You are on page 1of 5

computer law & security review 34 (2018) 928–932

Available online at www.sciencedirect.com

journal homepage: www.elsevier.com/locate/CLSR

Legal aspects of cloud security

Richard Kemp∗
Kemp IT Law, London, UK

a r t i c l e i n f o a b s t r a c t

Article history: Enterprise (large organisation) computing workloads are moving from ‘on-prem’ to ‘in-
cloud’ increasingly quickly, and the cloud is forecast to account for almost half of enter-
prise IT by 2026, up from 10% today. But the benefits of the enterprise cloud need to be
Keywords: weighed against increasingly burdensome duties around cloud and data security. This com-
Cloud computing ment piece provides a checklist of the sources of enterprise cloud security duties and a
Information security checklist of best practices to manage them.
Cloud security © 2018 Richard Kemp. Published by Elsevier Ltd. All rights reserved.
Data protection
GDPR
Cloud contracts
Cloud governance
Standards

After the demanding bow wave of GDPR readiness legal Aggregating the elements of the private cloud and Infras-
work in the run up to 25 May 2018, IT lawyers may be forgiven tructure (IaaS), Platform (PaaS) and Software (SaaS) in the pub-
for thinking that the biggest change is now behind them. How- lic cloud, and comparing their projected development over
ever, GDPR heralds rather than ends a period of broadly based the next ten years with ‘traditional’ enterprise computing,
structural change in technology adoption, business transfor- open source IT research organisation Wikibon is forecasting
mation and IT law and regulation. Nowhere is this better that the cloud’s share of enterprise computing will grow from
shown than in the legal aspects of the rapidly developing area around 10% today to 45% by 2026.1
of cloud security. For enterprise users, the cloud provides a range of ben-
A central feature of this change is the epic migration now efits and opportunities, including provisioning flexibility, ac-
well underway in enterprise (large organisation) computing cess to new services, assisting digital transformation, speed
from ‘on premise’ – traditional IT infrastructure at the user of deployment and cost efficiencies. However, enterprise-scale
– to ‘in-cloud’ – open access to the public cloud, the more ded- organisations operate in a business environment that increas-
icated resources of the private cloud and their hybrid cloud ingly emphasises the criticality of cloud and data security -
combination. The development of the enterprise cloud is as the legal, technical, operational and governance controls that
significant as the migration of electricity generation out of the an organisation puts in place to ensure desired information
factory to the UK national grid in the 1930s but with many security outcomes.
more facets, as each component of computing – power, pro- As IT workloads migrate to the cloud, the benefits of
cessing, network, memory, storage and software - gets the cloud provisioning need to be weighed and balanced against
cloud’s ‘as a service’ treatment. security risks and duties. Organisations are therefore estab-
lishing cloud security and compliance governance procedures


Kemp IT Law, 21 Napier Avenue, London SW6 3PS, UK
E-mail address: richard.kemp@kempitlaw.com

https://doi.org/10.1016/j.clsr.2018.06.001
0267-3649/© 2018 Richard Kemp. Published by Elsevier Ltd. All rights reserved.
computer law & security review 34 (2018) 928–932 929

Table 1 – Checklist of enterprise cloud security duties and liability sources.

