Cloud Security Policy For Government Agencies 2014 Qatar
Cloud Security Policy For Government Agencies 2014 Qatar
2. INTRODUCTION
Cloud computing offers a lot of potential benefits to public and government bodies, including
scalability, elasticity, high performance, less administration headaches together with cost
efficiency, agility, flexibility, faster time to market and new innovation opportunities.
Understanding, managing and controlling the risks mainly affecting confidentiality, security
and resiliency related to the adoption is what this document trying to achieve.
For example:
Lack of clear definitions pertaining cloud and its associated services and different
architectures
Lack of cloud security certification and standards and incomplete compatibility with
currently adopted security standards
Lack of a clear procurement language and methodology for choosing the most
appropriate cloud service.
And most importantly how we can digest the shift in the balance of responsibility and
accountability for key functions such as governance and control over data and IT operations,
and, in some instances, the quality and the availability of internet connectivity which is crucial
for the service.
The purpose of this policy is to provide government agencies with an overview of cloud
computing and the security and privacy challenges involved. The document discusses the
threats, technology risks, and safeguards for cloud environments, and aspires to provide the
insight needed to make ICT decision makers take informed decisions by providing tools such as
a detailed questionnaire that can be used to assess and evaluate the cloud service provider (CSP)
offerings.
3. DEFINITIONS
Cloud: a term used for global networks, originally used to reference the telephone
network now commonly used as a reference to the internet
Cloud Broker: an entity that creates and maintains relationships with multiple cloud
service providers. It acts as a liaison between cloud service providers and cloud service
customers. A cloud broker has not cloud resources of its own
Cloud Bursting: is a technique used by Hybrid Clouds (See Hybrid Clouds) to provide
additional resources to private clouds if needed. If the workload exceeds the private
cloud’s capacity a hybrid cloud automatically allocated additional resources through
this technique
Cloud Portability: the ability to move applications and data from one cloud provider
to another (Related to Vendor-lock in)
Cloud Service Provider: (CSP) An entity (Private or Public) that provides cloud
based platforms, infrastructure, application, security or storage services for another
entity/organization. Usually for a fee.
Cloud Storage: a service that allows the customers to save data by transferring it over
the internet/WAN to another storage system managed by a third party
Customer self-service: a feature that allows the cloud customers to deploy, manage
and terminate services themselves without involving the service provider
Classification labels:
o Unclassified, Public or no Label: Public Information
o Internal: for State Agency internal use; material whose disclosure would
cause light to moderate damage to the affected party
o Limited Access: access for defined users, roles or user groups; material
whose disclosure would cause serious damage to the affected party
Governance: the controls and practices and processes that make sure policies are
enforced
G.C.C: Gulf Cooperation Council is a political and economic union of the Arab states
bordering the Arabian gulf and located on or near the Arabian Peninsula,
namely Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, and United Arab Emirates
Hosted Application: an internet based or web based application that runs remotely
Internal Cloud: a type of private cloud who services are provided by an IT department
to those in its own organization
Middle ware: software that sits between applications and operating systems, usually
consisting of services that enable and support operating in distributed architecture, as
an example, the data on one database can be accessed through another data base on a
different platform
Vendor Lock-in: dependency on a particular vendor (cloud service provider) and the
difficulty moving from one cloud service provider to another
Virtual Machine (VM): a file typically (called an Image) that when executed appears
to the user as an actual machine. The VM can be started or stopped as needed, changes
made to the VM while it is running can be stored to disk to make them persistent
(definition source: NIST)
Virtualization: the simulation of the software and or hardware upon which other
software can run
Virtual Private Cloud (VPC): a private cloud that exists within a shared or public
cloud.
4. WHAT IS CLOUD COMPUTING
Cloud Computing: is an ICT sourcing and delivery model for enabling convenient, on-
demand network access to a shared pool of configurable computing resources (e.g. networks,
servers, storage, applications and services) that can be rapidly provisioned and released with
minimal management effort or service provider interaction.
Cloud Computing is composed of five essential characteristics, three service models, and four
deployment models.
Cloud Infrastructure: is the collection of hardware and software that enables the five
essential characteristics of cloud computing. The cloud infrastructure can be viewed as
containing both a physical layer and an abstraction layer. The physical layer consists of the
hardware resources that are necessary to support the cloud services being provided, the
abstraction layer consists of the software deployed across the physical layer.
