WI3 - Cloud Security Best Practices - 06112020
WI3 - Cloud Security Best Practices - 06112020
Best Practices
Guidelines/ Best Practices for User Departments on Cloud Security
DISCLAIMER
This document has been prepared by Cloud Management Office (CMO) under Ministry of
Electronics and Information Technology (MeitY). This document is advisory in nature and aims
to provide information in respect of the GI Cloud (MeghRaj) Initiative.
While every care has been taken to ensure that the contents of this Document are accurate and
up to date, the readers are advised to exercise discretion and verify the precise current
provisions of law and other applicable instructions from the original sources. It represents
practices as on the date of issue of this Document, which are subject to change without notice.
The document enlists practices around basic controls and is not prescriptive in nature. The
readers are responsible for making their own independent assessment of the information in
this document.
In no event shall MeitY or its' contractors be liable for any compensations whatsoever
(including, without restriction, damages for loss of profits, business interruption, loss of
information) arising out of the use of or inability to use this document.
Contents
1. Purpose................................................................................................................................................................ 6
2. Background ........................................................................................................................................................ 7
3. Introduction ....................................................................................................................................................... 8
5.1.1 Data................................................................................................................................................. 18
5.4.1 ISO/ IEC 27000 Family of Information Security Management System .................. 36
1. Purpose
This document is prepared to assist the Government Departments in easier understanding &
navigating through the best practices for Cloud Security. Cloud Security is one of the key
aspects while considering cloud deployment options and imbibing the best practices laid
down in this document shall further the Government Department’s trust on Cloud and thereby
facilitate a better use and adoption.
The document has primarily been segmented into 3 sections of which the first section shall
deal with the approach and need of cloud security. The second section shall compare the
aspects of traditional vs cloud security along with best practices of cloud security broken down
across the various layers of Cloud. The final section elaborates on the shared responsibility
model of Cloud Security wherein the Departments and Cloud Service Providers play critical
roles in ensuring security of the cloud deployment.
2. Background
The Government of India has paved the way for mass adoption of Cloud services by the
Government and Public sector organizations by empaneling the CSPs with Ministry of
Electronics & Information Technology (MeitY). The CSPs are empaneled to offer Infrastructure
as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) under the
three Cloud Deployment models namely, Public Cloud (PC), Virtual Private Cloud (VPC) and
Government Community Cloud (GCC).
With time, the Government Departments have started evaluating, planning, and adopting
Cloud Services from the empaneled CSPs. As the adoption of technology within the
Government Departments is evolving, it is intrinsic that the application workloads of the
Government Departments are becoming complex in nature. Hence, it has become a
prerogative for the Government Departments to imbibe certain practices around security while
designing the cloud deployment for the workload.
Gaps in Cloud Security: While Cloud adoption across departments is progressing, Security is
the key area to safeguard the Government data, so Department stakeholders must be aware
of Cloud security best practices to address the security of data, information processing and
technical measures in Cloud computing to protect it against unauthorized access of the data
processing and travelling over internet/network and prevent accidental or unlawful tempering
of data or loss/theft of data. Departments to adopt the required controls to restrict
unauthorized use of data/information. Thus, it is imperative to develop certain practices
around Cloud Security which will enable the Government Departments in ensuring a robust
cloud deployment architecture and application security on CSP platform.
3. Introduction
3.1 Security in Cloud
Information Technology Security also known as, IT Security is the process of implementing
measures and systems designed to securely protect and safeguard information (department
and personal data, conversational information, still images, motion pictures, multimedia
presentations, including those not yet conceived) utilizing various forms of technology
developed to create, store, use and exchange such information against any unauthorized
access, misuse, malfunction, modification, destruction, or improper disclosure, thereby
preserving the value, confidentiality, integrity, availability, intended use and its ability to
perform their permitted critical functions.
Cloud security encompasses managing people, process & technology with thorough policies,
that safeguard data and applications operating in the cloud. Cloud security includes examining
how a Government department processes and stores data and then outline a customized
approach to comprehensively protect the data. Departments can rarely afford a monumental
hit to their reputation, so employing the best cloud security practices is critical for any modern
department.
Cloud security has evolved pretty much as security has evolved for all new technologies and
innovations. In the unfortunate event of a Government department experiencing such a
breach, having a cloud incident response plan in place is crucial to mitigate the impact of
suspicious activity and minimize damage. Enduring any catastrophic event is traumatic
enough, but how the department reacts after such an event will often determine the fate of
that department. The department’s response plan will often determine the cost of a cyber
breach.
The adoption of cloud computing within Government Departments has created tremendous
opportunity not only for cloud service providers, but also for cloud security specialists.
Virtual Private Cloud allows for logical separation of infrastructure (server, storage,
network) from other offerings of the Cloud Service Provider with strong/robust tenant
isolation
In a public cloud offering ensuring cloud security through the use of software controls, role-
based permissions, storage, hypervisor separation is made available. In case the Departments
seek further level of isolation or separation of workload and data between the cloud
consumers, other Cloud Deployment Models such as GCC or VPC may be considered.
