Ispg sm04 v1.2 - en
Ispg sm04 v1.2 - en
Ispg sm04 v1.2 - en
INFORMATION SECURITY
Practice Guide
for
[ISPG-SM04]
Version 1.2
June 2021
Unless otherwise indicated, the copyright in the works contained in this publication is owned
by the Government of the Hong Kong Special Administrative Region. You may generally
copy and distribute these materials in any format or medium provided the following
conditions are met –
(a) the particular item has not been specifically indicated to be excluded and is therefore
not to be copied or distributed;
(b) the copying is not done for the purpose of creating copies for sale;
(c) the materials must be reproduced accurately and must not be used in a misleading
context; and
(d) the copies shall be accompanied by the words "copied/distributed with the permission
of the Government of the Hong Kong Special Administrative Region. All rights
reserved."
If you wish to make copies for purposes other than that permitted above, you should seek
permission by contacting the Office of the Government Chief Information Officer.
Amendment History
Amendment History
2 Updates were made on the requirements 15-18, 20- 1.2 June 2021
of CSP to provide proper data protection 22, 26, 42,
in Section 5, Section 5.1, Section 5.3, 44, 49
Section 5.4, Section 5.5 and Section 5.7;
and de-identification techniques for
personal data protection in Section 5.4
and Annex B; and emerging solutions in
Annex B.
Table of Contents
1. Introduction ........................................................................................................................ 1
1.1 Purpose................................................................................................................... 1
1.2 Normative References ............................................................................................ 2
1.3 Terms and Convention ........................................................................................... 2
1.4 Contact ................................................................................................................... 3
2. Information Security Management .................................................................................... 4
3. Introduction to Cloud Computing Security........................................................................ 6
3.1 Cloud Computing ................................................................................................... 6
3.2 Cloud Infrastructure ............................................................................................... 7
3.3 Cloud Service Models ............................................................................................ 7
3.4 Cloud Deployment Models .................................................................................... 7
3.5 Comparison of the Four Deployment Models ....................................................... 8
4. Cloud Security Overview ................................................................................................... 9
4.1 Cloud Service Model and Information Security .................................................... 9
4.2 Cloud Implementation Scenarios and Information Security ................................ 10
5. Security Consideration and Controls for Cloud Services ................................................ 14
5.1 Management Responsibilities .............................................................................. 16
5.2 IT Security Policies .............................................................................................. 17
5.3 Human Resource Security.................................................................................... 17
5.4 Asset Management ............................................................................................... 19
5.5 Access Control ..................................................................................................... 22
5.6 Cryptography ....................................................................................................... 24
5.7 Physical and Environmental Security .................................................................. 25
5.8 Operations Security.............................................................................................. 27
5.9 Communications Security .................................................................................... 29
5.10 System Acquisition, Development and Maintenance .......................................... 35
5.11 Outsourcing Security ........................................................................................... 37
5.12 Information Security Incident Management ........................................................ 38
5.13 IT Security Aspects of Business Continuity Management .................................. 40
5.14 Compliance .......................................................................................................... 41
Annex A: Summary of Security Controls by Cloud Implementation Scenarios ..................... 44
1. Introduction
Note: The author of this document does not endorse the use or imply preference for
any vendor commercial products or services mentioned in this document. Also, this
document is NOT intended to supersede the security regulations, policies and
guidelines in the Government and B/Ds' departmental IT security policies.
1.1 Purpose
In response to the use of cloud computing emerging as a global trend, this document
is developed for providing guidance notes to Bureaux and Departments (B/Ds) for
the purposes as described below:
This document highlights common security considerations and industry security best
practices for the adoption of cloud computing.
The following referenced documents are indispensable for the application of this
document.
For the purposes of this document, the terms and convention given in S17, G3, and
the following apply.
1.4 Contact
This document is produced and maintained by the Office of the Government Chief
Information Officer (OGCIO). For comments or suggestions, please send to:
Email: [email protected]
B/Ds shall also define the organisation structure on information security and provide
clear definitions and proper assignment of security accountability and responsibility
to involved parties.
B/Ds shall perform security risk assessments for information systems and production
applications periodically and when necessary so as to identify risks and
consequences associated with vulnerabilities, and to provide a basis to establish a
cost-effective security program and implement appropriate security protection and
safeguards.
B/Ds shall also perform security audit on information systems regularly to ensure
that current security measures comply with departmental information security
policies, standards, and other contractual or legal requirements.
