Cloud Computing Technical Security Standard 1.6
Cloud Computing Technical Security Standard 1.6
When using this document please ensure that the version you are using is the most up to date by
checking the University’s online document system
https://documents.manchester.ac.uk/display.aspx?DocID=37877
This document is a Technical Security Standard and as such describes security control requirements
which support compliance with legislative and regulatory requirements and University policies and
procedures which are mandatory.
Cloud computing services offer organisations access to a range of technologies and service models
typically delivered over the internet.
By processing information in the cloud the University may encounter risks to data protection that it
was previously unaware of. It is important that the university and its staff to take time to understand
the risks that cloud computing presents to information management.
This Standard defines the specification for the baseline requirements for cloud computing across
all University IT systems, whether directly managed by University staff or the responsibility of a third-
party partner or supplier and SHOULD be included as non-functional requirements for any new
systems as appropriate.
The basic designs and principles described in this document provide minimum baseline protection
for the University environment when information is processed using web storage or services in terms
of information security as well as Data Protection legislation. This Standard offers a set of questions
and approaches the University should consider, in conjunction with a prospective cloud provider, in
order to ensure that the processing of information done in the cloud complies with the GDPR and
associated information, data protection and privacy legislation. Third-party agreements may impose
additional controls, and where these are more stringent, they take precedence over this Standard.
The basic designs and principles described in this document provide minimum baseline protection
for the University information when processed using web storage or services in terms of information
security as well as Data Protection legislation.
1 of 6
Directorate of IT Services
August 2021
RESTRICTED
Where particular controls cannot be implemented, a formal security exception to this Standard
MUST be agreed with and approved by the Head of Information Governance (HoIG). The Information
Governance Exception Handling Standard Operating Procedure provides details on how to request
an exception to the TSS.
In this document the terms MUST and SHOULD are used and when in upper case have the following
meaning (as defined by Microformats.org https://microformats.org/wiki/rfc-2119):
For further clarity the three main groups involved in the use and delivery of cloud services:
• Cloud provider – The organisation that owns and operates a cloud service (Note: More than
one cloud provider may be involved in the supply chain of a single cloud service).
• Cloud customer – The organisation that commissions a cloud service for a particular
purpose.
• Cloud user – The end user of a cloud service – for example a member of the public.
2 of 6
Directorate of IT Services
August 2021
RESTRICTED
• Software as a Service (SaaS) – A SaaS cloud offers access to a complete software application
which the cloud user accesses through a web browser or other software. Accessing the
software in this manner eliminates or reduces the need to install software on the client
machine and allows the service to support a wider range of devices. The software may in
turn be hosted on a cloud platform or infrastructure.
The scope of this Standard includes everyone who uses a cloud provider, has or is responsible for the
procurement of a cloud storage or cloud service at the University of Manchester.
This document is intended to be read primarily by solution architects, project managers, members of
the Security Operations Centre, partners and system administrators responsible for IT Services
infrastructure and applications. Projects SHOULD specify non-functional requirements which meet
the applicable Technical Security Standards. It should also be read by all University staff who intend
to use cloud services, whether procured, commissioned or with no cost.
The standards contained in this document will apply to all University systems whether directly
managed by University staff or the responsibility of a third-party partner or supplier.
Staff must note that any breach of this Standard may be treated as misconduct under the
University’s relevant disciplinary procedures and could lead to disciplinary action and/or removal of
IT access.
4 Standard
3 of 6
Directorate of IT Services
August 2021
RESTRICTED
• Cloud Service Business Continuity plan in the event of DoS, Virus, failure, attacks, non
service, highjacked, social engineering etc. that will compromise Confidentiality, Integrity,
Availability or Auditability
• Mechanism in place so that the cloud provider can communicate changes to the cloud
service which may impact on the agreement, including breaches and changes of location.
• Highly restricted information and PII MUST follows the technical controls as cited in the
Information security classification, ownership and secure information handling SOP .
• Secure service administration including formal change management processes.
• Provision of Audit information.
• Provide a list of the personal data to be held and how it will be processed in the cloud.
• Completion an Information Governance Risk Review (IGRR) in line with the ADM SOP
http://documents.manchester.ac.uk/DocuInfo.aspx?DocID=16369.
• Physical hardware separation from other customers data. Logical separation may be
appropriate if this can be demonstrated to be robust by a vulnerability scan.
• Appropriate security standards accreditation. What security accreditation or quality
standards do they hold? i.e ISO27001, Cyber Essentials etc.
• Secure interfaces and APIs Service and data protection at rest and during transmission (i.e
compliance with the Cryptography TSS)
• Secure interfaces and APIs, meet standards such as OWASP, no anonymous access,
authenticated access only (i.e compliance with the Authentication TSS)
• Must be able to provide audit path and logs (i.e compliance with the Logging TSS)
• The Universsity recognises standards set by the Cloud Security Alliance
https://cloudsecurityalliance.org/ as best practice. Ideally service providers will be able to
provide a minimum of CSA STAR level 2 attestation. If attestatiuon is not available, the
University may use the CCM controls framework in conjunction with University controls to
benchmark the level of compliance.
5 Monitoring compliance
Compliance with this Technical Security Standard will be verified during regular monitoring (such as
vulnerability scans), audits and reviews by IT Services or equivalent, with the support of selected
specialists, in order to provide evidence and assurance to the Information Governance Office.
Where particular controls cannot be implemented, a formal security exception to this Standard
MUST be agreed with and approved by the HoIG. The Information Governance Exception Handling
Standard Operating Procedure provides details on how to request an exception to the Standard.
Retrospective compliance MUST occur within six months of the approval of the Standard. If this is
not possible because of clear business reasons, then a formal exception MUST be agreed with and
approved by the HoIG.
Non-compliant systems and applications are subject to disconnection from the University network.
6 Review
This Technical Security Standard will be reviewed at least every two years (unless there is a specific
requirement for more frequent reviews) or when significant changes are required.
4 of 6
Directorate of IT Services
August 2021
RESTRICTED
6 of 6
Directorate of IT Services
August 2021