With inherent benefits of cloud enabling Government Department to focus majorly on their
applications, cloud security has always been an area which draws major attention while
evaluating cloud. Though the empanelment addresses security requirements to be met by the
empaneled CSPs, Government Departments would additionally need to adopt certain practices
to securely roll-out their applications/services. Certain practices around cloud security which
the Departments may adopt in their cloud enablement journey are highlighted in this
document.
In the cloud environment, Departments rely on CSP security and control to maintain the secure
environment and mitigate potential risk, if Cloud Service Provider (CSP) does not adequately
manage the responsibility of addressing IT and Cyber security parameters / controls at each
layer, the way it should be placed in Cloud environment. So, Departments needs to ensure
required Security Service Level Agreements (SLAs) are in place for CSP to adhere with
necessary security services.
Government Departments directly or through their SIs, MSPs need to collaborate with CSPs in
order to secure their critical data and ensure necessary security measures are in place. Apart
from MeitY imposed regulations/ compliances, a security fabric needs to be merged at the
data centre and cloud level. Issues such as insider threats are becoming a prevalent concern
for many CSPs. Certain security concerns (including some OWASP Cloud Security risks) have
been covered below:
Improper
Cloud Malicious
Account Insider
Mgmt.
Security
Concerns
Denial of Insecure
Service API
Insufficient Shared
Due Responsibility
Diligence
Regulatory
Compliance
1. Data Breaches
Though Cloud computing services are new and critical, yet data breaches in all forms
have existed for decades. One of the main questions which generally Government
Departments come across is “With department’s sensitive data being stored online
rather than on premise, is the cloud safe?”
Cloud would provide the User Departments with enhanced security measures and
necessary certifications. As per the MeitY empanelment of Cloud Service Provider (CSP),
all CSPs enforce security controls as per ISO 27001, 27017 etc. but due to non-
enforcement of security policies by the Government Department users it may lead to
data breaches.
The development and execution of the cloud in many organizations has opened a
whole new set of issues in account attacks and hijackings.
Attackers now can use the department’s cloud login accounts information to remotely
access critical/sensitive data stored on the platform / cloud; additionally, attackers can
misrepresent and manipulate information through hijacked credentials.
3. Insider Threat
An intrusion in Government department may seem unlikely, but the insider threat does
exist. Government Department’s users can use their authorized access to department’s
cloud-based services to misuse or access information such as citizen information,
financial information, and other sensitive information.
4. Regulatory Compliance
Data that is perceived to be secure in one country may not be perceived as secure in
another country or region. Hence data ownership and governance become important
factors while choosing cloud.
As per MeitY’s empanelment all empaneled Cloud Service Provider would be offering
cloud services out of Indian Data Centre facilities and ensure data residency within the
country. Data ownership resides with the Government Department.
5. Insecure APIs
The growth of APIs provides better services and do increase security risks. APIs give
programmers the gears to build their programs to integrate their applications. The
vulnerability of an API lies in the communication that takes place between applications.
They also originate an opportunity for exploitable security risks.
Unlike other kinds of cyberattacks, which are launched to establish a foothold and
extract sensitive information over a longer span of time, denial-of-service attacks do
not attempt to just breach the security perimeter. Rather, they attempt to make the
services and servers unavailable to Department’s legitimate users. In certain cases, DoS
is also used as a cover for malicious activities and directed attack to take down security
appliances such as WAF (Web Application Firewalls).
The issues listed above are technical in nature, however this particular security gap
occurs when a Government Department doesn’t have a clear path for its resources and
policies for the cloud.
Due diligence for controls internal to cloud services need to be monitored by the
Government Departments. There are multiple service parameters which need to be
configured in a manner that they may not lead to operational, reputational or
compliance issues. Insufficient due diligence may pose a major security risk when a
Government Department overlooks certain cloud configurations at the user level.
8. Shared Responsibilities
Cloud security is a shared responsibility between the Cloud Service Provider and the
Cloud consumer. This collaboration between consumer and provider requires the
consumer to take necessary actions to protect their data. While major global Cloud
Service Providers do have standardized procedures to secure their side, fine grain
controls are up to the consumers.
The bottom line is that consumers and providers have shared responsibilities and
omitting the user’s responsibilities can result in their data being compromised. For
further details kindly refer to Section 5 Cloud Security as a Shared Responsibility
Model.
9. Data Loss
Data on cloud platform can be lost through a natural disaster, data deletion or
malicious attack by the service provider. Losing critical data / information can be
devastating to businesses without a recovery plan.
The Open Web Application Security Project (OWASP) has additionally listed certain Cloud
Security concerns such as User Identity Federation, Business Continuity and Resilience, Service
and Data integration, Multi-tenancy and Physical security, Infrastructure Security which have
been addressed in the requirements laid down as a part of empanelment of Cloud Service
Providers by MeitY. These requirements make CSPs accountable for their responsibilities
towards cloud security.
Data also plays a primary role in defining and outlining various IT security policies, be it on-
premise or cloud setup. While some departments prefer in-house data collection and
management, others opt for cloud migration because of its services availability and scalability.
Cloud technologies have ensured easier management of data, especially ensuring enhanced
data security. As the cloud ensures on demand infrastructure access, Departments are able to
implement and maintain effective and efficient cloud security frameworks that can manage
and tackle emergent threats.
Cloud Security
Differentiating between traditional IT security and cloud security is very important. Each has
its own set of advantages / limitations and being aware of both approaches will strengthen
the Department’s operational decision making.
A traditional IT approach gives the department increased control over daily usage of each
device. It is possible to monitor and control data along with daily data management and the
data resides within department premises. Though an on-premise setup would need training
of existing Department resources on emerging security technologies.
However, the biggest challenge with traditional IT systems is the Capital Expenditure
required to install and maintain the security components. Asset refresh for end of life security
components would also add to capital expenditure for the departments. The department is
tasked with the responsibility to manage and monitor security related compliances /
certifications which in turn are capital intensive and would require internal capabilities within
the Department. Hence gaps in the security related practices may give rise to vulnerabilities.
Traditional IT systems also demand larger in-house personnel to manage the hardware and
handle security incident responses and monitoring. While this may lead to additional control
over data processes, there lies considerable cost implications.
Cloud computing allows the Government Departments to access the software, hardware, and
other necessary infrastructure required to run its daily operations. Furthermore, the cloud
ensures easier data management and system security. Instead of controlling every aspect of
data security control on-site, the Department can easily outsource the data security needs
to a prominent and reputable Managed Service Provider.
On-premises infrastructure may be more exposed to small slip-ups and errors that can be
prone to cyber-attacks. Furthermore, most cloud developers are more experienced with
advanced security and data governance models. This means that the Departments will be
able to plan appropriate strategies to ensure real time risk mitigation. An important reason
for the reluctance to move more data into the cloud are the concerns around security.
A comparison between On-premise and cloud setups with security at the centre has been
highlighted below.
Though the On-premise setup for the Government Department allows complete control over
the setup, in terms of cloud, multiple features such as infrastructure provisioning and
maintenance, compliances and certifications, technology refresh are handled by the Cloud
Service Provider allowing Government Department to focus on application delivery. Previous
constraining factors such as concerns for data security and privacy are weakening as the cloud
providers continue to invest in successfully hardening their security and privacy profiles and
standards.
Below are the key design principles which needs to be considered for Cloud technology
adoption:
1. Security at all layers: Ensure robust Security is applied to all layers (Physical, network,
Data, Application, etc.) of their architecture with multiple security controls. This will
ensure end to end protecting of application/data hosted by departments on Cloud
platform.
2. Safeguard data while at rest and in transit: Identify and Classify the data in terms of
criticality/sensitivity and define their levels. This can be prevented via using the
available security controls like access control, tokenization, encryption, etc.
3. Monitoring and Auditing: Ensure monitoring, auditing and alerting is configured to
capture the changes in the department’s system in real time. Further, log integration
and metric collection can automatically investigate, act and respond.
4. Access management and Controls: Ensure implementation of principle of selective
privileges and impose segregation of duties with appropriate access and authorization.
Centralized identity and access management can eliminate any unauthorized access
and information loss/theft.
5. Readiness for security events: Department/CSP needs to prepare system for any
unusual security event. Regular vulnerability and security tests need to be conducted
to identify the security gaps and issues. Several drill can be conducted to record the
response of the Cloud systems at different layers.
6. Automate security best practices: Automating software/hardware/Application based
security system via AI/ML/Bots to improve the ability to secure environment which can
perform regular checks and implement the controls needed to restrict the attack and
enhance cloud security.
7. Cloud Vendor Lock-in: Departments to ensure that there is no vendor lock-in by
Cloud services provider while hosting the application/data, as there is no standard
guidelines between different cloud providers for data migration and exports, so it
becomes difficult to migrate data from one cloud provider to another or migration to
on-premise Data centre.
In this section we shall look at best practices to be observed at various layers of a cloud
deployment architecture along with standards to be adopted or understood while choosing
cloud for delivery of services.
Physical and
Perimeter
Network
Host /
Compute
Application
Data
It is important to be aware of the infrastructure security parameters of the CSP. The provider
(one who maintains the private cloud platform) in the shared security model has the
responsibility to ensure the security of the underlying physical, abstraction, and orchestration
layers of the cloud. While in this section we highlight the cloud security best practices across
all the layers mentioned above, we shall also touch upon Privacy as an important aspect to be
considered under cloud-based security.
