NIST Cloud Computing Forensic Reference Architecture
NIST Cloud Computing Forensic Reference Architecture
NIST SP 800-201
Martin Herman
Michaela Iorga
Ahsen Michael Salim
Robert H. Jackson
Mark R. Hurst
Ross A. Leo
Anand Kumar Mishra
Nancy M. Landreville
Yien Wang
July 2024
Certain commercial entities, equipment, or materials may be identified in this document in order to describe an
experimental procedure or concept adequately. Such identification is not intended to imply recommendation or
endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities,
materials, or equipment are necessarily the best available for the purpose.
There may be references in this publication to other publications currently under development by NIST in accordance
with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies,
may be used by federal agencies even before the completion of such companion publications. Thus, until each
publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For
planning and transition purposes, federal agencies may wish to closely follow the development of these new
publications by NIST.
Organizations are encouraged to review all draft publications during public comment periods and provide feedback to
NIST. Many NIST cybersecurity publications, other than the ones noted above, are available at
https://csrc.nist.gov/publications.
Authority
This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal
Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law (P.L.) 113-283. NIST is
responsible for developing information security standards and guidelines, including minimum requirements for
federal information systems, but such standards and guidelines shall not apply to national security systems without
the express approval of appropriate federal officials exercising policy authority over such systems. This guideline is
consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130.
Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding
on federal agencies by the Secretary of Commerce under statutory authority. Nor should these guidelines be
interpreted as altering or superseding the existing authorities of the Secretary of Commerce, Director of the OMB, or
any other federal official. This publication may be used by nongovernmental organizations on a voluntary basis and is
not subject to copyright in the United States. Attribution would, however, be appreciated by NIST.
Publication History
Approved by the NIST Editorial Review Board on 2024-07-01
i
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
Contact Information
sp800-201@nist.gov
Additional Information
Additional information about this publication is available at https://csrc.nist.gov/pubs/sp/800/201/final including
related content, potential updates, and document history.
All comments are subject to release under the Freedom of Information Act (FOIA).
ii
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
Abstract
This document summarizes the research performed by the NIST Cloud Computing Forensic Science
Working Group and presents the NIST Cloud Computing Forensic Reference Architecture (CC FRA
or FRA), whose goal is to provide support for a cloud system’s forensic readiness. The CC FRA helps
users understand the cloud forensic challenges that might exist for an organization’s cloud system.
It identifies challenges that require at least partial mitigation strategies and how a forensic
investigator would apply those strategies to a particular forensic investigation. The CC FRA
presented here is both a methodology and an initial implementation. Users are encouraged to
customize this initial implementation for their specific situations and needs.
Keywords
civil litigation; criminal investigation; cybersecurity; digital forensics; enterprise architecture;
enterprise operations; forensic readiness; incident response.
iii
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
iv
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
Table of Contents
Executive Summary................................................................................................................................ 1
1. Introduction ....................................................................................................................................... 2
List of Figures
Fig. 1. Forensic Reference Architecture overlaying approach ................................................................... 5
Fig. 2. Mapping flowchart ..................................................................................................................... 12
Fig. 3. Excerpt of the Forensic Reference Architecture (challenges vs. capabilities Mapping Table). ........ 18
Fig. 4. CSA’s Enterprise Architecture (v1.1) [2]....................................................................................... 28
Fig. 5. Graphical representation of NIST’s Cloud Security Reference Architecture (SRA) [15] ................... 29
Fig. 6. Graphical representation of NIST’s Cloud Forensic Challenges [1] ................................................ 29
Fig. 7. Graphical representation of NIST’s Cloud Forensic Reference Architecture .................................. 30
Fig. 8. NIST’s FRA dataset ..................................................................................................................... 31
v
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
Acknowledgments
This report is dedicated to the memory of our colleague, collaborator, and friend,
Ernesto F. Rojas of Forensic & Security Services Inc., who passed away unexpectedly.
This publication was developed by the NIST Cloud Computing Forensic Science Working Group
(NCC FSWG) co-chaired by Dr. Martin Herman and Dr. Michaela Iorga. NIST and the co-chairs wish
to gratefully acknowledge and thank the members whose dedicated efforts contributed
significantly to researching this topic and to generating the data included in this publication, which
constitutes the foundation of NIST’s Cloud Computing Forensic Reference Architecture. The
authors thank Richard Lee of Citizens Financial Group, who served as a reviewer; Rodrigo Sardinas
of Auburn University; Pw Carey of Grapevine Solutions; Richard Austin, formerly of Hewlett-
Packard Enterprise; Dr. Ken Stavinoha, formerly with Cisco Systems; and Otto Scot Reemelin, who
was with Ipro Tech during this work, for contributing to the data collection, analysis, and review.
The authors would also like to thank Josiah Dykstra of the National Security Agency, Kenneth R.
Zatyko of Buffalo Block Chain, and independent expert Keyun Ruan for their contributions during
the early stages of this research. Finally, the authors wish to thank their peers who continuously
provided feedback during the research and development stages of this document.
vi
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
Executive Summary
New methodologies are needed to identify, acquire, preserve, examine, and interpret digital
evidence in multi-tenant cloud environments with rapid provisioning, global elasticity, and broad
network accessibility. These methodologies will provide capabilities for incident response, secure
internal enterprise operations, and support for the criminal justice and civil litigation systems.