Security Operations
To protect information assets and information systems, B/Ds should implement
comprehensive security measures based on their business needs, covering different
technological areas in their business, and adopt the principle of "Prevent, Detect,
Respond and Recover" in their daily operations.
B/Ds could make use of the cyber risk information sharing platform to receive and
share information regarding security issues, vulnerabilities, and cyber threat
intelligence.
Essential Characteristics
Resource Pooling
Deployment Models
Service Models
Infrastructure
Software as a Platform as a
as a Service
Service (SaaS) Service (PaaS)
(IaaS)
Cloud Infrastructure
Public Cloud: the cloud infrastructure is provisioned for the public. It supports
multi-tenancy. It may be owned, managed, and operated, or in any combination
of them by a third party; it is hosted on the CSP's premises;
Private Cloud: the cloud infrastructure is provisioned for exclusive use by a
single organisation comprising multiple B/Ds. It may be owned, managed, and
operated, or in any combination of them, by the organisation (i.e. In-house
Private Cloud), a third party (i.e. Outsourced Private Cloud); it is hosted on or
off premises;
Community Cloud: the cloud infrastructure is provisioned for exclusive use by a
specific community of consumers from organisations that have common goals,
interests and/or shared concerns. It may be owned, managed, and operated, or in
any combination of them, by one or more of the organisation(s) in the
community; it is hosted on or off premises; and
A comparison table on the aspects relating to information security for the four
deployment models is given below:
The move to cloud computing is a business decision, in which the business case
should consider relevant factors such as transition cost, life-cycle cost and readiness
of the applications besides security. Nevertheless, B/Ds should assess the sensitivity
of their data and determine the suitable deployment model for processing and storing
their data. B/Ds shall ensure that classified data are protected no matter which cloud
service model it adopts and all government security requirements are fulfilled as
well as business needs are catered. With an overall security assessment of a
potential cloud platform, B/Ds should identify gaps in security protections offered
by the CSP and determine effective approaches to mitigate the risk to their data.
As with any new computing model or technology, cloud computing may pose new
security risks. A risk-based approach should be adopted when considering use of
cloud computing. It is important for B/Ds to consider various security areas such as
data confidentiality, integrity, redundancy, resilience, jurisdiction, etc. It is also
important to understand what data are being considered moving to the cloud, their
risk tolerance, and the service and deployment models being chosen. Users or
potential users of cloud services must understand the challenges and risks involved
so that they can be better prepared to mitigate or control them. Appropriate security
measures and controls should be deployed commensurate with the assessed risk level
and the value of the data.
As a general principle, a client organisation can have greater security control over
more resources as one moves from SaaS to PaaS and again from PaaS to IaaS
service model. Figure 4.1 shows the scope of control between responsible parties in
cloud:
SaaS services are typically accessed by clients using a web browser over the
Internet, and the clients do not manage or control the underlying cloud platform and
infrastructure. With SaaS, client organisations usually have little direct control over
critical security capabilities such as data encryption or compliance auditing.
PaaS provides cloud facilities at middle layer and it tends to be more extensible than
SaaS, at the expense of customer-ready features. Client organisations usually have
certain control over the platform and more flexibility to put in place additional
security measures on resources at upper layer.
IaaS requires the client organisation to implement its own applications and set up its
platform riding on the infrastructure provided by the IaaS CSP. The client
organisation remains entitled to the flexibility to manage and control the security of
operating systems, deployed applications and customised settings of storage,
network and computing resources.
No matter which cloud service model it is, the CSP is still responsible to control and
secure the underlying cloud infrastructure components, such as processing, storage,
networks, and other fundamental computing resources, to ensure basic service
availability and security.
The degree of security control under the client organisation varies between the
public cloud and private cloud. As public cloud is provisioned for the general public
and shared use by multiple tenants while private cloud is provisioned for exclusive
use by a single organisation, private cloud would give the organisation better control
over the network infrastructure and security policies with stronger access controls.
Hence, public cloud may face more security threats while private cloud may be more
robust to security threats. Implementation scenarios on whether the cloud services
are in-house or outsourced as well as on premises or off premises are also important
to the security protection for a cloud environment.