Broad network access. The services are available over the network and access is
supported through multiple platforms (e.g., mobile phones, tablets, laptops, and
workstations).
Resource pooling. The cloud service provider computing resources are pooled to serve
multiple consumers at the same time, the consumers can be from anywhere in the
world. Examples of resources include storage, processing, memory, and network
bandwidth.
Scalability. Cloud resources can be easily provisioned and released. To the consumer,
the resources available for provisioning may appear to be unlimited and can be
appropriated in any quantity at any time.
Measured service. Cloud systems automatically control and optimize resource use.
Resource usage can be monitored, controlled, and reported, providing transparency for
both the provider and consumer.
Software as a Service (SaaS). This model offers the state agency the facility to use the
Cloud service provider’s applications running on a cloud infrastructure. The software
applications are accessible online via a web interface or via desktop application. The
consumer has no control over the underlying hardware configuration.
Platform as a Service (PaaS). This model offers the state agency the facility to deploy
or install onto the cloud infrastructure a state agency-created or acquired application
with the condition that the application is created using programming languages,
libraries, services, and tools supported by the cloud service provider. The consumer has
no control over the underlying hardware configuration, storage, network, operating
system or management layers.
Infrastructure as a Service (IaaS). This model offers the state agency the facility to
utilize processing, storage, networks, and other computing resources where the
consumer is able to install and run any software, which may include operating systems
and applications. The state agency does not manage or control the underlying cloud
infrastructure but has control over operating systems, storage, and deployed
applications.
Public cloud. The cloud infrastructure is commissioned for open use by any
organization. It may be owned, managed, and operated by a private or public
organizations or a combination of them. It exists on the premises of the cloud service
provider.
Hybrid cloud. The cloud infrastructure is a composition of two or more different cloud
infrastructures (private, community, or public) that remain separate entities, but are
bound together by standardized or proprietary technology that enables data and
application portability (e.g., load balancing between clouds).
The following table summarizes the key concepts of sections 4.2 and 4.3
Hybrid Organization AND 3rd Organization AND 3rd Both on-site and Trusted and
party provider party provider off-site Untrusted
Depending upon the cloud model of choice, an understanding and mitigation of the following
risks will be required:
Issue Explanation
Data Location
Due to the dynamic nature of the cloud, the state
agency might not be fully aware about where its
information actually resides at any given point in
time.
Privacy and Reputation State agencies must be aware of the risks associated
with any possible compromise to government or
personal information through 3rd party accessing
the information.
Depending on the cloud model of choice an Agency subscribing to an IaaS service may retain
complete control of, and therefore be responsible for, the on-going security and maintenance
of all operating systems, applications, virtual configurations (including the hypervisor and
virtual security appliances), and data. In this scenario, the CSP would be responsible for
maintaining the underlying physical network and computing hardware.
The following diagram illustrates how an Agency’s responsibility may vary according to the
cloud model
Source: PCI-DSS Virtualization guidelines, 2011
Cloud computing introduces a lot of appealing features and capabilities that can be considered
as adoption drivers for State Agencies
Driver Benefit
9. POLICY STATEMENTS
9.1.
The Qatari Government state agencies may choose a local or a G.C.C based cloud services IF
they demonstrate compliance with the security requirements stated in this document. Qatari
Government state agencies SHALL not use a CSP that lies outside the legal jurisdiction or
geographical boundaries of the state of Qatar and the G.C.C. unless the service entitlements
comply with the information privacy and protection laws, NIAP (specifically with the data
classification policy) and other applicable governing laws and regulations.
11.2.1. Updates and releases The State Agency SHALL agree appropriate
update and release cycles affecting the
security features with the CSP that the State
Agency teams (Such as: Security, Continuity,
legal and governance…etc.)
11.2.2. CSP agile risk Management The State Agency SHALL request and assess
the detailed information on how the CSP
practices ensures and applies agile and rapid yet
comprehensive risk management prior to
contracting the CSP.