This document presents the NIST Cloud Computing Forensic Reference Architecture (CC FRA or
FRA), which provides support for a cloud system’s forensic readiness. The CC FRA is meant to help
users understand the cloud forensic challenges that might exist for an organization’s cloud system.
It enables cloud forensic stakeholders to analyze the impacts of cloud forensic challenges by
considering each challenge in the context of the functional capabilities presented in the Cloud
Security Alliance’s Enterprise Architecture. It also identifies forensic challenges that require
mitigation strategies and how a forensic investigator would apply those strategies to a particular
forensic investigation.
While the CC FRA can be used by any cloud computing practitioner, it is specifically designed to
allow cloud system architects, cloud engineers, forensic practitioners, and cloud consumers to ask
questions related to their cloud computing architectures. The CC FRA is both a methodology and
an initial implementation, and users are encouraged to customize this initial implementation for
their specific situations and needs.
1
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
1. Introduction
The NIST Cloud Computing Forensic Science Working Group (NCC FSWG) was established to
research forensic science challenges and architectures related to the cloud environment. It
previously published NIST Interagency Report (IR) 8006, NIST Cloud Computing Forensic Science
Challenges [1], which highlighted the unique digital forensic challenges of public cloud computing
services under three aspects of operation: normal operations, adverse operations (i.e., when cloud
computing resources are under attack), and operations during criminal exploitation. A description
and discussion of digital forensics in cloud computing is provided in Section 1.1.
Close examination of these challenges involved analyzing a security reference architecture of
choice. For convenience, an already developed security architecture was analyzed -- the Cloud
Security Alliance’s (CSA’s) Enterprise Architecture (EA) [2], along with its various functional
capabilities and processes, and the potential impacts of each challenge on performing a forensic
investigation if a specific functional capability or process were involved in an attack or breach or
were used during criminal exploitation. The analysis spans hypothetical scenarios that would
result in exploitation of potential weaknesses, vulnerabilities, exposures, or cloud technology for
criminal activities. Such elements are of fundamental concern in forensic analysis as they present
opportunities that adversaries may seek to exploit or characteristics that can be leveraged by
criminals. In any case, there will be evidence of the attack or criminal exploitation for future
forensic analysis. The EA is composed of a large set of specific functional capabilities that enable
detailed consideration of the effects of each forensic challenge on each of the capabilities.
The nature of each challenge was also examined (i.e., whether the challenge is technological or non-
technological) to determine its role and impact on the forensic examination process. As each
challenge was analyzed, the applicability of techniques or technologies became clearer in terms of
how they function and contribute to the identification, acquisition, preservation, examination, and
interpretation of evidence.
This document describes how forensics in the cloud can achieve the same level of acceptance as
forensics in traditional computing models. This document, the associated research, and IR 8006 [1]
proactively address Executive Order 14028, Improving the Nation’s Cybersecurity [3], which points
out the importance of having forensic-ready information systems, including cloud systems.
2
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
As computer and information science technologies, their implementations, and their operations
have changed, digital forensics has adapted. The number of scenarios that may require the
application of digital forensic techniques have increased along with the complexity of the
underlying architectures.
One common scenario involves the detailed investigation of criminal activities, including
“traditional” forms of crime (e.g., violent crime, property crime, drug trafficking, human
trafficking, white-collar crime) and crimes that occur in cyberspace (e.g., ransomware attacks,
phishing attacks, data breaches, identity theft, cyber-terrorism, distributed denial of service, illicit
cryptocurrency mining, child pornography, and attacks against governments, key corporations, or
power grids). Digital forensic procedures involve locating and analyzing digital traces that can help
solve the crime and/or allow for incident response.
Forensic procedures are also used to investigate civil actions, such as divorce proceedings, asset
discovery, insurance claims, lawsuits, and similar cases that often require forensic methods to
determine the presence, absence, and movement of data and funds. In each of these cases,
forensics plays an essential role in determining facts; assisting in the analysis, validation, and
authentication of data; and enabling the documentation of findings.
The application of forensic methods may also be required for normal business operations, such as
data recovery. During incident response, forensic methods may help mitigate future cyber-attacks,
prevent system failure, or minimize data loss. Forensics can also help determine the root cause of
an outage event, such as component failure, corrupted software, or intentional sabotage. Other
scenarios may involve the close examination of system configurations, potentially questionable
employee data storage and activities, and operational aspects related to compliance matters.
The frameworks listed below can provide core support for the design, implementation,
assessment, monitoring, and operations of information systems:
• NIST Risk Management Framework (RMF) [4] — A focused guide to information system risk
management
• ISO 27000 Series [5] — A series of standards on a wide range of information security topics,
such as:
o ISO/IEC 27001 [6] — Information security management
o ISO/IEC 27002 [7] — Information security controls
o ISO/IEC 27017 [26] — Safeguarding cloud environments and minimizing risk of
security incidents
o ISO/IEC 27018 [8] — Securing personally identifiable information (PII) in the cloud
o ISO/IEC 27035 [9] — Incident response
o ISO/IEC 27037 [10] — Digital evidence collection and preservation
• IT Infrastructure Library (ITIL) [11] — A service-oriented architecture (SOA)
• Sherwood Applied Business Security Architecture (SABSA) [12]
• The Open Group Architecture Framework (TOGAF) [13] – A general security framework
• Cloud Security Alliance STAR program [14] – A progressive security certification
3
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
The focus of each of these frameworks varies but generally facilitates architecting, implementing,
and operating secure and resilient information systems. The RMF is focused on security from a risk
identification and management perspective. As varied as the ISO 27000 series [5] is, it contains
standards that address digital evidence and incident response. However, there is not a readily
apparent, in-depth exploration of cloud-system forensics.