A. ENTERPRISE - REGULATORY DUTIES


1. Sector specific regulation
(a) Example 1: UK financial services firms regulated by the Financial Conduct Authority (FCA)
• European Banking Authority March 2018 (EBA/REC 2017/03): Cloud Outsourcing Recommendations2
• FCA July 2016 (FG16/5): Guidance for enterprises outsourcing to the ‘cloud’ and other third party IT services3
• FCA Handbook SYSC Rule 8 (General outsourcing risk management controls)4 and DTR (Disclosure and Transparency Rules)5
• Directive 2009/138/EC (Solvency II) for insurers: Articles 38 and 49 (outsourcing)6
(b) Example 2: UK law firms authorised by Solicitors Regulation Authority (SRA)
• SRA high-level Principles7
• SRA Code of Conduct8 - Outcome 7.10: outsourcing requirements (applies to cloud services)
2. Generally applicable security/data regulation
(a) Data protection/privacy – GDPR (Regulation 2016/679)9
•controller must comply with Art. 5 personal data processing principles, including ‘ensuring appropriate security … using
appropriate technical or organisational measures’ (Art 5(1)(f))
• controller ‘shall implement appropriate technical and organisational measures to ensure and be able to demonstrate that
processing is performed in accordance with’ GDPR (Art 24(1))
• controller must ‘implement appropriate technical and organisational measures designed to implement data-protection principles’
(Art 25(1))
• controller ‘shall use only processors providing sufficient guarantees to implement appropriate technical and organisational
measures’ so that processing complies with the GDPR (Art 28(1))
(b) Security of network and information systems (duties applicable to CSPs)
NIS (Directive 2016/1148)10
• a cloud service provider (CSP) ‘must identify and take appropriate and proportionate measures to manage the risks posed to the
security of network and information systems on which it relies to provide its service’ (Reg 12(1) implementing Directive, Art 16(1))11
• those measures must ‘prevent and minimise the impact of incidents … and take into account (i) the security of systems and
facilities, (ii) incident handling, (iii) business continuity management, (iv) monitoring auditing and testing and (v) compliance with
international standards’ (Reg. 12(2), implementing Art 16(1))
Communications Act 200312 (CA 2003)
Privacy and E-Communications Regulations 200313 (PECR)
• notification requirements/notifications in relation to a breach of or failure to take appropriate organisational and technical
measures, etc:
◦ by a CSP as a public electronic communication network (PECN) under S.105(A) CA 2003 or in relation to a security breach under
S.105B CA 2003;
◦ by a CSP as a public electronic communications service (PECS) provider under Reg 5 PECR;
(c) Data sovereignty – Investigatory Powers Act 201614
• regulates powers for interception and to retain and access communications data
• interception is interfering with or monitoring a communication in the course of transmission by which its ‘content’ (message and
envelope) is made available to other than sender or recipient15
• communications data is ‘the ‘who’, ‘when’, ‘where’ and ‘how’ of a communication, but not the content, not what was said or
written’16
(d) Data residency/domiciliation and related requirements
• EU: unauthorised international transfers of personal data are unlawful (GDPR, Art 44)
• Growing number of countries (including Russia, China and Vietnam) with data domiciliation laws
(e) UK criminal law
Official Secrets Act 1989
• Crown servants and UK government contractors disclosing of or failing to secure information damaging to the UK’s interests may
commit offences
Computer Misuse Act 1990
• hacking (as unauthorised access) and DDOS (distributed denial of service attacks) and various cyber activities can be offences
UK Terrorism Acts 2000-2015
• introduces terrorism offences in relation to cyber security
UK Fraud Act 2006
• phishing/identity theft (dishonestly and knowingly making a false representation intending gain or loss) can be an offence
3. Relevant generally applicable business regulation
• public companies’ governance requirements under the Companies Act 2006 (CA 2006)
• company law duty to retain accounting/general records
• directors’ CA 2006 duties to exercise reasonable skill, care and diligence in carrying out role
• litigation procedure duties relating to document discovery

(continued on next page)


930 computer law & security review 34 (2018) 928–932

Table 1 (continued)

B. ENTERPRISE – (NON-CONTRACTUAL) CIVIL LAW DUTIES

4. Negligence: towards a general duty of care in tort?


• the general duty to take “appropriate technical and organizational measures” to keep data secure in the cloud is emerging as the
cybersecurity yardstick by which the normal tortious/negligence duty to “take reasonable care” looks likely to be measured.
5. A cloud security incident may give rise to liability in a range of other civil actions including:
• breach of confidence, copyright (other intellectual property), fiduciary or statutory duty
• misuse of private information
• conversion, negligence (see above), trespass
C. ENTERPRISE – CONTRACTUAL DUTIES

6. Contractual – between Enterprise and its Customers


(a) agree customers’ general/specific data security regulatory requirements
• customer vendor policies: (i) data security, (ii) physical/logical security, (iii) data retention, (iv) disaster recovery/business continuity,
(v) business conduct, (vi) audit, (vi) vendor supply-chain flowdown
• agree on scope of ‘appropriate technical and organizational measures’ if relevant
• data sovereignty/residency-domiciliation requirements
(b) GDPR
• cover off enterprise’s GDPR obligations as controller/processor of customers’ information
• as controller – GDPR compliant data sharing
• as processor – GDPR Art. 28(3) duties, subprocessors/supply chain/international transfers, etc
(c) ‘normal’ data access, ownership/licensing, return terms
7. Contractual - between Enterprise and its Suppliers
(a) For Enterprise as customer, see inverse of C.6 a)-c) (particularly for IT vendors to Enterprise)
(b) See specific requirements of particular suppliers – e.g. Enterprise’s insurers and record retention
8. Contractual – between Enterprise and CSP
(a) Security Assessment
• Hosting: (i) where is data hosted? (ii) who is the data centre provider? (iii) what is the type of hosting (shared/dedicated
virtual/physical server, private cloud, etc)
• Encryption: (i) what encryption is in place, (ii) who manages the encryption keys?
• Management of: (i) releases, (ii) access, (iii) support, (iv) data retention, (v) continuity, (vi) incidents
(b) What certifications and assessments does the CSP have in place to assure compliance?
e.g. (i) ISO/IEC 27001 (information security management), (ii) ISO/IEC 27108 (personal data in the public cloud), (iii) ISO/ IEC 38500 (IT
Governance), (iv) ISO/IEC 38505 (data governance), (v) SSAE 16/18 SOC II, etc
D. ENTERPRISE – INTERNAL POLICIES/PROCEDURES

• IT/acceptable use policies – to cover cloud use


• Website/employee privacy policies
• Range of GDPR policies, procedures, documentation to demonstrate GDPR compliance
• Training and awareness
• Employee/consultant duties of confidentiality, etc
• Device controls (particularly for BYOD (Bring Your Own Device)
• Password controls/policies
• Vulnerability assessment/penetration testing, etc.

to manage their cloud security duties. To assist in the process, rity from the customer side, and the NCSC (UK GCHQ’s Na-
we have provided the following checklists of the sources of tional Cyber Security Centre) published in September 2016
enterprise cloud security duties and best practices to address fourteen principles for cloud security which form the basis of
those duties. the checklist of best practices for enterprise cloud security at
Many supplier organisations now produce materials on Table 2, Section A. Section B addresses the assurances that the
cloud security best practices.17 Governments and public sec- enterprise should obtain from its CSPs to back up their con-
tor organisations have tended to take the lead on cloud secu- tractual security commitments.
computer law & security review 34 (2018) 928–932 931

Table 2 – Checklist of best practices for enterprise cloud security.

A. CLOUD BEST PRACTICES: THE NCSC’S 14 CLOUD SECURITY PRINCIPLES18

Cloud Security Principle /Checklist Question


1. Data in transit protection
Is Enterprise data transiting networks adequately protected against tampering and eavesdropping by the CSP?
2. Asset protection and resilience
Is Enterprise data, and the assets storing or processing it, protected against physical tampering, loss, damage or seizure by the CSP?
3. Separation between consumers
Will a malicious or compromised service user be able to affect the service or data of another user?
4. Governance framework
Does the CSP have a security governance framework which coordinates and directs its management of the service and information
within it.
Are any technical controls deployed outside of this framework?
5. Operational security
Does the CSP operate/manage the service securely in order to impede detect or prevent attacks?
(Good operational security should not require complex, bureaucratic, time consuming or expensive processes).
6. Personnel security
Does the CSP screen/adequately train its staff?
(Where service provider personnel have access to your data and systems, you need a high degree of confidence in their
trustworthiness. Thorough screening, supported by adequate training, reduces the likelihood of accidental or malicious compromise
by service provider personnel.)
7. Secure development
Is the CSP’s service designed and developed to identify and mitigate threats to its security?
(Those which aren’t may be vulnerable to security issues which could compromise the Enterprise’s data, cause loss of service or
enable other malicious activity.)
8. Supply chain security
Does the CSP ensure that its supply chain satisfactorily supports all of the security principles which the service claims to implement?
9. Secure consumer management
Does the CSP make the tools available for secure management of the Enterprise’s use of the CSP’s service?
(Management interfaces and procedures are a vital part of the security barrier, preventing unauthorised access and alteration of
Enterprise resources, applications and data).
10. Identity and authentication
Is all access to service interfaces constrained to authenticated and authorised individuals?
11. External interface protection
Are all external or less trusted interfaces of the service identified and appropriately defended?
12. Secure service administration
Do all administration systems for the CSP’s service have highly privileged access to that service?
(Their compromise has significant impact, including the means to bypass security controls and steal or manipulate large volumes of
data.)
13. Audit information provision to consumers
Does the CSP undertake to provide the Enterprise with the audit records it needs to monitor access to the service and the data held
within it?
(The type of audit information available to the Enterprise will have a direct impact on its ability to detect and respond to
inappropriate or malicious activity within reasonable timescales).
14. Secure use of the service by the Enterprise
The security of the CSP’s service and the data held within it can be undermined if the Enterprise uses the service poorly.
Does the Enterprise have to undertake reasonable, specific (so measurable) responsibilities when using the service in order for the
Enterprise’s data to be adequately protected?
B. OBTAINING ASSURANCE FROM THE CSP ON ITS CLOUD SECURITY COMMITMENTS

The NCSC document having confidence in cyber security explains the ways in which cloud buyers can determine and demonstrate
compliance with the principles. These include:
• CSP assertion
• CSP contractual commitment
• third party certification
• independent testing
• a mix of one or more of these.

(continued on next page)


932 computer law & security review 34 (2018) 928–932

Table 2 (continued)

How does the CSP propose to give the Enterprise satisfactory assurance that it will comply with its cloud security commitments?
Does the CSP have ISO 27001 19 (on information security management systems) certification?
Does the CSP have SSAE 16/18, Soc 2 [Type II]20 certification?
Questions:
(a) Has the certification been issued by an approved certifier?
(b) Is the certification accompanied by the full, relevant report and all other necessary supporting documentation?
(c) Is the certification still current?
(d) Does the certification cover the CSP service that is to be contracted for?
(e) Does the certification cover all data centres/locations at which Enterprise data will be stored?
(f) Will the CSP undertake to keep all certifications in force for the duration of the agreement, including by renewing any that time
out or lapse?
(g) If the CSP loses any relevant committed certification, is the CSP required to notify the Enterprise promptly?
(h) Can the Enterprise terminate for CSP breach in these circumstances?