The State Agency SHALL optimize its risk
11.2.3. Risk Management Optimization management processes and tools to
accommodate iterative and agile cloud
deployments
11.2.4. CSP controls checking The State Agency SHALL ask and validate
the CSP’s risk control checking methodology
methodology or ensure that information security policy
conforms with international best practices
12. VIRTUALIZATION
12.2.1. CSP Hardening guides and The State Agency SHALL assess the CSP
virtualization hardening guides and policies
policies and evaluate the 3rd party gap assessment
against virtualization security standards like
NIST SP800-125. This includes but not
limited to:
Disable or remove all unnecessary
interfaces, ports, devices and services;
Securely configure all virtual network
interfaces and storage areas;
Establish limits on VM resource usage;
Ensure all operating systems and
applications running inside the virtual
machine are also hardened;
Validate the integrity of the
cryptographic key-management
operations;
Harden individual VM virtual hardware
and containers;
12.2.2. Snap-Shots Security The State Agency SHALL ensure that the CSP
has the controls in place to guarantee that
only authorized snapshots are taken, and
that these snapshots' level of classification
and storage location and encryption is
compatible in strength with the production
virtualization environment. (Additional
references on data classification is available
in the NIA policies)
The State Agency SHALL ensure the
12.2.3. Hypervisor Security following controls are applied:
12.2.4. Client Image Support The State Agency SHALL ensure that the CSP
supports the use of trusted VMs provided by
the State Agency, those VMs were made in
compliance with the hardening guidelines in
the NIAP
12.2.5. CSP vendor list CSP shall provide the State Agency with its
complete vendor list that will l have access to
the State Agency data; at any point
throughout the duration of the agreement.
The CSP should also update the agency with
any change in the vendor list.
13. IDENTITY AND LOG MANAGEMENT
While Log management (who has access to the logs?), is another management issue that must
be addressed and agreed upon in advance.
13.2.2. Active Directory Authentication The State Agency SHALL NOT grant the CSP
permissions to directly use/access the
organization authentication environment
such as the organization’s main directory
13.2.3. Multi-Factor Authentication The State Agency SHALL ensure that the CSP
support Several Multi-Factor authentication
mechanisms, such as tokens, OTA one time
passwords , biometrics…etc.
13.2.4. CSP Identity Management The State Agency SHALL choose a CSP that
allows State Agency control in managing its
own identities, (including Staff Identity
creation and deletion/termination)
13.2.5. Identity Regulatory The State Agency SHALL ensure that the
CSPs authentication process, access control,
Requirements accountability and logging (Format,
retention and Access) meet the Agency
regulatory and legal requirements
13.2.7. Logging level and retention State Agencies SHALL ensure logging is
enabled for
all security events (covering sessions and
transaction information) for a period not less
than 90 days
14. WEB APPLICATION SECURITY
14.2.1. CSP security team The State Agency SHALL have the following
information at hand:
i. The location and time of access of the
the CSP security team
14.2.2. Application security The State Agency SHALL ensure that the CSP
Applies:
i. Application layer firewalls
ii. Secure code reviews are executed (if
possible)prior to provisioning any
application release
iii. Secure web development best
practices like OWASP secure
development guides
iv. OS and Applications security
hardening best practices
v. Periodic Penetration testing and that
a remediation program is defined,
and it includes fixing the
vulnerabilities based on priority. All
vulnerabilities should be prioritized
and must be fixed and patched
within SLAs agreed upon by the State
Agency and the CSP.
vi. A proper software development life
cycle (SDLC) and that security is an
integrated part in at least the
following phases:
Planning and requirements
gathering
Architecture and functional
Design phase
Coding
Testing
Maintenance
15. DISASTER RECOVERY
15.2.1. Change management and The State Agency SHALL ensure that the CSP
adopt and is in compliance with change
Incident response management and incident response
procedures as specified in (ITIL)
17.2.2. Assessing the data The State Agency SHALL evaluate each of
the Data segmentation controls at each layer,
segmentation controls as well as the number and type of controls at
each layer every 6 month and after major
system changes and upgrades.
Note: cloud data separation controls are
typically weaker at the physical layer (as
there is often no physical separation),
requiring controls on the other three layers
to be far stronger.
17.2.3. Data Labelling The State Agency SHALL ensure that the
CSP can meet the data labelling
requirements of the NIAP.
The State Agency SHALL ensure that data is
17.2.4. Data Encryption encrypted at storage and in transit and in full
compliance (at any given point in time) with
NIAP and NIAP Appendix B for the
government approved cryptographic
algorithms and protocols.
18.2.1. Training and Awareness The State Agency SHALL train its
responsible staff on vendor management
and cloud technologies.
18.2.2. Roles and Responsibilities The State Agency SHALL define and
document the different roles and
responsibilities for the staff responsible for
managing the cloud service.
Example: legal, procurement, change
management committee, business owners,
security and risk.