5.1.1 Data
The cloud data protection methods do not particularly require any new technique. Data
protection in the cloud is very similar to data protection in a traditional data centre. Identity
and authentication, encryption, access control, secure deletion, data masking and integrity
checking are all data protection methods that are applicable in cloud computing.
the User Department is protected from damaging data Who can access what
kind of data?
breaches?
Who owns the file or
Government Departments may adopt certain practices folder?
around data protection in order to overcome any Have there been any
reluctance around data security in Cloud. changes to
permissions of
Department need to be aware of the type of data being sensitive files?
handled by them and hence they at their discretion may
categorize and deploy relevant data on cloud considering protecting from inadequate Data
access / deletion, backup Vulnerabilities, data leakage, compromise of management interface,
malware attacks, etc.
Departments should adopt a data usage policy which clearly outlines various data access types,
who has access to data and what conditions may constitute correct usage of data. There should
be safeguards for policy violations and subsequent impact-based consequences.
Access control is one of the most key and crucial aspect of data protection in cloud wherein
Government Departments would be responsible for ensuring Administrative and Technical
Controls to manage data access on the cloud.
Important points
to remember
The CSP shall be responsible for ensuring Physical Security of the deployed cloud
infrastructure. Some of the practices around data security in cloud have been captured in this
section.
5.1.2 Application
Applications are hosted on independent virtual machines. Applications/ Sensitive data are
more vulnerable in cloud-platforms, as cloud environments are hosted on shared resources.
So, special security measure / controls are required to safeguard the client environments.
Cloud service providers ensure that departments / users only have access to the data which
they are authorized to access on shared Cloud model.
Use of micro-service architectures enhances the security further. Since optimizing the use of
physical servers by the consumers is not a requirement, developers can instead deploy
additional, smaller virtual machines, each dedicated to a specific function or a specific service.
This minimizes the attack surface of the individual VMs and supports granular security controls.
DevOps isn’t just about development and operations teams. The agility and responsiveness of
a DevOps approach can be fully utilized if IT security plays an integrated role in the full life
cycle of the application development.
Why? any Department may ask. In the past, the role of security was siloed to a specific team
towards the final stage of development. That wasn’t as problematic when development cycles
followed a waterfall methodology. DevOps ensures rapid and frequent development cycles
(sometimes weeks or days) followed by Continuous Integrations and Continuous
Deployments, but outdated and traditional security practices can adversely affect even the
most efficient DevOps initiatives.
Cloud APIs being provided by CSP’s to software developers to develop the interfaces to
interact with provided cloud services. Addition of another layer requires security from
vulnerabilities and attacks, so implementation of security tools /appliances on Cloud provider’s
interface and enabling authentication / access control mechanism will help in enhancing the
security layer for Cloud API. DevSecOps means introducing the role of application and
infrastructure security teams from the start of the application development lifecycle. It also
means automation of security gates to protect the DevOps workflow pipeline from slowing
down. Selection of the right tools to continuously integrate security, like agreeing on an
integrated development environment (IDE) with security features, can help achieve the desired
objectives. However, the requirement of effective DevOps security is much more than just new
tools—it builds on the cultural changes of DevOps to involve and integrate the work of security
teams sooner rather than later. DevSecOps is making a significant difference in the IT industry,
by ensuring a seamless software development life cycle (SDLC). Breaking the traditional trend
of having security as a siloed process, DevSecOps calls for security integration across all stages
of the software development process chain, addressing security concerns at the very start of
every stage. DevSecOps approach to cloud security requires detailed planning that demands
cultural change in an IT environment, especially for security automation and configuration of
cloud assets.
For Multi-tier applications, deciding where to ensure security would perplex a lot of
Government Departments: at the web server level or database level or across every component
in the cloud setup?
While multi-tier applications possess complex design methodologies, increase in the number
and complexity of security mechanism may result in performance decline and unpredictable
application behavior. Hence ensuring security while designing such complex multi-tier
applications must involve more robust security assessment. Ensuring security provision and
authorized access at the application level should be focused on post which the database may
trust the application to authenticate and authorize end users to access data in the database.
Database should be secured against any access except through the application. Ensure audit
and logging at the application level while designing multi-tier applications.
Important
points to
remember
Use of Web Application Firewall for Web apps and online portals
Government Department may refer “Checklist for Secure Code Programming in Applications”
( https://meity.gov.in/writereaddata/files/checklist_development.pdf) as well as “General
Guidelines for Secure Application and Infrastructure”
(https://meity.gov.in/writereaddata/files/General_Guidelines.pdf) published on MeitY website
while designing their applications.
Any given processor and memory will always be running multiple workloads, often from
different tenants. Multiple tenants share the same physical compute node, and there is a
range of segregation capabilities on different hardware stacks.