Shared
facilities
Public
Cloud
IT Facilities
Dedication
Dedicated facilities
for a single
organisation Outsourced
In-house Private
Private
Cloud
Cloud
For the purpose of further discussion on security considerations and controls for cloud
deployment within government, the four scenarios in Figure 4.2 will be referenced:
The client organisation should require the CSPs to keep them informed of exactly
who are operating the cloud services. When there is a change in personnel, the CSP
should prove to the client organisation that the replacement staff has the equivalent
or higher level qualifications. The client organisation should require the CSP
enforcing proper security control to ensure the quality of the staff and the
management of the cloud service. As the data centre is off premises, physical access
control is under the direct purview of the CSP. A common myth is that the service
buyer thinks CSP will take up all on-going management responsibilities of the cloud
for outsourcing arrangement; in fact, the service buyer still has responsibility to
monitor the CSP, otherwise this lack of governance would lead to weaken the IT
security arrangement.
A public cloud is one in which the infrastructure and other computational resources
that it comprises are made available to the general public over the Internet. It is
owned by a CSP selling cloud services and, by definition, is external to a client
organisation. Security of cloud service and data are not fully managed by the client
organisation. Therefore, understanding the public cloud computing environment
offered by the CSP and ensuring that a cloud computing solution satisfies
organisational security and privacy requirements are particularly essential.
The standard SLA offered with the public cloud services by the CSP recording a
common understanding about services, priorities, responsibilities, guarantees and
warranties may have limited or even no room for negotiation. Client organisation
should pay attention to the security impacts and the provisioning penalties in case of
any breaches of the SLA.
On top of the above three implementation scenarios, there exists another possible
type of implementation scenario – Hybrid Cloud Scenario. As mentioned in Section
3.4, hybrid cloud infrastructure is composed of two or more distinct cloud
infrastructures (such as private and public). Hybrid Cloud implementation scenario,
consequently, is a composition of the other three implementation scenarios (In-house
Private Cloud, Outsourced Private Cloud and Public Cloud scenarios).
Connection of the cloud environment offered by the CSP to the network of client
organisation should not compromise the existing security level. The client
organisation should assess the security risks when acquiring cloud service and be
based on the principle that stronger security protection is adopted on both sides if the
security protection level of the parties is different.
After understanding the basic concepts of cloud computing and cloud security, the
security controls are examined in this chapter. Cloud computing can be viewed as a
new way of delivering IT based services to enterprises, rather than a new technology
on its own. Specific technologies, of course, gain significant importance in a cloud
computing environment, such as virtualisation. For the most part, cloud computing
uses similar management tools, operating systems, databases, server platforms,
network infrastructure, network protocol, storage arrays, and so on. Therefore,
security controls in cloud are largely similar to those controls in traditional IT
environment. As such, security controls described in government security
documents including the Baseline IT Security Policy [S17] and IT Security
Guidelines [G3] will still apply. However, due to the characteristics of the cloud
service models and deployment models, and the technologies used to enable cloud
services, certain risks in a cloud environment may become more significant and
certain risks that do not exist in a traditional IT environment may exist in a cloud
environment. The following sub-sections will describe the challenges and cloud-
specific security practices for handling such risks. The description will focus on the
following security domains.
Management Responsibilities
IT Security Policies
Human Resource Security
Asset Management
Access Control
Cryptography
Physical and Environmental Security
Operation Security
Communications Security
System Acquisition, Development and Maintenance
Outsourcing Security
Security Incident Management
IT Security Aspects of Business Continuity Contingency Management
Compliance
For each of the security considerations and controls, tags will be put at the end of the
control statement indicating under what implementation scenarios the control will be
most suitably applied. The security controls of hybrid cloud should be considered
with reference to its composition. If the hybrid cloud is comprised of public cloud
and in-house private cloud, the security considerations and controls of both cloud
implementation scenarios should be observed. The tag only indicates general
relevancy. If there is no tag for a certain implementation scenario, it does not mean
the control is totally irrelevant.
When adopting cloud services, B/Ds are advised to take a risk-based approach,
assess business need and data classification, and make sure security measures,
service levels and management requirements of CSP are commensurate with the data
classification and business requirements and complied with the government security
requirements and business needs. As the security level differs for different CSPs,
B/Ds should carefully examine and consider the data handling by CSPs in all
aspects. The following cloud-specific security practices are for general cloud
deployment scenarios. Moreover, as cloud technology advances, CSPs may provide
new cloud solutions and services to the market. B/Ds are advised to conduct their
own research, assess potential risks, adopt best practices and determine suitable
deployment model accordingly. Since each installation may have their own specific
implementation scenario, implementers should make their own judgement and select
the most appropriate security controls. B/Ds should ensure that the CSPs provide
proper protection on government data, in particular involving sensitive data, during
design, development, deployment and configuration of infrastructure so that proper
isolation of sensitive or classified government data from other customer environment
can be achieved.