The State Agency SHOULD create a RACI
18.2.3. RACI Matrix (Responsible, Accountable, Consulted, and
Informed) matrix that includes the State
Agency and the CSP to define accountability
and obligations.
19.2.4. Legal Prevalence The State Agency SHALL ensure that the
CSP’s own data privacy policy complies with
the applicable laws in Qatar.
19.2.5. Data High Availability i. The State Agency SHALL ensure that
SLAs reflect he applications and data
high availability requirements (as
per the State Agency’s BIA or
Business requirements) in the event
of planned or unplanned disruptions
or outages, with business continuity
and disaster recovery planning and
backup and redundancy
mechanisms reviewed by the State
Agency
19.2.7. Data Breach Penalty The State Agency SHALL contractually state
that the CSP will be responsible for any
financial losses or penalties ( up to the agreed
Cap) that may occur due to a CSP breach
19.2.8. Right to be forgotten The State Agency SHALL contractually state
that the CSP will completely delete/eliminate
any trace of Data/information at the end of
the Agreement as agreed in the agreement.
19.2.10. Data Mobility The State Agency SHALL ensure that the CSP
supports the return of data to the State
Agency. There should be no Vendor-lock In
by the CSP.
20. GENERAL RECOMMENDATIONS TO STATE AGENCIES
State Agencies SHALL develop a roadmap to adopting and integrating cloud computing
because of the complexity of the cloud environment that introduces a number of
unknown variables for which government and public services will need to build new
approaches to assess and manage the associated risks.
It’s RECOMMENDED that State Agencies should always keep and maintain the
capability of backtracking from the adoption of a cloud solution.
21. REFERENCES:
1. National Information Assurance Policy (ictQATAR, April 2014)
5. Security guidance for critical areas of focus in cloud computing (CSA V3.0)
(*) marks
mandatory
controls
Third Party
Access
RM.08 Do you monitor service
continuity with upstream
internet providers in the event
of provider failure?
facilities?
The above questionnaire is primarily based on the CAI questions issued by the
CSA. www.cloudsecurityalliance.org
23. APPENDIX B (NON-DISCLOSURE AGREEMENT (NDA)) - TEMPLATE
Note: The template below is valid in case of contracting a 3rd party Cloud service provider.
This Agreement dated XXX between YYY (hereinafter called “the Owner”) and the Cloud
service Provider (ZZZ) (hereinafter called “the CSP”).
AND WHEREAS the Owner wishes to engage the CSP to provide cloud computing services or
undertake cloud computing projects (hereinafter called “the Purpose”) which may include
disclosure of Confidential Information by Owner to the CSP in addition to other legal
obligations.
1. Definition
Agreement
Any reference herein to an Agreement means this Agreement which represents the entire
understanding between the parties and supersedes all other agreements expresses or
implied between the parties regarding disclosure of the Confidential Information.
Any information (whether written, oral, in electronic form or in any other media) that is
disclosed in connection with the Purpose by or on behalf of the Owner to the CSP on or after
the date of this Agreement; and/or the existence of the Purpose or any discussions or
documents in relation to it (including the terms of this Agreement)"
at the time of disclosure was in the public domain or subsequently enters into the public
domain other than as the direct or indirect result of a breach of this Agreement by the CSP;
or
has been received by the CSP at any time from a third party who did not acquire it in
confidence and who is free to make it available to the CSP without limitation; or
was independently developed by the Recipient without any breach of this Agreement.
2. Third parties
The CSP shall not disclose the Confidential Information to third parties except that
the CSP may disclose Confidential Information:
4. No Transfer of Rights
The CSP acknowledges and agrees that it shall not acquire any right or interest in the
Confidential Information and that the Owner shall remain the sole owner of the Confidential
Information, including but not limited to all patent, copyright, trademark, trade secret, trade
name and other property rights pertaining thereto, anywhere in the world. The CSP shall not
manufacture, use, sell, or distribute the Confidential Information without the written
permission of the Owner.
7. Modification
The parties can modify any term or condition of this Agreement only by mutual consent and
by reducing such modifications to writing, signed by both parties.
8. Successors
This Agreement shall be binding upon and inure to the benefit of both parties and their
respective heirs, successors, assigns and representatives.
9. Waiver
No waiver, delay, indulgence or failure to act by either party regarding any particular default
or omission by the other party shall affect or impair any rights or remedies regarding that or
any subsequent default or omission that are expressly waived in writing.
Signed: Signed:
Name: Name:
Title: Title:
Date: Date: