You are on page 1of 3

Insecure IT

What’s Special
about Cloud
© Route66 | Dreamstime.com

Security?
Peter Mell, US National Institute of Standards and Technology

A
lthough cloud security on-demand network access to Cloud Security Controls
concerns have consis- a shared pool of configurable Let’s first look at cloud security
tently ranked as one computing resources (for exam- controls documented within the
of the top challenges ple, networks, servers, storage, Cloud Security Alliance (CSA) se-
to cloud adoption,1 it’s not clear applications and services) that curity control framework, which
what security issues are particular can be rapidly provisioned and was informed by both the ENISA
to cloud computing. To approach released with minimal man- and NIST definitions. The CSA
this question, I attempt to derive agement effort or service pro- guidance, version 2.1, contains 98
cloud security issues from various vider interaction. different cloud security controls
cloud definitions and a reference from 13 domains, which aim to
architecture. The NIST definition lists five “help evaluate initial cloud risks
essential characteristics of cloud and inform security decisions.”5
Defining Cloud Computing computing: on-dema nd self- This body of work would seem
The European Network and Infor- service, broad network access, re- to indicate that, based on pub-
mation Security Agency (ENISA) source pooling, rapid elasticity or lished cloud definitions, we can
defines cloud computing as “an on- expansion, and measured service. identify 98 cloud-specific security
demand service model for IT provi- It also lists three service models— controls. However, all 98 controls
sion, often based on virtualization software as a service (SaaS), plat- have been mapped to existing
and distributed computing tech- form as a service (PaaS), and infra- implementation-independent se-
nologies.”2 It says that cloud com- structure as a service (IaaS)—and curity control frameworks.6 This
puting architectures have highly four deployment models—private, includes NIST Special Publica-
abstracted resources, near-instant community, public and hybrid— tion 800-53 and the International
scalability and flexibility, nearly in- that, together, categorize ways to Organization for Standardization
stantaneous provisioning, shared deliver cloud services. 27001-2005. Based on this evalu-
resources, service on demand, and NIST has also published a ation, these security controls
programmatic management. cloud computing reference ar- don’t seem unique to cloud
The US National Institute of chitecture.4 As Figure 1 shows, computing—US government and in-
Standards and Technology (NIST) this architecture outlines the five ternationally standardized general-
has also published a cloud defini- major roles of cloud consumer, purpose security controls cover
tion, which it has submitted as the provider, broker, auditor, and all known CSA cloud security
US contribution for an internation- carrier. controls.
al standard.3 According to NIST, These definitions and reference The US government’s Federal
architecture provide a foundation Risk and Authorization Manage-
Cloud computing is a model for from which we can begin to ana- ment Program (FedRAMP, www.
enabling ubiquitous, convenient, lyze cloud security issues. fedramp.gov) for cloud computing

6 IT Pro July/August 2012 Published by the IEEE Computer Society 1520-9202/12/$31.00 © 2012 IEEE
Authorized licensed use limited to: Universidade Federal de Sergipe. Downloaded on June 21,2021 at 20:58:10 UTC from IEEE Xplore. Restrictions apply.

itpro-14-04-insec.indd 6 6/27/12 4:52 PM


Cloud provider
Cloud
Cloud orchestration broker
Cloud
consumer Cloud service
Service layer management

SaaS
Service
Business intermediation
Cloud PaaS support
auditor
IaaS Service

Security

Privacy
Provisioning/ aggregation
Security configuration
Resource abstraction and
audit control layer
Service
arbitrage
Privacy Physical resource layer
impact audit Portability/
Hardware interoperability

Performance
audit Facility

Cloud carrier

Figure 1. NIST cloud computing reference architecture. It outlines five major roles: cloud consumer, provider,
broker, auditor, and carrier.

also uses the NIST cloud defi- can address the composition of Cloud Brokers
nition.7 Instead of creating new these technology areas using T his reference a rchitectu re
cloud security controls, FedRAMP these same general-purpose secu- actor implies security composi-
published a selection of existing rity controls. tion challenges within composed
general-purpose controls from However, the cloud paradigm clouds, such as a SaaS built on an
the NIST Special Publication might still present security issues IaaS.
800-53 security control catalog that require a novel application of
(www.gsa.gov/graphics/staffoffices/ the set of existing general-purpose On-Demand Delivery
FedR A MP_Security_Controls_ security controls. Evidence for This cloud characteristic suggests
Final.zip). Thus, the FedR AMP this argument lies in the fact that security challenges associated
cont rols a re a lso gener ica lly each CSA cloud security control with the business user being able
applicable. was mapped to multiple controls to easily and instantly obtain new
This lack of novel security con- from the general-purpose control computing resources that must be
trols for the cloud might arise from frameworks. pre-secured on delivery.
the fact that cloud computing
is the convergence of many dif- Derivation of Cloud Resource Pooling
ferent technology areas, including Security Issues This cloud characteristic guides
broadband networks, virtualiza- To show the existence of these customers toward a “put all your
tion, grid computing, service ori- security issues, I list a sampling eggs in one basket” approach that
entation, autonomic systems, and derived from the initial cloud def- might let users concentrate secu-
Web 2.0. Each of these underlying initions and reference architec- rity resources on a single basket
technology areas has been inde- ture. Many of the essential cloud but that also heightens the need
pendently addressed by existing characteristics, definitional mod- for backup and resiliency solu-
general-purpose security controls, els, and architectural components tions. From a cloud customer
so it seems logical to assume we suggest cloud security issues. perspective, this characteristic

computer.org/ITPro 7
Authorized licensed use limited to: Universidade Federal de Sergipe. Downloaded on June 21,2021 at 20:58:10 UTC from IEEE Xplore. Restrictions apply.

itpro-14-04-insec.indd 7 6/27/12 4:52 PM


Insecure IT

T
reveals the possibility that attacks he cloud computing para- cloud-computing-risk-assessment/
against one customer could in- digm appears to present at_download/fullReport.
advertently affect another cus- special security issues that 3. “Final Version of NIST Cloud
tomer using the same shared will require research and careful Computing Definition Published,”
resources. consideration. At this point, how- NIST Tech Beat, 25 Oct. 2011; www.
ever, these issues don’t appear to nist.gov/itl/csd/cloud-102511.cfm.
Service Models require completely new security 4. F. Liu et al., NIST Cloud Comput-
The cloud definition service mod- controls but instead the creative ing Reference Architecture, NIST rec-
els reveal challenges with multi­ application of existing security ommendation, Sept. 2011; http://
tenancy in a resource pooled techniques. collaborate.nist.gov/twiki-cloud-
environment. All service models computing/pub/CloudComputing/
have data multitenancy, while Acknowledgments ReferenceArchitectureTaxonomy/
PaaS and IaaS additionally have Certain products or organizations are identi- NIST_SP_500-292_-_090611.pdf.
processing multitenancy in which fied in this document, but such identification 5. “Security Guidance for Critical
user processes might attack each does not imply recommendation by the US Areas of Focus in Cloud Computing
other and the cloud itself. National Institute of Standards and Technol- V2.1,” Cloud Security Alliance, Dec.
ogy (NIST) or other agencies of the US gov- 2009; https://cloudsecurityalliance.
Infrastructure as a Service ernment, nor does it imply that the products or org/wp-content/uploads/2011/07/
This service model reveals chal- organizations identified are necessarily the best csaguide.v2.1.pdf.
lenges with using virtualization available for the purpose. This article reflects 6. “Cloud Controls Matrix, Version 1.2”
as a frontline security defense the author’s personal opinions—not the opin- Cloud Security Alliance, Aug. 2011;
perimeter to protect against mali- ions of the Department of Commerce or NIST. ht t ps://cloudsecurityalliance.org/
cious cloud users. research/initiatives/ccm.
References 7. S. VanRoekel, “Memorandum for
Broad Network Access 1. “IT Cloud Services User Survey, Chief Information Officers,” Exec-
This cloud characteristic shifts Part 2,” IDC Enterprise Panel, Aug. utive Office of the President, 8 Dec.
the security model to account for 2008 www.clavister.com/documents/ 2011, footnotes 5 and 6; www.cio.
possibly untrustworthy client de- resources/white-papers/clavister- gov/fedrampmemo.pdf.
vices that are fully reliant on the whp-security-in-the-cloud-gb.pdf.
network for service. 2. “Cloud Computing: Benefits, Risks, Peter Mell is a computer scientist at the
and Recommendations for infor- US National Institute of Standards and
Measured Service mation Security,” European Net- Technology. His research interests include
This cloud characteristic reveals work and Information Security big data technology, cloud computing,
the need to measure cloud usage to Agency, Nov. 2009; w w w.enisa. vulnerability databases, and intrusion
promote overall cloud availability. europa.eu/act/rm/files/deliverables/ detection. Contact him at mell@nist.gov.

Call for Articles


IEEE Software seeks practical,
readable articles that will appeal
to experts and nonexperts alike.
The magazine aims to deliver reliable
information to software developers
and managers to help them stay on
top of rapid technology change.

Author guidelines:
www.computer.org/software/author.htm
Further details: software@computer.org
www.computer.org/software

8 IT Pro July/August 2012


Authorized licensed use limited to: Universidade Federal de Sergipe. Downloaded on June 21,2021 at 20:58:10 UTC from IEEE Xplore. Restrictions apply.

itpro-14-04-insec.indd 8 6/27/12 4:52 PM

You might also like