According to Section 17.3 Public Cloud Services of Baseline IT Security Policy [S17],
government data classified as CONFIDENTIAL or above shall not be stored in or
processed by public cloud services while government data classified as
RESTRICTED shall follow relevant public cloud security framework or guidelines
issued by OGCIO for storage and processing by public cloud services.
Users are ultimately accountable for managing security and control over their
organisational data. A risk-based approach should be adopted to incorporate a cloud
computing strategy in their information systems strategic plans and/or organisational
IT plans. Appropriate security management practices and controls should also be
adopted and strictly implemented. Strong management practices are essential for
operating and maintaining a secure cloud computing solution. Good practices entail
monitoring of the organisation's information system assets and implementing of
policies, guidelines and procedures for the purposes to establish and preserve the
confidentiality, integrity, and availability of information system resources.
Security certification is the proof for the security management, maturity level
and quality assurance of an external CSP. Cloud services should be checked to
understand its compliance level to the globally recognised industry security
standards, such as ISO 27001 (information security management) and ISO
27017 (code of practice for information security controls for cloud services)
and to ensure the compliance with government security requirements as well as
to meet business needs. The Consensus Assessments Initiative Questionnaire
created by the Cloud Security Alliance provides a reference set of questions for
assessing a CSP. Compliance certificates and reports should be requested from
external CSPs for verification on their validity.
Roles and responsibilities of the personnel, including but not limited to the B/D
and the CSP, to support the operation and account for information security of
the cloud services should be clearly defined and documented such as service
level agreement, especially in data centres of an outsourced multi-tenancy cloud
environment. B/Ds shall request CSPs to ensure that their employees and
contractors who would handle outsourced information systems containing
sensitive or classified government data are suitable for the roles. CSPs should
be requested to have clear segregation of job duties, for example, a single
person should not take up both system administration and security
administration activities. Need-to-know principle shall be strictly enforced.
Moreover, updated contact information of responsible supervisory authorises
should be maintained.
Where appropriate, the staff from the CSP and its subcontractors should agree
and sign a non-disclosure agreement. Alternatively, B/Ds should use
contractual means such as the cloud contract to ensure the staff from the CSP
and its subcontractors undertake the obligation of confidentiality. The CSP
shall commit not to transfer or disclose the sensitive or classified information to
any other third parties unless authorised. In case there are requests from other
third party in requesting for such information, the CSP shall immediately
inform and redirect the requests to B/Ds for handling if such requests cannot be
directly rejected. Selection of CSP should also consider CSP's background
check procedures for staff with high privilege on access authority, as well as
clear process and procedure for employment termination. Background check
may include review of the person's history on education, employment, and
criminal records as appropriate while employment termination procedure may
require the staff to return all assets, particularly classified data, keys and tokens,
relating to his/her duties, and all relevant access rights must be removed.
Off premises, outsourced data centre, multi-tenancy, use of Internet and many other
cloud features dovetail security threats of unauthorised access to the sensitive data
through physical and network access. Data confidentiality may also be affected due
to potential risks of CSP's lack of commitment in protecting client data and exposing
the client applications and data to various Internet threats. Moreover, it may be
difficult or impossible for the client organisation to reclaim data from an external
CSP under unexpected service termination, such as company merging and
amalgamation, CSP bankruptcies, service shutdowns and any unexpected events.
Observe data protection and privacy legislation for outsourced data centres [O]
[P]
Data protection and privacy legislation shall be observed. For protection of the
privacy of individuals in relation to their personal data in Hong Kong, Personal
Data (Privacy) Ordinance (PDPO) (Cap. 486), particularly the Data Protection
Principle 4 (on security of personal data), shall be observed.
With increasing demand on a better cost-effective model, some outsourced data
centres are located offshore. Data storing at or moving between the offshore
data centres where information crossing borders may be subject to local
legislations of the data centres, hence adoption of offshore outsourcing should
be carefully considered.
For local legislation development, Section 33 of the Personal Data (Privacy)
Ordinance (PDPO) (Cap. 486), although not yet enacted, should be made
reference if applicable. Section 33 restricts the transfer of personal data to
places outside Hong Kong unless one of a number of conditions is met. The
Office of the Privacy Commissioner for Personal Data (PCPD) published a
document "Guidance on Personal Data Protection in Cross-border Data
Transfer" providing relevant information for reference. B/Ds must ensure
service providers seek their approval before allowing information to leave
outside Hong Kong borders.