Certain practices around security in compute in cloud are described in the section below:
Important points to
remember
5.1.4 Network
There are various kinds of virtual networks, from basic VLANs to full Software-Defined
Networks (SDNs). The data in transit also needs to secure through the network layer. A cloud
service provider needs to understand the department network traffic plan to send and receive
data. Department to ensure CSP has implemented strong security controls for internal and
external network separation / communication. CSP to ensure appropriate network
segmentation which separates networks of different sensitivity levels. Most cloud computing
platforms today use SDN for virtualizing the networks. SDN abstracts the network
management plan from the underlying physical infrastructure, removing many typical
networking constraints. For example, department can overlay multiple virtual networks over
the same physical hardware, with all traffic properly isolated and segregated.
SDNs are also defined using API calls and software settings, which supports agility and
orchestration. Virtual networks are different from physical networks in a way that virtual
networks run on physical networks, but abstraction allows deeper modifications on the
networking behavior that impact security processes and technologies.
It is pertinent to secure Cloud data transfers. Government Departments must ensure data
protection as their data exchange to the cloud. This demand understanding the CSP’s data
migration mechanisms, as leveraging the mechanisms of the provider is often more cost
effective and secure than “manual” data transfer methods such as Secure File Transfer Protocol
(SFTP). For example, sending data to a CSP’s object storage over an API is likely to be more
secure and reliable than setting up own SFTP server on a virtual machine in the same provider.
There are a few options for in-transit encryption depending on what the cloud platform
supports.
One option is to follow client-side encryption i.e. encrypt before sending to the cloud.
Another option is Network encryption (TLS/ SFTP/etc.). Most CSP APIs use Transport
Layer Security (TLS) by default as this is an essential security capability.
Third option can be a Proxy-based encryption, where there is an encryption proxy in a
trusted area between the CSP and the cloud consumer and the proxy manages the
encryption before data transfer to the CSP.
It’s a good practice to isolate and scan the data before integrating it. Logs need to be offloaded
and externally collected more quickly due to the higher velocity of change in cloud. A practice
such as collecting logs in an auto-scale group before the cloud controller shuts down such
unneeded instances would safeguard Government Departments from any losses.
Protection is required from the threat of denial of service against CSP cloud computing
resource which is generally an external threat against public cloud services. Distributed denial-
of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted
server, service or network by overwhelming the target or its surrounding infrastructure with a
flood of Internet traffic. So, it is important for department to get the Anti-DDoS services
adopted from CSP. Certain practices which the Government Departments may consider while
dealing with network security in cloud are as follows:
Important points to
remember
Identity Management and Access Control security would include the following:
Important points to
remember
The Cloud Service disruption can be caused by unwanted physical access of hardware. CSP
should secure their data centre facilities and consider resiliency by implementing availability
strategies. The threat increases where Cloud Service Provider has not implemented adequate
secure or remote working environments from internal and external sources.
Government Departments need to seek assurance from the selected CSPs that necessary
security controls are in place. CSPs need to provide assurance by means of relevant audits and
assessment reports. Additionally, they can also demonstrate compliance to security standards
as included in Section 4.3 Standards applicable for Security.
Ensuring perimeter security and physical security of the Data Centre, shall be the responsibility
of the CSP, and in accordance with the norms laid down for empanelment for Cloud Service
Providers by MeitY. Unauthorized personnel gaining access to the data centre shall result in a
compromise and the CSPs are responsible to ensure sufficient measures such as security
guards, secured fencing, security scanners, biometric access, CCTV surveillance, Access Logs
etc. are available at the data centre to prevent unauthorized or forceful entry into Data Centre
premises.
Some security controls around physical security of data centre to be ensured by the CSPs
include:
Physical infrastructure shall be kept in secure areas – CSP needs to ensure physical and
perimeter security are in place to prevent from unauthorized access. This includes
having physical entry in controls that ensure access to only authorized personnel for
areas containing sensitive infrastructure.
Protection against environmental threats – CSPs to ensure protection against
environmental threats including floods, earthquakes, lightning, fire, natural disasters,
civil unrest or other threats that could disrupt operations of a data centre.
Data Centre IT infrastructure security controls – CSP needs to ensure that necessary
controls are in place to prevent damage, loss, compromise or theft of assets.
Safety against failure of equipment – CSP need to ensure that necessary controls are
in place to execute preventive maintenance of all data centre equipment in order to
avoid disruption of services due to detectable equipment failures.
Procedure for data centre asset removal/theft – CSP need to ensure that appropriate
controls exist against removal or theft of sensitive assets.
Safe disposal or reuse of data centre equipment – CSP need to ensure that necessary
control are in place for the suitable disposal of any data centre equipment, in particular
any devices that might contain important data like storage media.
Security controls for DC personnel – Suitable controls need to be instituted for all
employee working at the facilities of a CSP, including all temporary staff.
Ensuring Backup, Redundancy and Continuity Plans – CSP needs to provision
appropriate mechanism to carry out regular backup of stored data, redundancy of
equipment, as well as continuity plans for handling situations leading to equipment
failure.
On the other hand, Government Departments would need to ensure physical security of their
endpoints from both physical and logical perspective to ensure a complete secured access and
operation from the Cloud.
This section explains an efficient method of evaluating security capabilities of the CSPs, and
also evaluating their individual risks, by the Department. Following is a set of guiding questions
for Government Departments ask and conduct assessment across each of the listed security
domains.
Zero trust security means that by default, not everyone is trusted from inside or outside the
network, and verification is mandatory for everyone trying to access the resources on the
network. This additional layer of security has been introduced to prevent data breaches.
Leverage a least-privileged access strategy and strictly enforce access control. This
means users should only be given access as per the need and the requirement, on a
need-to-know basis. This minimizes user exposure to sensitive parts of the network.
Inspect and log all cloud traffic. Otherwise, it may be considered simple for an attacker
to access a department’s network
Zero trust networks utilize the concept of micro segmentation. Micro segmentation is
the practice of breaking up security perimeters into small zones and maintain separate
access for separate parts of the network. Example, a network with files residing in one
data centre that adopts micro segmentation may consist dozens of separate and secure
zones. A program or person with access to any one of these zones shall not have access
to any of the other zones without separate and unique authorization.
Multi-factor authentication (MFA) is also at the core of the zero-trust model. MFA
simply needs more than a single piece of evidence for user authentication; simply
entering a password is not enough to access. In addition to password entry, cloud
services users are required to enter a code sent to another device, such as a mobile
phone, thus enabling a two-factor authentication.
In addition to user access control, zero trust also needs strict controls on device access.
Zero trust systems need to monitor the number of distinct devices that are trying to
access their network and ensure that every such device is authorized. This minimizes
the attack surface of the network further.
Important points to
remember
Policies and
Standards
There are certain internationally recognized information security standards highlighted below
which department can follow while adoption of cloud platform:
This standard provides best practice to an Information Security Management System (ISMS).
This Management System Standard is designed to manage an organizations sensitive data
along with its set policies and procedures. Absence of ISMS makes the organization vulnerable
to cyber-attacks and data leaks. Therefore, this system is a critical component within an
organization.
ISO 27002
ISO 27002 Standard is all about the guidelines for organizational Information Security
Management System (ISMS) practices including the selection, implementation and
management of controls taking into considerations the organization Information Security Risk
environment.
ISO 27017
ISO 27018
ISO 27018 is for cloud computing organization, specifically designed to protect Personally
Identifiable Information (PII) stored and/or processed in the cloud. The primary focus of this
standard is relevant to cloud providers and not cloud consumers. This standard gives
additional level of confidence to consumers, specifically when working with organizations who
handle sensitive information.
Statements on Standards for Attestation Engagements No. 16. SSAE 16 requires Data Centre
organizations, to provide written report that describes controls at organizations that provide
services to customers.
SOC 2 is a report which focuses on controls at service provider relevant to security, processing
integrity, availability, confidentiality and privacy of a system. It ensures customers that their
data is kept private and secure while in storage and in transit and which is available for the
customer to access at any time.
Multicloud refers to the use of multiple Cloud and storage services within a single
heterogeneous architecture. This heterogeneous environment also refers to the distribution of
Cloud assets, software, applications, etc. across several cloud-hosting environments. With a
typical multicloud architecture, using two or more public Clouds, or multiple private clouds,
this multicloud environment intends to eliminate the dependency on any single CSP.
Protecting the Cloud infrastructure is mandatory for the selected CSP, but it is the Government
Department’s responsibility to secure any data that it puts into the Cloud. Therefore, ultimately
the Government Department needs to carry out the necessary due diligence while selecting
the CSPs/MSPs in order to ascertain that they meet the applicable regulatory and security
requirements.
Pertaining to the department’s responsibility to safeguard its data, the importance in a multi-
cloud environment shifts from securing the perimeter of the network, to securing the data -
whether at rest or in transit. In a multi-cloud environment, the focus is to comprehensively
understand data flows and protect it in accordance to its degree of sensitivity.
Certain measures which may be kept in mind while considering a multi-cloud deployment/
environment are as follows:
To identify threats across a hybrid multiple Cloud platform, and effectively integrate
security strategies to address needs of each of the Cloud platforms, department’s
internal security teams or MSPs would need to centralize the security control in order
to maximize data visibility. Information about all security measures and tools
implemented is needed to be shared across the identified points of contacts that are
responsible for each Cloud platform, to advance the department’s security capabilities.
Having a uniform protocol for security enforcement helps ensure a consistent approach
to Cloud platforms, thereby facilitating a secure integration within a multi-cloud
architecture. Using third-party services for automation can help in scaling Cloud
security.
While the Departments need to ensure that their applications are up to date, it is also
imperative to ensure that their security functions are constantly upgraded to meet their
evolving IT landscape and its security requirements. In today’s world, Cyber-attackers
are continuously searching for vulnerabilities to exploit and adopting innovative ways
to breach security. Monitoring threats to a multi-cloud architecture is a continuous
process that requires security experts to constantly analyze the security of the multi-
cloud through real-time reports.
One of the biggest security breaches would comprise of situations where certain end
users would have access to unauthorized data and services. When unrelated people
are allowed access to unauthorized or sensitive data, they are at risk of exposing the
data to security breaches and even cyberattacks. In such cases, Departments need to
confirm that any acquired software is patched and secured before rolling it out to its
CASBs (or Cloud Security Gateways) discover internal use of cloud services using various
mechanisms such as network monitoring, integrating with an existing network gateway or
monitoring tool, or even by monitoring DNS queries. After discovering the services that users
are connecting to, most of these products then offer monitoring of user activity on approved
services, majorly through API connections (whenever available) or inline interception (man in
the middle monitoring). Many support security alerting, including DLP and also offer controls
to effectively manage use of sensitive data in Cloud services (SaaS/PaaS/and IaaS).
Infrastructure and application logs from the multiple CSP environments interacting to provide
services, should be gathered at a central location to facilitate centralized security monitoring,
incident management and event analysis. This will enable a single view of emerging threats
across the organizations’ data assets. This solution shall be based on Artificial Intelligence (AI)
/ Machine Learning (ML),with capabilities of User and Entity Behavior Analysis (UEBA). This
would help in reducing the efforts and time taken to detect anomalies, which in turn reduces
the incident contentment time and thus a reduced cost of data breach.`
All end users should go through a centralized identity access management solution (IDAM
solution). . This solution is capable of accommodating multiple user identities and managing
different user types, facilitating a single sign-on mechanism and integrating or having the
feature to enable multi-factor authentication.
A centralized data backup solution ensures that data from all the different environments would
be made available, even during a disaster, when this information is needed the most.
Lastly, automated workflows and playbooks will facilitate in empowering the Security
Operation Centre (SOC) through automation tools. For instance, having an automated
workflow for approval of change requests.
As part of this effort, security practitioners must define the scope and boundaries of all security
functions that may be relevant to cloud environments, and develop an approach to improving
and monitoring the performance of all of the cloud’s stakeholders, including service providers,
users, and technical staff. Finally, they should provide top management with the tools needed
to gain visibility into cloud security — such as a security-level dashboard — and the levers
needed to manage the overall cloud computing program.
Cloud Computing follows the shared responsibility model to ensure adequate security
measures. Securing physical infrastructure and the virtualization platform itself will
permanently be the responsibility of the Cloud Service Provider. Meanwhile, the Cloud
consumer i.e. the Government Department in this case, is responsible for framing and
institutionalizing proper security controls, while understanding the underlying risks. For
instance, deciding when to encrypt virtualized storage, properly configuring the virtual
network and firewalls, or deciding when to use dedicated hosting vs. a shared host.
In continuation to the practices around cloud security, certain additional pointers which
Government Department should timely monitor with respect to their cloud deployments are
as follows:
Upgrade operating system and the installed software with the latest patches.
Ensure that the MSP / CSP solution satisfies organizational security, privacy and
legislative requirements. MeitY through its empanelment RFP has onboarded CSPs
which meet certain specific technical and legal requirements. Kindly refer to
https://meity.gov.in/content/gi-cloud-meghraj for the list of requirements that need to
be met by CSPs to get empaneled by MeitY. Additional requirements if any, may be
evaluated by the Department as per their project requirements.
Use designated computers with MFA, strong password policies, access-controlled
privileges, and encrypted communication channel to administer the cloud service.
Avoid providing the MSP/CSP with account credentials and / or access to sensitive
systems outside of their responsibility.
Use controls to protect data in transit between the Department’s end and the Cloud
Service Provider.
Consider full data encryption of critical Department information while at rest, while
maintaining control of encryption keys.
Consider regular scanning and monitoring for non-standard or suspicious
code/files/folders on hosts, and ensure regular audits, even if periodic scanning and
audits are a service provided under contract with the MSP/CSP.
Perform periodic cloud audit activity (every 6 months) for ensuring conformance to
compliance by the CSP as per Department’s project requirement.
Employ the use of anti-malware and other security tools on Department assets and/or
infrastructure. Consider tools which can both detect and remediate infections. Anti-
malware programs and other security tools should be maintained and kept updated,
and all executables downloaded to Departments’ infrastructure should be scanned
before execution.
Ensure that MSP/CSPs conduct regular reviews of network and system logs for any
suspicious activity or traffic which may indicate potential compromise.
Employ a data backup and recovery plan for all critical information. Ensure that
MSP/CSP also employs data backups and recovery plans. Perform and test regular
backups to limit the impact of data or system loss and to expedite the recovery process.
Since network storage can also be affected, this data should be kept on a separate
device, and backups should be stored offline.