The material presented here deals with the matter of forensics performed within a cloud
computing environment. The advent of cloud computing has simplified business operations and
introduced a level of business agility not previously experienced with traditional or on-premises
computing. However, cloud computing has also introduced a range of security and forensics
challenges. Enhanced capabilities enjoyed by legitimate businesses and friendly governments are
often equally available to opposing nation-states, terrorist groups, and international criminal
elements and assets. As a result, targets that were once unassailable by nefarious actors may now
be vulnerable to attack or exploitation.
To a great extent, cloud computing runs on virtualization — that is, the creation of processing
resources that have hardware as their basis but run as multiplexed programs and are thus
functionally multiplied through it. Cloud forensics involves performing analysis on “virtual
machines” using techniques that require “real machines.” In addition, the information obtained
from “machines” that are essentially “unreal” is different from traditional digital evidence.
Cloud computing has become increasingly pervasive as more entities discover its advantages.
These entities include legitimate businesses, governments, and individuals who use software-as-a-
service (SaaS) cloud platforms, as well as criminal and terrorist organizations and opposing nation-
states. For legitimate consumers, cloud computing provides capabilities such as:
• More rapid business continuity and disaster recovery
• More effective incident response
• Improved information access, management, and archiving
• Easier and more immediate collaboration between widely separated individuals and
groups
This research has adapted solutions that originated in the on-premises data center to the
significant differences presented by the cloud.
As important as they are for addressing significant events related to business operations, forensic
methods have at least equal importance when contributing to matters of compliance, legality, and
criminal exploitation. Careful treatment has been given to these questions during this research to
ensure that the findings do not merely consider technical aspects but also address the broader
aspects of their material application. Unquestionably, close examination of these adverse events is
required to understand their incipience and progression and — in particular — to ensure that
remediation, event reconstruction, and attribution are effectively and credibly realized.
Thus, it has been the specific focus and goal of this effort to research these issues, examine and
clarify the forensic challenges, and ultimately formulate and validate the capabilities required to
apply accepted forensic techniques and technologies to this unique computing environment. The
result is the Cloud Computing Forensic Reference Architecture.
4
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
In as much as a security reference architecture must incorporate standards and requirements that
will inform system actualization and operation with respect to security, applying a forensic
reference architecture will likewise inform that system actualization and operation with the
capability to more effectively examine, understand, reconstruct, and remediate a variety of
system events and disruptions.
The goal of the CC FRA is to support a cloud system’s forensic readiness by helping users
understand the forensic challenges that might exist for an organization’s cloud system. It identifies
which forensic challenges require mitigation strategies and how a forensic investigator would
apply those strategies to a particular forensic investigation. The CC FRA will likely evolve over time
with more use and research.
5
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
The bottom layer in Figure 1 graphically represents the cloud reference architecture of choice for
this document, which is the CSA EA [2].
The layer above represents the NIST cloud SRA (see Appendix D – Figure 5). The next layer
represents the NIST cloud forensic challenges (see Appendix D – Figure 6). The top layer
graphically represents the NIST FRA (see Appendix D – Figure 7) described in this document. This
overlay approach (i.e., a superimposed, adapted set or subset) leverages components, concepts
and attributes defined in the CSA EA [2] — more precisely, the CSA TCI v1.1 (the initial version of
the CSA’s EA - see Appendix C) and in the NIST cloud SRA, analyzed in the context of the NIST IR
8006 cloud forensic challenges.
More precisely, the FRA layer leverages the three layers graphically represented beneath it by
analyzing each capability of the SRA (previously derived from the CSA’s EA [2] - see Appendix D -
Figure 5) in the context of the challenges documented in IR 8006 [1] (see Appendix D - Figure 6).
The analysis determines whether each challenge affects the capability if implemented in a cloud
environment as part of a cloud service or solution. If the challenge does affect the capability, then
the functional capability is considered to have forensic importance, and it is imported to or
considered a capability of the FRA (see Appendix E - Figure 8 for a larger image).
6
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
7
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
8
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
9
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
10
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
11
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
When a cloud service customer is informed of such a challenge, the customer could mitigate the
challenge by using or implementing a log file integrity validator which uses digitally signed digests.
The NCC FSWG has developed a mapping between functional capabilities and forensic challenges.
For each functional capability, the mapping shows all of the forensic challenges that affect that
capability. This has resulted in a Mapping Table of 347 rows (one for each capability) and 62
columns (one for each challenge). An entry in the table is YES if the associated challenge affects
the associated capability; otherwise, the entry is NO. (See Figure 3 for an excerpt of this table.)
When the question is asked: does a forensic challenge affect a functional capability, it is defined to
mean: if the challenge were overcome, would that make it easier to conduct a cloud forensic
investigation on the considered functional capability? This is the relationship that the mapping
between challenges and capabilities is capturing.
A summary developed for each of the 62 challenges (found in IR 8006 [1], Annex A, Table 1)
answers the following question: What advantages would be provided to a forensic investigator if
this challenge were overcome? If these advantages imply that the quality of forensics that can be
performed on the functional capability could be improved, then the answer to the question in the
previous paragraph is YES, overcoming the challenge could make it easier to perform a forensic
investigation on the capability.
Fig. 2 shows a flowchart for achieving a narrow, precise mapping between challenges and
capabilities.
12
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
The flowchart provides users with a uniform method for determining the applicability of a
challenge to a particular capability. In conducting the analysis, the NCC FSWG placed each cloud
forensic challenge into one of two groups: 1) challenges that are primarily technical in nature (e.g.,
architecture) or 2) challenges that are primarily non-technical in nature (e.g., legal). This led to the
creation of questions Q2-a, Q2-b, Q2-c, and Q2-d in the flowchart, which inform placement into
the two groups. If a challenge deals primarily with standards, legal issues, contracts, service-level
agreements, jurisdiction issues, privacy, ethical issues, training, qualifications, or certifications,
then the challenge is considered non-technical. Otherwise, it is considered technical. This grouping
provides a simple and straightforward method for analyzing the high-level characteristics of each
challenge.
Similarly, the NCC FSWG placed each of the cloud functional capabilities into one of two groups: 1)
primarily technical or 2) primarily non-technical. If a capability deals primarily with standards, legal
issues, contracts, service-level agreements, jurisdiction issues, privacy, ethical issues, training,
qualification, or certification, then the capability is considered non-technical. Otherwise, it is
considered technical. This led to the creation of questions Q3-a and Q3-b.
To ensure a precise and limited mapping, the flowchart attempts to map challenges that are
primarily technical only to capabilities that are primarily technical and challenges that are
primarily non-technical only to capabilities that are primarily non-technical. If a challenge and a
capability pair are assigned to the same group, the user considers whether overcoming the
challenge makes it easier to conduct forensics on the capability. The answer determines whether
the capability is affected by the challenge. In summary, if the appropriate grouping is done and
overcoming the challenge makes it easier to conduct forensics, then the challenge is considered to
affect the capability (i.e., the mapping is YES; otherwise, the mapping is NO). If there are
challenges in one group that affect capabilities in another group, the mapping is considered to be
NO because that does not provide the precise, limited mapping.
The following is an example of a precise, limited mapping. Suppose that the challenge deals with
training (e.g., Challenge FC-65: There is a lack of training materials that educate investigators on
cloud computing technology and cloud forensic operating policies and procedures; see [1], page
52). This is a non-technical challenge. In addition, suppose that the capability under consideration
is technical. Enhanced training would clearly provide a significant benefit to forensic investigators
and cloud providers because training is so broadly applicable. However, a cloud forensic
architecture in which training affects almost every capability is undesirable because then the
architecture applies too broadly; most of the capabilities are not affected by this challenge in an
important way. This makes the architecture less useful because the architecture will have many
challenges that affect too many capabilities. The architecture with a narrower mapping is also
more practical because the fewer YESs in the mappings, the easier for an investigator to apply the
mappings in real-world scenarios.
As described above and shown in Fig. 2, if both the challenge and the capability being evaluated
deal with the same type of issue (i.e., technical or non-technical), then the following question is
asked: “If the challenge were overcome, would that make it easier to conduct a cloud forensic
investigation on the functional capability?” If the answer is “yes,” then the mapping is YES.
13
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
However, if the challenge is primarily technical in nature and the capability is non-technical in nature
(or vice versa), then an analysis is conducted to determine whether the use of technical or non-
technical solutions to implement the capability would significantly enhance the ability of a forensic
investigator to overcome the challenge, as illustrated in questions Q2-c and Q2-d. If the answer to
this question is “no,” then no further analysis is required. If the answer to question Q2-c or Q2-d is
“yes,” then the analysis will continue to determine: “If the challenge were overcome, would that
make it easier to conduct a cloud forensic investigation on the functional capability?”
This methodology provides a well-defined, structural approach for the analysis. As a result, the
flowchart will help cloud designers, forensic investigators, and other interested parties focus
specifically on functional capabilities that are affected by a specific cloud forensic challenge.
The process of traversing the flowchart involves asking questions about the particular challenge
and capability pair being analyzed. Starting at the top right of the flowchart (labeled “Q2-a”), each
box asks a question about the challenge or the capability. The answer to each question – YES or
NO – then leads to either another box with a question or to one of the circles or the hexagon
shown in Table 1.
Table 1. The meaning of the circles/hexagon within the flowchart of Fig. 2
The challenge DOES NOT affect the capability for reasons explained in
NO
NOTE 1 and NOTE 2, below.
To determine whether the forensic challenge affects the functional capability, three fundamental
types of questions are asked:
1. Question 1 (Q1) — If the challenge were overcome, would that make it easier to conduct a
cloud forensic investigation on the functional capability? Note that the term “cloud
forensic investigation” means the identification, acquisition, preservation, examination,
interpretation, and reporting of potential digital evidence in the cloud. When analyzing
Question 1, it is narrowly considered only with regard to the particular functional
capability, ignoring all other capabilities as if they do not exist. So, the question really
asked is: If the challenge were overcome, would that make it easier to conduct a cloud
forensic investigation on this functional capability only while ignoring other capabilities?