7 While there is no specific regulation on encryption of unclassified information, as a good practice to protect
data privacy, B/Ds may adopt encryption to protect unclassified information when using public cloud service.
8 Recital 28, GDPR stipulated that "The application of pseudonymisation to personal data can reduce the risks to
the data subjects concerned and help controllers and processors to meet their data-protection obligations."
9 Data pseudonymisation replaces personally identifiable information within a data record with one or more
artificial identifiers, called pseudonyms. The pseudonyms make personal data less identifiable from the data
record while remaining suitable for data analysis and data processing.
10 Data anonymisation is the process of turning data into a form such that the identification of individuals is not
likely to occur.
11 Data generalisation reduces the precision in the data while preserves data truthfulness at the record level. It is
done by reducing the granularity of information contained in a selected attribute or in a set of related attributes
in a dataset.
12 Data randomisation adds noise to a data filed. It does not preserve data truthfulness at the record level but
reduces the risk of singling out identifying attributes. Generally the values are modified so that their new values
differ from their true values in a random way.
13 Data tokenisation is replacing sensitive data elements with substitutes without extrinsic meaning, usually
refers to as a token. This token can be mapped back to sensitive data afterward.
14 Synthetic data generates artificial data that has some of the statistical characteristics as the targeted data. A
synthetic dataset does not contain any data collected from or about existing data principals but looks realistic for
the intended purposes.
Data location is one of the reasons most cloud users favour a private cloud
solution over a public cloud. It is appropriate for the CSP to provide a data
map documenting the flow of data between data centres. Customer's data
location should be made known for data at rest, data in transit, as well as for the
backup location. Commitments should be made with CSPs to ensure the data
will not move to other regions when sensitive information, in particular
personal information, is involved.
Assets include all elements of software and hardware that are found in the cloud
environment, while types of B/D's assets vary depending upon the cloud service
model. An up-to-date inventory of B/D's assets in the cloud environment shall
be identified and maintained. The assets should include the following:
Ensure the controls for disposal or re-use of computer equipment are adequate
and properly implemented [I] [O] [P]
In a public cloud, the client organisation does not have the same first line of defence
as a private cloud in which the client controls the network and authorises who is on
that network. The client organisation of a public cloud may have no idea who may
or may not have access to its data, including the people who manage the data and the
other users on that system. Sufficient understanding on security controls for
monitoring and protection against unauthorised access, especially to privileged
accounts offered by CSPs, should be obtained prior to procurement and deployment
of cloud services. Mechanism should be established to resume access to privileged
user account in case a privileged user is denied access.
For example, an unexpected software bug or human mistake mixing up the user
rights may lead to an unintentional or intentional access to client data by unknown
co-tenants. Moreover, if the cloud applications hold different sets of user identities,
the update between the corporate user directory and its cloud applications will
introduce a lag time in the revocation of user access rights, causing possible access
to the sensitive data by unauthorised staff before changes effected.
Under a private cloud environment, client organisations could have a better control
and assurance on the security measures, such as data encryption, cryptographic key
management, information access controls, etc. Access to information by the people
outside the client organisations could be tightly restricted.
B/Ds should implement procedures for key management so that the keys would not
be shared with the CSPs when sensitive or classified information is involved. In
other words, B/Ds should employ their own key management or a separate and
distinct key management service for data storage encryption in a public cloud
environment containing sensitive or classified data.
Establish Identity and Access Management (IAM) architecture [I] [O] [P]
Once adopting a cloud service, users' identities may be extended into the cloud
by connecting the identity repository or directory service to the CSP. When
selecting cloud services, it is desirable that they should leverage industry
standards (e.g. SAML) for implementing secure single sign-on solutions for
passing identity and attributes, as well as enforcing authorisation policies.
Since the cloud services could be accessed through various devices and
different channels, authenticating with a simple user ID and password may not
be strong enough to protect accounts from being compromised. When selecting
cloud services, those cloud services with two-factor authentication (2FA)
should be considered and 2FA should be enabled for as many accounts,
especially privileged user accounts, as possible. Some common 2FA
authentication options are One-Time Passwords, biometrics and digital
certificates.
For further protection, user access, especially privileged user account, should
be limited to dedicated workstation, network or location. The e-Authentication
Framework15 published by the OGCIO provides a basis to evaluate the risks,
determine the security requirements and implement the appropriate
authentication methods. The Framework should be followed in determining
and implementing the electronic authentication requirements of electronic
transactions for cloud services.
Restrict and control the use of privileged utility programs [I] [O] [P]
5.6 Cryptography
15 https://www.infosec.gov.hk/en/best-practices/person/securing-access-using-e-authentication
16 While there is no specific regulation on encryption of unclassified information, as a good practice to protect
data privacy, B/Ds may adopt encryption to protect unclassified information when using public cloud service
with cryptographic keys management and protection.
In public clouds, like outsourced private clouds, data centres are located off premises
and a cloud may span across multiple data centres in different geographic locations.
When the data move to the cloud data centre which is not managed by the client
organisation, physical controls on data are handed over to the CSP. Due to multi-
tenancy nature of public clouds, the risks of unauthorised physical access by
unknown co-tenants or third parties become one of the key security concerns.
Adequate physical security measures in a cloud data centre could protect against
trespassing activities to the computing resources at the physical layer. For some
CSPs, only computer racks without key lock are provided. It is obviously not
enough for multi-tenancy environment. Anyone who has the right to access the data
centre will have the opportunity to access the computer devices holding data of its
tenants. The environment security and equipment security as well as physical access
control in an off premises cloud data centre are the primary concerns in physical
security domain.
Usually, services offered by public cloud services CSPs are not targeted for single
tenant environment. From time to time, these CSPs may offer new solutions and
services to cater for the market need, such as single tenant solution for cloud user.
B/Ds are advised to study carefully the entire cloud solution package including
infrastructure when choosing appropriate deployment model. For example, if B/Ds
are considering a private cloud to meet business needs and security requirements, then
single tenant solution is just one of the considerations. B/Ds should also evaluate
whether the cloud infrastructure should be dedicated so as to match the requirements
as private cloud solution. In short, B/Ds should assess what security control on overall
infrastructure should be implemented based on their business needs and government
security requirements.
Analyse risks for selection of site location and its facilities [O] [P]
Adopt adequate physical protection for all IT equipment and data storage media
for outsourced data centres [O] [P]
Ensure adequate access controls for multiple application systems sharing the
same equipment rack [I] [O]
The data on backup media held by the CSP might commingle with other cloud
tenants' data. CSPs may not provide backup media to individual cloud tenant.
For systems important to the business, at least one offline regular backup copy
for operational data should be obtained such that recovery to the most up-to-
date state can be made. Under such scenario, recovery tests shall be conducted
regularly to assure that recovery procedures are up-to-date. Backups and other
copies of logs, access records, and any other pertinent information which may
be required for legal and compliance reasons should be securely stored and
accessible by authorised persons only.
5.8.2 Logging
Keep and protect logs for auditing and analysis [I] [O] [P]
Regardless of public or private cloud, it is critical to obtain the key log data that
provide a clear view into the operational and security events. Certain types of
log data can be used to mitigate operation and security risks. B/Ds should
define the log types and details, such as audit logs on network, system,
application, administration and change management activities. Log information
should be complete and able to reflect cloud's dynamic nature, such as the
details about adding or removing VM instances. Log retention period should
be well defined and the logs should be tampering resistant. For public cloud
services, B/Ds should understand whether the CSP would offer users with
options to change the log settings and supply the required log data. B/Ds
should have log review procedures commensurate with the system criticality.
Event correlation tools could be used to augment the log analysis function.
Ensure security processes and procedures are properly put in place [I] [O] [P]
Processes and procedures should be developed to collect and store audit logs,
activity reports, copies of system configurations, change management reports
and other test procedure outputs. Depending on the cloud service model, this
information should be supplied by the CSP as and when needed.
Ensure sufficient control over patch management processes [I] [O] [P]
In a cloud data centre, physical servers and network components are virtualised and
probably shared by multiple tenants. Security measures applied to traditional
network systems may not effectively protect against network attacks between virtual
machines (VM) on the same server in the cloud environment. As some security
threats are unique to a virtualisation infrastructure including communication blind
spots, inter-VM attacks, and mixed trust level VMs, the dynamic and fluid nature of
VM will make it difficult to maintain the security standards and ensure that records
can be audited. The ease of cloning and distribution between physical servers could
result in the propagation of configuration errors and other vulnerabilities. These
security threats and issues arising from virtualisation are required to deal with when
adopting and implementing cloud infrastructure.
Furthermore, for cloud services, data may be transported across untrusted network
(e.g. Internet, public network) and/or government network as data are shared in
distributed cloud deployments. Data in transit should be well secured. The security
practices on network and communication are crucial to a cloud service.