Contractually retain the ability to receive a copy of a compromised virtual server for
Department’s internal forensic analysis.
Both, the CSP and the Cloud consumer have distinct responsibilities to ensure security in the
Cloud environment, however, in a few areas the responsibility overlaps. In today’s scenario,
many security problems among cloud consumers involve misunderstanding these shared
responsibility areas.
Further, it would be safe to say that there are more areas of cloud security for which the cloud
consumer is responsible, rather than the provider. Government Departments who understand
the basic delineation of responsibility will be a much better position to maintain a high level
of cloud security.
Essentially, the CSP requires to ensure that the infrastructure built within their platform, is
inherently robust and secure. On the other side, certain customizable Cloud capabilities
including network configuration, account access, application management, compute
configuration, and data encryption are the responsibility areas of the Cloud consumer. This
shared security model—illustrated below—may be referred to for better understanding the
responsibilities between CSP and the Government Departments while configuring cloud
security for their infrastructure.
Cloud security denotes the efforts towards securing data, infrastructure and applications that
are inherent to the use of Cloud computing – this includes technologies, organizational policies
and controls.
In order to improve agility and reduce costs for the Government Departments, Cloud-based
applications and their data, are becoming distributed. This trend is true for private clouds,
public clouds (hybrid or dedicated), as well as Software as a Service (SaaS) applications.
The increasing concern over data exposure has made cloud security a priority. The challenge
therefore is to balance the Department’s need for agility while at the same time, improving
security of applications and their data, as it travels among multiple Cloud platforms. It
therefore becomes imperative to gain the necessary visibility across all locations that reside
applications and data, to prevent attacks that are aimed at exfiltrating data, both through a
lateral attack or from an external location.
Multiple teams may be responsible for different areas of Cloud security: application team,
network team, security team, compliance team, or the IT infrastructure team. Nevertheless,
Cloud security is a shared responsibility between the CSP and the Government Department.
In case of an on-premise setup, the Departments themselves are responsible for all security
aspects of the Cloud, as it is hosted locally in their own data centres. This covers all areas
includes the infrastructure, physical network, hypervisor, operating systems, virtual network,
service configuration, firewalls, identity and access management, etc. In this scenario, the
Departments own the data and also its security.
For an IaaS offering in any Cloud deployment model, the CSP owns the infrastructure,
hypervisor and physical network. The Departments, on the other hand, own the workload, its
applications, virtual network, access to the Cloud environment, and the deployed data.
For a SaaS setup, CSPs are mostly responsible for the security of their own platform, including
physical security, infrastructure security and application security. The CSPs cannot own their
customer’s data, nor assume any responsibility for how the applications are used. Primarily,
the Department needs to look after security to prevent and minimize the risk of malicious data
exfiltration, accidental exposure, or malware insertion. In this case, the complete responsibility
of application security lies with the CSP, and the Departments are responsible for necessary
environmental configurations and data on Cloud.
One of the key factors that should be considered while assessing Cloud versus an on-premise
environment, is the responsibility of CSPs to ensure and adhere to the latest regulatory
compliances and certifications, along with having the certification renewed periodically. Such
governance measures may be a cost centre for the Departments in an On-premise setup
whereas in cloud the CSP would be responsible for ensuring compliances to the norms needed
by the Government Departments.
A detailed model describing the shared responsibility between the Government Departments
and the CSP has been illustrated in Figure 6 above.
In case the Department selects a Managed Service Provider (MSP) to manage their Cloud
workload, Figure 7 can be referred which discusses the responsibilities between the
Government Department, CSP and the MSP in detail.
As Government Departments transition from an on-premise setup to either IaaS, PaaS or SaaS
service, the responsibility for security of data, applications and infrastructure is the larger
responsibility of the selected CSP than the Department itself. However, irrespective of the
platform used, the Department will always be accountable to ensure security of its own data.
To safely enable their applications, the Government Departments must be confident that their
CSPs have put in place the appropriate security measures.
To compensate for what does not fall under the CSP’s purview, a department must also have
the necessary tools in place in order to asses, manage and secure the risks effectively and
facilitate data security. For a SaaS offering, these tools may be able to provide visibility into
activities within the SaaS application, detailed analytics on the service usage to prevent risk to
data and violations of compliance requirements, policy controls to necessitate enforcement
and even quarantine in case a violation occurs, real-time threat intelligence on known and to
also detect unknown threats to prevent new malware insertion points.
To offer a secure cloud, the CSP manages and controls multiple layers – the host Operating
System (OS), the virtualization layer, as well as the physical security of its data centre facilities.
To ascertain security within a given Cloud environment, the Department or it’s MSP is expected
to configure and manage the security controls for the guest OS, and other applications
(including updates and security patches), and for the firewall as well. Hence, it is imperative for
both CSPs and Government Departments to understand their roles and responsibilities with
respect to security while choosing cloud for their deployments.