Enterprise cloud migration is set to gather pace in the com- May 2018. The UK Data Protection Act 2018 also came into
ing months and years, bringing a wide range of IT benefits to force on this date - http://www.legislation.gov.uk/ukpga/2018/
large organisations. As we have seen recently with GDPR, se- 12/pdfs/ukpga_20180012_en.pdf.
10. https://eur- lex.europa.eu/legal- content/EN/TXT/HTML/?uri=
curity is in the public eye, and legal duties to keep cloud data
CELEX:32016L1148&from=EN. The NIS Regulations (SI
secure are becoming more onerous. Balancing cloud benefits
2018/506) - https://www.legislation.gov.uk/uksi/2018/
and security duties is therefore a critical success factor for 506/made - implemented the NIS Directive into English law
organisations in their cloud operations. Ensuring cloud secu- on 10 May 2018.
rity - the mix of legal, technical, operational and governance 11. The Directive and UK Regulations apply to relevant ‘digital
measures to achieve a desired information security outcome services providers’ and the ‘operators of essential services’.
– is moving centre stage as enterprises shift their computing ‘Cloud computing services’, as ‘enabling access to a scalable
and elastic pool of shareable computing resources’ are ‘digital
workloads ‘off prem’. Putting in place effective cloud security
services’ regulated by Articles 16-18 of the Directive and
governance, and the policies, procedures, and processes that Regulations 12-14 of the UK SI.
underpin it, will become indispensable. This piece aims to as- 12. https://www.legislation.gov.uk/ukpga/2003/21/contents
sist the process by providing checklists of security responsi- 13. http://www.legislation.gov.uk/uksi/2003/2426/contents/made.
bilities and best practices to address them. [Note: as at end May 2018, discussions are under way at EU
level to replace the ePrivacy Directive (2002/58)13 -
https://eur- lex.europa.eu/legal- content/EN/TXT/HTML/?uri=
end notes CELEX:32002L0058&from=EN - with a directly applicable
ePrivacy Regulation
14. http://www.legislation.gov.uk/ukpga/2016/25/contents/
1. ‘Cloud “Vendor Revenue” Projections 2015-2016’, David Floyer, 28 enacted
February 2017, Wikibon - https://wikibon.com/cloud-vendor- 15. Investigatory Powers Act 2016, section 4
revenue-projections-2015-2026/ 16. UK Home Office, Acquisition and Disclosure of
2. https://www.eba.europa.eu/documents/10180/2170125/ Communications Data Code of Practice, March 2015, para 2.13
Recommendations+on+Cloud+Outsourcing+%28EBA-Rec- https://assets.publishing.service.gov.uk/government/uploads/
2017- 03%29_EN.pdf/e02bef01- 3e00- 4d81- b549- 4981a8fb2f1e system/uploads/attachment_data/file/426248/Acquisition_
3. UK Financial Conduct Authority - https://www.fca.org.uk/ and_Disclosure_of _Communications_Data_Code_of _Practice_
publications/finalised- guidance/fg16- 5- guidance- firms- March_2015.pdf
outsourcing- %E2%80%98cloud%E2%80%99- and- other- 17. See for example the following CSP - (supplier-) side
third- party- it approaches from: AWS - AWS Security Best Practices (August
4. FCA’s Senior Management Arrangements, Systems and 2016); Cloud Security Alliance - CSA Security Guidance 4.0
Controls (SYSC) - https://www.handbook.fca.org.uk/ (February 2018); and Microsoft - Microsoft Cloud Security for
handbook/SYSC/8/ Enterprise Architects (August 2017).
5. https://www.handbook.fca.org.uk/handbook/DTR/ 18. Headline points. See the NCSC’s full document at
6. https://eur- lex.europa.eu/legal- content/EN/TXT/HTML/?uri= Implementing the Cloud Security Principles
CELEX:32009L0138&from=EN 19. See http://www.iso.org/iso/home/standards/management-
7. https://www.sra.org.uk/solicitors/handbook/ standards/iso27001.htm
handbookprinciples/content.page 20. https://www.ssae-16.com/ Note that SSAE 18, effective as of 1
8.https://www.sra.org.uk/solicitors/handbook/code/content.page May 2017, superseded SSAE 16 (and of course its predecessor,
9. https://eur- lex.europa.eu/legal- content/EN/TXT/HTML/?uri= SAS 70).
CELEX:32016R0679&from=EN. GDPR came into force on 25

You might also like