2. Question 2 (Q2-a, Q2-b, Q2-c, and Q2-d) — These questions only relate to the challenges
and not capabilities. The purpose of these questions is to determine whether the challenge
deals with technical or non-technical issues and if either technical solutions or non-
technical solutions significantly amplify the ability to overcome the challenge.
14
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
3. Question 3 (Q3-a and Q3-b) — These questions only relate to the capabilities and not the
challenges. The purpose of these questions is to determine whether the capability deals
primarily with technical or non-technical issues.
Questions 2 and 3 ask about the issues that a challenge or capability deals with, which are
determined as follows. As discussed in Sec. 2, the NCC FSWG labeled each of the 62 challenges
according to the following nine categories: architecture, data collection, analysis, anti-forensics,
incident first responders, role management, legal, standards, and training. The labels for each
challenge may be found in [1], Annex A, Table 2, in the columns labeled “Primary Category” and
“Related Category.” These categories and the challenge descriptions are used to determine the
type of issue each challenge deals with. If the primary issues are standards, legal issues, contracts,
service-level agreements, jurisdiction issues, privacy, ethical issues, training, qualification, or
certification, then the challenge is considered non-technical. Otherwise, it is considered technical.
Similarly, if a capability deals primarily with standards, legal issues, contracts, service-level
agreements, jurisdiction issues, privacy, ethical issues, training, qualification, or certification, then
the capability is considered non-technical. Otherwise, it is considered technical.
The NCC FSWG developed consensus answers for all of the questions related to Question 2 and
Question 3 in the flowchart. Therefore, when a particular challenge and capability pair was
considered, all these questions were already answered. This resulted in much more consistent
mappings across all challenges and capabilities.
When traversing the flowchart starting at the box labeled “Q2-a,” if a NO node is not reached,
then the box labeled “Q1” is eventually reached. For any challenge and capability pair, it may lie in
one of two groups when Q1 is reached (see Fig. 2). As discussed above, Group 1 is the “Technical
Group,” and Group 2 is the “Non-Technical Group.” They are defined as follows:
• Group 1 (Technical Group)
[The challenge is technical, OR the challenge is non-technical but requires technology (at
least partially) to overcome the challenge.]
AND
[The functional capability is technical.]
• Group 2 (Non-Technical Group) –
[The challenge is non-technical, OR the challenge is technical but requires non-technical
solutions (at least partially) to overcome the challenge.]
AND
[The functional capability is non-technical.]
Once a challenge and capability pair are assigned to the appropriate group, the question of
whether overcoming the challenge makes it easier to conduct forensics on the capability is asked.
This determines whether the capability is affected by the challenge. If the grouping is appropriate
and overcoming the challenge makes it easier to conduct forensics, then the challenge is
considered to affect the capability (i.e., the mapping is YES).
15
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
However, a challenge may be non-technical but requires technology to overcome it. Examples of
non-technical challenges that have both non-technical and technical solutions include ([1], Annex
A):
• FC-56 (confidentiality and PII) deals with legal and privacy issues (i.e., a non-technical
challenge). Privacy issues can be resolved with a combination of legal steps (e.g.,
legislation) and technological steps (e.g., privacy-enhancing technologies).
• FC-64 and FC-65 deal with training (i.e., non-technical challenges). Training issues can be
resolved with better and more widely available training classes, but they can also be
resolved with better technology to perform the training.
There are non-technical challenges that require solutions that are non-technical, technical, or a
combination of both. If the non-technical challenge requires only a non-technical solution (and the
capability is non-technical), it is in Group 2. If it requires only a technical solution (and the
capability is technical), it is in Group 1. If it requires both, then it is in Group 1 or Group 2,
depending on whether the capability is technical or non-technical.
When a challenge is technical but requires a non-technical solution (and the capability is non-
technical), then it is in Group 2.
In Fig. 2, the two purple hexagons refer to two notes, as follows:
• NOTE 1: When this circle is reached, the challenge is neither technical nor non-technical.
Fortunately, none of the challenges reach this node as none have this property. This node
is included simply for logical completeness of the flowchart, so that every node has both a
YES exit path and a NO exit path.
• NOTE 2: When this circle is reached, the capability is neither technical nor non-technical.
There are a few capabilities that reach this node. However, these capabilities do not deal
with issues directly related to digital forensics for cloud computing. Rather, they involve
controlling physical access to facilities (e.g., using barriers, security patrols, checking
physical ID cards.) and mitigating physical threats to facilities (e.g., installing fire
suppression equipment).
This process for analyzing any pair that consists of a cloud functional capability and a cloud
forensic challenge represents a core component of the CC FRA methodology. It can be applied to
any set of capability-challenge pairs, either modified from the sets used in this document or
adapted from a different architectural framework or empirical data.
16
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
1 The container is a high-level collection of capabilities consisting of related processes and procedures within the domain.
