, should
3. Access to appropriate reports on relevant be deployed at strategic locations to detect
incidents and root cause analysis should be and mitigate security breaches and ongoing
agreed between the FI and the CSP. Where attacks.
the CSP has commercial, security or 3. Based on the materiality of the outsourcing
intellectual property reasons to not disclose arrangement, integration into a Security
such reports directly to the FI, the use of a Operations Centre (SOC) and / or Technology
mutually acceptable independent 3rd party Operations Centre (TOC) operating on a 24x7
can be agreed. basis should be strongly recommended to
4. CSP should provide reasonable access to provide active monitoring of security events,
necessary information to assist in any FI technology incidents and ensure timely
investigation arising due to an incident in the escalation and management of issues.
cloud, to the extent that it is does not 4. While it is recognized that it is usually the FI's
contravene any other legal obligations. responsibility to identify a relevant incident
5. Incidents that have considered to have a under Notice 644, there are situations where
material impact to the FI should be subject to systems or applications designated MAS
formalized post incident reviews and problem Critical may be fully managed by the CSP,
management. particularly SaaS or white-labelling. In these
6. Where commonly occurring incidents become situations a contractual requirement should
formally recognized as systemic issues, be included to ensure notification to the FI as
Problem Management should be put in place soon as possible after the detection of a
to ensure that an appropriate remediation is relevant incident. The FI is then required to
identified and implemented. notify the MAS within 60m of receiving this
7. Metrics on incidents and problem tickets notification. The CSP should include as much
should be regularly reviewed and discussed at information as possible in this notification to
the Cloud governance boards. allow for the required regulatory submission.
If all data points are not available at that time
the CSP should ensure these are delivered
within a reasonable timeframe, which should
not exceed 24 hours after the original
notification.
5. Review and testing of the incident response
plan should be conducted on a regular basis
by the CSP and involve the FI where
appropriate
5. Capacity 1. The FIs should define a monitoring and 1. Automated increase for quotas for material
Management metrics strategy with the CSP and leverage workloads should be considered and
the monitoring capabilities provided by the thresholds regularly reviewed for
CSP and define appropriate metrics for its appropriateness
applications. 2. The FIs need to ensure that business
2. The FI's technology operations team should strategies and requirements, including special
monitor and review capacity utilisation and events such as index rebalancing, are taken
Page 50 of 52
ABS Cloud Computing Implementation Guide 2.0
6. Patching and 1. FIs should maintain an inventory of the 1. FIs should conduct a periodic assessment to
Vulnerability software used in the cloud environment, and identify new vulnerabilities, and schedule the
track the vulnerabilities announced by the patching activities to remediate the
Management
respective technology vendors. vulnerabilities in accordance with their
2. The SW inventory should also be used to track criticality.
software life cycle so that informed decisions 2. In events where the patches cannot be
can be made to replace or have mitigating applied to address the vulnerabilities
controls. promptly, FIs should consider the use of
3. Where possible, FIs should containerized their security controls (e.g. network access control,
applications in the cloud environment to intrusion prevention systems) to mitigate the
facilitate prompt patching while minimizing risk of exploit.
impact to the cloud workload. 3. The FIs should ensure that there is a robust
4. The FI should work with the CSP and process in place to review and remediate any
understand capabilities in their offerings that vulnerabilities in a timely manner and
would help best with vulnerability and prioritise over the vulnerabilities of standard
patching management. workloads
5. The CSP should be able to demonstrate the 4. An exception process needs to be created for
status of their compliance with published any vulnerabilities that cannot be remediated.
vulnerabilities and their ability to patch when
required.
7. Collaborative 1. The CSP should develop disaster recovery and 1. The FI should develop disaster recovery plans
Disaster business continuity plans and where for its assets in the Cloud, and test these at
appropriate share the plans with the FI. least annually. Tests should be validated for
Recovery Testing
2. Ensure that all changes in the computing accuracy, completeness, and validity of
environment are reflected in the disaster recovery procedures.
recovery plan, and that all facilities are 2. FI and CSP personnel involved in disaster
available. recovery procedures should be aware of their
3. There should be a communications plan or an responsibilities and capable of executing
automated call tree that covers both CSP and them. These should be tested at least
FI staff. annually.
4. Ensure that the FI’s crisis Management team 3. CSPs should obtain necessary certifications for
is fully aware of the CSP’s recovery plan. disaster recovery (e.g. ISO27001 and validated
against ISO27018) and their processes should
be audited by independent third parties with
such audit reports made available to the FI.
4. When performing DR testing with the CSP,
consider doing spot checks or testing on short
notice to validate their level of readiness for
an actual disaster event.
5. Ensure that any deficiencies noted during
testing are recorded, and the implementation
of corrective actions is monitored via the
appropriate governance bodies.
6. Various disaster recovery scenarios including
both component failure, full site loss and
partial failures should be incorporated into
the testing plan. These scenarios should be
tested according to a strategy defined by the
bank in line with its business continuity policy
7. The scalable and redundant nature of cloud
outsourcing arrangements allows for more
rigorous testing, including the failure of
active-active configurations. It is
recommended to regularly test these
capabilities, and to keep services failed over
Page 51 of 52
ABS Cloud Computing Implementation Guide 2.0
Page 52 of 52