Many devices such as server, desktop, notebook, smartphones and tablets have
the ability to connect through the Internet to the cloud servers. External
intruders may take advantages of system vulnerabilities to launch attacks to the
network components and servers of a cloud environment. Besides, the
possibility of internal intrusion through the inter-cloud traffic in a multi-tenancy
environment should not be neglected. Proper network security components for
protecting computing resources within the sphere of influence such as network
firewalls, application firewalls, IDS/IPS and log monitoring should be
implemented. It should be noted that a successful defence against attacks
requires securing both the client and server sides of cloud computing.
As mentioned in Section 5.7, the offer provided by CSPs of public cloud services are
usually not targeted for single tenant environment or single application environment.
Along with the technology and market development, CSPs may provide new
solutions and services to the industry. Some CSPs of public cloud services has
expanded their solutions to allow tenant to have more control in cloud resources like
single tenant or single application environment. Thus, some of the security
considerations for virtualisation which are previously available in private cloud are
also applicable to public cloud service.
Similarly, B/Ds are advised to study carefully of its entire cloud infrastructure when
choosing appropriate deployment model. For example, if B/D is considering a
private cloud to meet business needs, then single tenant environment with or without
virtualisation is just one of the considerations when evaluating whether it is a
dedicated cloud infrastructure or not. Because of this, B/Ds should make assessment
on what security control on overall infrastructure should be implemented based on
their business need and government security requirements. In respect of the security
practices on virtualisation, please make reference to the following:
To reduce the risks for being attacked and the frequency for patching, host OS
with minimum required functions should be configured. The installed host OS
should be hardened, like disabling unnecessary services and ports, and should
also be as thin as possible so as to lower the ability to load arbitrary
components, libraries or software.
Establish security zones for isolating VMs of different trust levels [I] [O] [P]
Consider bare-metal (type 1) hypervisor for more critical systems [I] [O]
In general, there are two types of hypervisor, namely bare-metal (type 1) and
hosted (type 2). Bare-metal hypervisor runs on hardware product while hosted
hypervisor is installed on top of a host OS (e.g. Linux). Hosted hypervisor
would probably inherit the vulnerabilities from the host OS and be exposed to
more security threats under a relatively complex environment. In contrast,
bare-metal hypervisor often provides a more compact and secure hardware OS.
Furthermore, this type of hypervisor communicates directly to the hardware
with less security concerns. In general, public cloud has more security risk
considerations than private cloud when infrastructure is shared with other cloud
users. So, even bare-metal hypervisor is offered by public cloud service
provider, it may not be suitable for critical systems especially when classified
information is involved. Hence, this security consideration and control does
not apply to public cloud scenario.
Review the resources requirement of VMs and applications [I] [O] [P]
To avoid resource contention, the use of resources such as CPU, memory, I/O
throughput, disk space and network capacity on VMs and applications should
be well-planned and reviewed.
Protect against unauthorised access between two VMs [I] [O] [P]
Ensure the validity and sufficiency of software licences [I] [O] [P]
Apply the latest security patches and virus signatures for offline VMs [I] [O]
[P]
Dormant VMs can be easily overlooked and inadvertently left out of security
and monitoring practices resulting in the VM being exposed to known
vulnerabilities. In this regard, the update of security patches and virus
signatures of dormant VMs should be enforced by B/D. Some advanced
security tools that address the patching needs for dormant VMs could be
considered where applicable.
Verify security status after VMs are restored from snapshots [I] [O] [P]
Most VMs allow creating "snapshot" to save their setting and configuration
state at different points of time for backup and maintenance activities. If it is
necessary to restore a VM from a past snapshot which was taken for some time
ago, verification on the patch level as well as security settings and
configurations is particularly important. Audit trail for tracing the activities,
including patching exercises, on the VMs should be enabled.
Protect the virtualisation images and configuration files [I] [O] [P]
Since VM can be copied from one host machine to another along with the data
and applications they held, intruder may bring up the copied VM on an
unsecured hypervisor and gain access to the data and configuration files on the
compromised VM. B/D should protect resource pool such as CPU, memory,
and storage I/O from unauthorised access and modification by tightening
logical and physical access controls with full auditing features.
Disable unnecessary communication ports, services and virtual hardware [I] [O]
[P]
Log activities for privilege accounts of hypervisor and VM [I] [O] [P]
VM images and snapshots may contain capture of classified data present on the
system at the time the image/snapshot was taken. Snapshots can be riskier than
images because snapshots contain the contents of active memory at the time the
snapshot was taken. If images/snapshots are not secured and protected from
modification, intruder may gain access and insert vulnerabilities or malware
into it and then re-deploy it throughout the virtual environment. Nevertheless,
all VM image copies and snapshots should be wiped when they are no longer
needed. The security measures equivalent to the classification of data being
processed by the VMs should be in place for the protection of the
corresponding VM images and snapshots.