17
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
...HIDDEN…
FC01
FC02
FC03
FC04
FC05
FC06
FC07
FC08
FC09
FC58
FC59
FC60
FC61
FC62
FC63
FC64
FC65
2a
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
No
No
No
No
No
No
No
No
2b
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Components descriptions also available on CSA's inte
https://research.cloudsecurityalliance.org/tci/
Yes
Yes
Yes
Yes
Yes
Yes
2c
No
No
No
DOMAIN CONTAINER CAPABILITY \
Index
(process or solution) 3a 3b \
Yes
Yes
No
No
No
No
No
No
2d
\
4 BOSS Compliance Intellectual Property Yes No NO* NO* NO NO* NO* NO NO* NO* NO YES YES YES NO NO NO NO NO
Fig. 3. Excerpt of the Forensic Reference Architecture (challenges vs. capabilities Mapping Table).
The entry in the table that corresponds to a specific column and row (i.e., a specific challenge-
capability pair) is either YES or NO based on the result of traversing the mapping flowchart in Fig.
2. Traversing the flowchart requires answers to Questions 1 (Q1), 2 (Q2-a, Q2-b, Q2-c, Q2-d), and 3
(Q3-a, Q3-b). As described in Sec. 4, Q1 must be answered for each individual challenge-capability
pair that reaches Q1 when the flowchart is traversed. However, Questions 2 and 3, which relate
only to challenges and capabilities separately, can be answered ahead of time, and the NCC FSWG
developed consensus answers for these. These answers are shown in the table in Fig. 3. The
second row in the table has the answers for Q2-a, the third row for Q2-b, the fourth row for Q-2c,
and the fifth row for Q2-d. The fifth column in the table has the answers for Q3-a and the sixth
column for Q3-b.
Each entry in the table (i.e., YES, NO, NO*) is color-coded as follows:
• Orange — A NO is obtained (coded as NO*) before reaching question Q1 in the flowchart.
These entries can be filled in automatically once the answers to questions Q2-a, Q2-b,
Q2-c, Q2-d, Q3-a, and Q3-b are entered.
• Red — A NO is obtained as a result of answering Q1.
• Green — A YES is obtained as a result of answering Q1.
18
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
Analysis of the correlation between the forensic science challenges and the functional capabilities
constitutes the foundation for achieving consistent and repeatable answers to the questions
identified in the CC FRA methodology. Each challenge is further categorized based on its overall
impact on cloud functional capabilities. This categorization focuses on the overall number of
affected capabilities and identifies whether only a limited set of capabilities is impacted versus
most capabilities composing the cloud ecosystem being impacted. The term “impact” is used to
indicate how broadly or narrowly a challenge affects the set of functional capabilities. Therefore,
the impact of each challenge was categorized along a generic-to-specific scale as follows (see IR
8006 [1], Annex A, Table 2, column 4):
• Generic (G) – A challenge is labeled generic if it affects most of the capabilities.
• Specific (S) – A challenge is labeled specific if it affects a limited set of capabilities.
• Quasi (Q) – A challenge is labeled quasi if it falls somewhere between generic and specific.
A specific challenge applies narrowly and affects only a limited number of capabilities, while a
generic challenge affects a broad set of capabilities. The specific challenge affects a capability in a
direct manner that is determined by the particular issues addressed by the capability. This results
in the capability being affected in an important and profound way. However, because the generic
challenge affects most of the capabilities, the affect is not tied closely to the issues addressed in
each capability, and the capabilities are affected in a much less important and profound way.2
Thus, a specific challenge is more impactful overall than a generic one when it comes to
conducting a cloud forensic investigation. The generic-to-specific label of each challenge is also
part of the CC FRA, as shown in Appendix E. The NCC FSWG developed consensus labels for all of
the challenges [1].
19
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
6. Conclusion
This document presents the NIST Cloud Computing Forensic Reference Architecture (CC FRA),
which is comprised of:
a) A methodology for analyzing the functional capabilities of an existing architecture (e.g., a
security architecture like the Cloud Security Alliance’s [CSA’s] Enterprise Architecture [EA]
[2]) in the context of a set of cloud forensic challenges, such as the set identified in IR 8006
[1]
b) A dataset that aggregates the results of the above methodology applied to the CSA’s EA [2]
and the IR 8006 [1] set of cloud forensic challenges
The goal of the FRA is to enable the analysis of cloud systems to determine the extent to which a
system proactively supports digital forensics. More precisely, the FRA is meant to help users
understand how the previously identified cloud forensic challenges might impact an organization’s
cloud-based system. When developing a new system or analyzing an existing one, the FRA helps
identify those cloud forensic challenges that could affect the system’s capabilities and, therefore,
require at least partial mitigation strategies to support a complete forensic investigation. The FRA
also identifies how a forensic investigator would apply the mitigation strategies to a particular
investigation. While the FRA can be used by any cloud computing practitioner, it is specifically
designed to enable cloud system architects, cloud engineers, forensic practitioners, and cloud
consumers to analyze and review their cloud computing architectures for forensic readiness.
The FRA data provided in this document offers an initial implementation of the FRA methodology
and the ability for cloud forensic stakeholders to analyze how the NIST cloud forensic challenges
presented in IR 8006 [1] affect each functional capability present in the CSA’s EA [2]. All users are
encouraged to customize this initial implementation (shown in Appendix E) for their specific
situations and needs. For example, if the existing functional capabilities are not appropriate for
the user’s situation, some or all can be removed, and new ones can be added, perhaps based on a
different architecture than the CSA EA. Similarly, new forensic challenges that are appropriate for
the user’s situation can be added, and challenges that have been adequately mitigated can be
removed. The FRA methodology promotes analysis of how cloud forensic challenges affect
particular functional capabilities and helps determine whether mitigations are necessary to ensure
forensic readiness related to the respective capability. This means that users can replace all cloud
forensics challenges or functional capabilities used in the current FRA dataset with their own.
