Deployment and Service Model Risk in Cloud
Deployment and Service Model Risk in Cloud
| Cloud Service Model | |
| Software as a Service (SaaS) | · Application
· CRM |
| Platform as a Service (PaaS) CloudOS | · Operating System
· Windows · Linux |
| Infrastructure as a Service (IaaS) | · Connectivity
· Utilities · Virtual Machine · Hypervisor · Servers · Storage · Networking · Connectivity · Data Center |
| Responsibilities, by service model for Public Cloud | |||
| Infrastructure as a Service (IaaS) | Platform as a Service (PaaS) | Software as a Service (SaaS) | |
| Governance, Risk and Compliance | Customer Responsibility | Customer Responsibility | Customer Responsibility |
| Data Security | Customer Responsibility | Customer Responsibility | Customer Responsibility |
| Application Security | Customer Responsibility | Customer Responsibility | Shared Responsibility |
| Platform Security | Customer Responsibility | Shared Responsibility | Cloud Service Provider Responsibility |
| Infrastructure Security | Shared Responsibility | Cloud Service Provider Responsibility | Cloud Service Provider Responsibility |
| Physical Security | Cloud Service Provider Responsibility | Cloud Service Provider Responsibility | Cloud Service Provider Responsibility |
| Risk Private Cloud faces | Risk Public Cloud faces |
| Personnel Threats | Personnel Threats |
| Natural Disasters | Natural Disasters |
| External Attacks | External Attacks |
| Regulatory Noncompliance | Regulatory Noncompliance |
| Malware | Malware |
| Vendor Lock-in (Customer-Risk)
· Ensure favorable contract term for portability · Avoid proprietary Formats · No physical limitation to moving · Regulatory constraints |
|
| Vendor Lock-out (Customer- Risk)
· Provider Longevity · Core Competency · Jurisdictional Suitability · Supply Chain Dependencies · Legislative Environment |
|
| Multitenant Environment (Customer- Risk)
· Conflict of interest · Escalation of Privilege · Information Bleed · Legal Activity |
| Infrastructure as a Service (IaaS) | Platform as a Service (PaaS) | Software as a Service (SaaS) |
| Personal Threats | Personal Threats | Personal Threats |
| External Threats | External Threats | External Threats |
| Lack of Specific Skillsets | Lack of Specific Skillsets | Lack of Specific Skillsets |
| Interoperability Issues | Interoperability Issues | |
| Virtualization | Virtualization | |
| Resource Sharing | Resource Sharing | |
| Proprietary Formats | ||
| Virtualization
· Attacks on the Hypervisor · Guest Escape · Information Bleed · Data Seizure |
||
| Web Application Security |
| Private Cloud Threats | Countermeasure | Public Cloud Threats |
| Malware | Host-based Antimalware
Network-based Antimalware |
Malware |
| Internal Threats | · Background checks
· Separation of duties · Least privilege · Monitoring · Egress monitoring |
Internal Threats |
| External Attackers | · Harden devices, hypervisors, and guess os (VM)
· Strong Access Control |
External Attackers |
| Man-in-the-Middle Attacks | · Encrypt data in transit | Man-in-the-Middle Attacks |
| Social Engineering | · Regularly Training | Social Engineering |
| Theft/Loss of Devices | · Physical Access Control
· Encryption of store material · Inventory Control and monitoring · Remote wipe or kill cap |
Theft/Loss of Devices |
| Regulatory Violations | · Knowledgeable train personnel
· DRM |
Regulatory Violations |
| Natural Disasters | · Multiple redundancies
· ISP and utilities · BCP/DR |
Natural Disasters |
| · Access control and authentication
· Analysis and review of all logs data |
Escalation of Privilege | |
| · Off-site back or trusted third party vendor | Contractual Failure |