The FRA presented here will likely evolve over time, and methods for quantifying impact will be
developed in the future to enhance FRA usability.
20
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
References
[1] Herman M, Iorga M, Salim AS, Jackson R, Hurst M, Leo R, Lee R, Landreville N, Mishra AK,
Wang Y, Sardinas R (2020). NIST Cloud Computing Forensic Science Challenges. (National
Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal
Report (IR) 8006. https://doi.org/10.6028/NIST.IR.8006
[2] Cloud Security Alliance Enterprise Architecture. Available at
https://ea.cloudsecurityalliance.org/
[3] The White House, Executive Order on Improving the Nation’s Cybersecurity, May 12, 2021.
Available at https://www.whitehouse.gov/briefing-room/presidential-
actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/
[4] Joint Task Force (2018). Risk Management Framework for Information Systems and
Organizations: A System Life Cycle Approach for Security and Privacy. (National Institute of
Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-37, Rev. 2.
https://doi.org/10.6028/NIST.SP.800-37r2
[5] International Organization for Standardization, ISO 2700 Standards. Available at
https://www.27000.org/index.htm
[6] ISO/IEC 27001, Information Technology — Security Techniques — Information Security
Management Systems — Requirements, 2013. Available at
https://www.iso.org/standard/54534.html
[7] ISO/IEC 27002, Information Security, Cybersecurity and Privacy Protection — Information
Security Controls, 2022. Available at https://www.iso.org/standard/75652.html
[8] ISO/IEC 27018, Information Technology — Security Techniques — Code of Practice for
Protection of Personally Identifiable Information (PII) in Public Clouds Acting as PII
Processors, 2019. Available at https://www.iso.org/standard/76559.html
[9] ISO/IEC 27035-2, Information Technology — Security Techniques — Information Security
Incident Management — Part 2: Guidelines to Plan and Prepare for Incident Response,
2016. Available at https://www.iso.org/standard/62071.html
[10] ISO/IEC 27037, Information Technology — Security Techniques — Guidelines for
Identification, Collection, Acquisition and Preservation of Digital Evidence, 2012. Available
at https://www.iso.org/standard/44381.html
[11] IT Infrastructure Library (ITIL). Available at https://www.ibm.com/cloud/learn/it-
infrastructure-library
[12] The SABSA Institute, SABSA Enterprise Security Architecture. Available at
https://sabsa.org/
[13] The Open Group, The TOGAF Standard, Version 9.2. Available at
https://www.opengroup.org/togaf
[14] Cloud Security Alliance – Security, Trust, Assurance and Risk (STAR). Available at
https://cloudsecurityalliance.org/star
[15] NIST Cloud Computing Security Reference Architecture (Draft). (National Institute of
Standards and Technology, Gaithersburg, MD). NIST Special Publication (SP) 500-299/800-
200. Available at https://github.com/usnistgov/CloudSecurityArchitectureTool-CSAT-
v0.1/blob/master/Documents/NIST%20SP%20800-200-SRA_DRAFT_20180414.pdf
21
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
[16] Mell PM, Grance T (2011) The NIST Definition of Cloud Computing. (National Institute of
Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800-145.
https://doi.org/10.6028/NIST.SP.800-145
[17] United States Congress, Sarbanes-Oxley Act of 2002, Public Law 107–204, 107th Congress.
Available at https://www.govinfo.gov/content/pkg/PLAW-107publ204/pdf/PLAW-
107publ204.pdf
[18] Federal Trade Commission, Gramm-Leach-Bliley Act (Financial Services Modernization Act
of 1999). Available at https://www.ftc.gov/tips-advice/business-center/privacy-and-
security/gramm-leach-bliley-act
[19] PCI Security Standards Council, Payment Card Industry (PCI) Security. Available at
https://www.pcisecuritystandards.org/pci_security/
[20] ISACA, COBIT – Control Objectives for Information Technologies. Available at
https://www.isaca.org/resources/cobit
[21] Jericho Forum. Available at
https://publications.opengroup.org/catalogsearch/result/?q=jericho+security+reference+a
rchitecture
[22] Liu F, Tong J, Mao J, Bohn R, Messina J, Badger L, Leaf D (2011). NIST Cloud Computing
Reference Architecture. (National Institute of Standards and Technology, Gaithersburg,
MD), NIST Special Publication (SP) 500-292. https://doi.org/10.6028/NIST.SP.500-292
[23] SWGDE Digital and Multimedia Evidence (Digital Forensics) as a Forensic Science Discipline,
Version 2.0, September 5, 2014. Available at
https://drive.google.com/file/d/1OBux0n7VZQe7HSgObwAtmhz5LgwvX0oY/view
[24] ISO/IEC 2382, Information technology - Vocabulary, 2015. Available at
https://www.iso.org/standard/63598.html
[25] Scarfone K, Souppaya M, Hoffman P (2011). Guide to Security for Full Virtualization
Technologies. (National Institute of Standards and Technology, Gaithersburg, MD), NIST
Special Publication (SP) 800-125. https://doi.org/10.6028/NIST.SP.800-125
[26] REF: ISO/IEC 27017, Information technology — Security techniques — Code of practice for
information security controls based on ISO/IEC 27002 for cloud services, 2015. Available at
https://www.iso.org/standard/75652.html
22
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
Appendix A. Acronyms
Selected acronyms and abbreviations used in this paper are defined below.
BOSS
Business Operation Support Services
CC FRA
Cloud Computing Forensic Reference Architecture
COBIT
Control Objectives for Information Technologies
CSA
Cloud Security Alliance
EA
Enterprise Architecture
FC
Forensic Challenge
FISMA
Federal Information Security Modernization Act
FRA
Forensic Reference Architecture
GRC
Governance, Risk management, and Compliance
IaaS
Infrastructure as a Service
IEC
International Electrotechnical Commission
ISACA
Information Systems Audit and Control Association
ISO
International Organization for Standardization
ITIL
Information Technology Infrastructure Library
ITOS
Information Technology Operation and Support
NCC FSWG
NIST Cloud Computing Forensic Science Working Group
PaaS
Platform as a Service
PCI
Payment Card Industry
23
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
PII
Personally Identifiable Information
RMF
Risk Management Framework
S&RM
Security and Risk Management
SaaS
Software as a Service
SABSA
Sherwood Applied Business Security Architecture
SLA
Service-Level Agreement
SOA
Service-Oriented Architecture
SOP
Standard Operating Procedure
SRA
Security Reference Architecture
STAR
Security, Trust, Assurance and Risk
SWGDE
Scientific Working Group on Digital Evidence
TOGAF
The Open Group Architecture Framework
24
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
Appendix B. Glossary
cloud computing
A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing
resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released
with minimal management effort or service provider interaction. This cloud model is composed of five essential
characteristics, three service models, and four deployment models. [16]
cloud consumer
A person or organization that maintains a business relationship with and uses service from cloud providers. [22]
cloud provider
The entity (i.e., person or organization) responsible for making a service available to interested parties. [22, adapted]
digital forensics
The process used to acquire, preserve, analyze, and report on digital evidence using scientific methods that are
demonstrably reliable, accurate, and repeatable such that the results may be used in judicial proceedings. [23,
adapted]
forensic readiness
The ability to collect digital evidence quickly and effectively with minimal investigation costs. This involves being able
to define the digital evidence required to reconstruct past computing events of interest.
functional capability
Cloud processes or solutions in the Cloud Security Alliance’s Enterprise Architecture that cover business operations, IT
operations, security and risk management, presentation services, application services, information services, and
infrastructure services. [2, adapted]
incident response
The mitigation of violations of security policies and recommended practices. Addressing and managing the
consequences of a security breach or cyber attack.
security
Measures and controls that ensure the confidentiality, integrity, and availability of the information processed and
stored by a computer.
virtual machine
A virtual data processing system that appears to be at the exclusive disposal of a particular user but whose functions
are accomplished by sharing the resources of a real data processing system. [24]
virtualization
The simulation of the software and/or hardware upon which other software runs. This simulated environment is
called a virtual machine. [25, adapted]
25
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
26
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
S&RM capabilities cover identity and access management, GRC (i.e., governance, risk
management, and compliance), policies and standards, threat and vulnerability
management, and infrastructure and data protection.
4. Presentation Services — These functional capabilities are associated with the end user
interacting with a cloud IT solution. The capabilities cover presentation modalities and
presentation platforms, including end points, handwriting, and speech recognition.
5. Application Services — These functional capabilities are associated with the
development and use of cloud applications provided by an organization. The capabilities
cover programming interfaces, security knowledge life cycles, development processes,
integration middleware, connectivity and delivery, and abstraction.
6. Information Services — These functional capabilities are associated with the storage and
use of cloud information and data. The capabilities cover service delivery, service
support, reporting services, information technology operation and support, business
operations and support, data governance, user directory services, risk management, and
security monitoring.
7. Infrastructure Services — These functional capabilities are associated with core
functions that support the cloud IT infrastructure. The capabilities cover facilities,
hardware, networks, and virtual environments.
Together, there are 347 functional capabilities within these domains.
The CSA’s Enterprise Architecture v1.1 (provided as overview in Fig. 4. CSA’s Enterprise
Architecture (v1.1) [2]) and v2.0 are available for download as PDF files that can be easily
enlarged for further review at NIST’s FRA GitHub repository and the NIST Cloud Computing
Forensic Science's website.
27
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
28
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
Fig. 5. Graphical representation of NIST’s Cloud Security Reference Architecture (SRA) [15]
Each capability of the SRA is analyzed then in the context of the challenges documented in IR 8006
[1] (graphically depicted in Fig. 6).
29
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
The analysis determines whether each challenge affects the capability if implemented in a cloud
environment as part of a cloud service or solution. If the challenge does affect the capability, then
the functional capability is considered to have forensic importance, and it is imported to or
considered to be a capability of the FRA.
The resulting FRA, graphically represented as the top layer in Fig. 1, is also included below, in Fig.
7. This figure demonstrates the overlay concept employed in the FRA methodology. The text in the
figure has no significant meaning for the overlay concept.
30
NIST SP 800-201 NIST Cloud Computing
July 2024 Forensic Reference Architecture
31