With the rise of cloud computing, security architecture becomes highly dynamic.
Cloud characteristics, such as sharing of computing resources by multi-tenancy
within a data centre, make configuration management and on-going provisioning far
more complex than that in a traditional IT environment. Cloud computing affects all
aspects of Software Development Life Cycle (SDLC), and introduces a number of
new challenges around the tools and services required to build and maintain running
applications.
For some SaaS applications, CSP stores multiple tenant data into an application
database by introducing an extra attribute such as "tenant_id" in every table of the
database for tenant identification. Through software vulnerabilities, such as
scripting bugs or specially-crafted SQL queries, a malicious tenant is possible to
compromise the application and access the data of others. Moreover, security
weaknesses such as outdated web browsers and unprotected web sessions may lead
to compromise of application integrity and data confidentiality. All of the security
issues related to application security still apply when applications move to a cloud
platform.
Apply secure software development lifecycle to cloud applications [I] [O] [P]
The cloud services of public clouds and outsourced private clouds are not managed
or operated by in-house staff. In respect of the relevant security practices for cloud
services managed by external CSPs, the following aspects need to be considered:
Ensure the external CSP provides security controls that meet government
security requirements [O] [P]
The outsourced CSP should secure hosts and applications provided by them
using best practices against external threats and unauthorised access. Such
practices would include, but not limited to, hardening of the OS, keeping it up-
to-date with the latest patches, and installing of hypervisor-based, network-
based or host-based anti-malware software, Intrusion Detection System (IDS)/
Intrusion Prevention System (IPS), and firewalls as appropriate. Security risk
assessments should be regularly conducted by the CSP to ensure the system
attains the required security level, and B/Ds should review the SRAA report
provided by the CSP regularly.
The existence of exit strategy or exit plan should be ready and should be
established at an early stage when adopting cloud services. An exit plan may
be provided by the CSP or B/D. The exit plan should include how to retrieve
data and the virtual environments out of the CSP, and how to clean up data and
the virtual environments. Through the development of this plan, the risk of
'Lock-in' to one CSP is also addressed. Further negotiation on the exit term
could also reduce the risk.
The adoption of cloud computing alters the fabric of incident response. Especially,
in public clouds, the client organisation does not have direct access to network logs
because it does not own the network. Some CSPs, as declared in their standard
SLAs, do not have any obligations to investigate any security violations and misuse
of services which may lead to security incidents. Client organisations are advised to
take note of the security practices on incident monitoring and response as described
below.
The B/D should be allowed to access the data sources and information that are
relevant for incident detection and the CSP should provide appropriate
facilitations for incident analysis. Backups and other copies of logs, access
records, and any other pertinent information should be able to be migrated from
the cloud environment. For public cloud services, availability of log details
may depend on the option selected by users. Audit trail and logging features
should be enabled and properly configured according to business needs and
data classification.
Ensure that the incident response requirements are met [I] [O] [P]
B/D should be well aware of the overall incident handling philosophy of the
CSP and ensure that the steps to be taken by the CSP and the timing of response
in a security incident satisfy their requirements. The role of CSP in the incident
response should be clearly defined. The B/D should agree with the CSP on
how to collect, store, and share supporting evidence for incident investigation
(e.g. security log records).
B/Ds should work closely with their CSP on incident response measures. They
should have incident handling management and procedures for cloud services
put in place and properly documented. Similar to regular systems, the incident
handling procedures should include reporting to GIRO and subsequent actions
specified in the Practice Guide for Information Security Incident Handling. An
effective mechanism should be defined and established to report, notify,
investigate and handle information security incidents or security breaches. The
CSP should report to a nominated contact from the B/D on an agreed timing
and report all security related issues. An internal escalation procedure should
also be available for incident handling, aiming to have fast response and derive
appropriate resolutions in order to minimise the impacts to the operation of the
B/D. Performance metrics elaborated from these arrangements may be set as
SLA when necessary.
Conduct rehearsals for an incident response plan with the CSP [I] [O] [P]
B/Ds shall conduct rehearsals for the incident response plan, in collaboration
with the CSP if feasible. Possible ways to rehearse the plan include: paper-
based exercises, telephone cascading and a full rehearsal. Areas of
improvement should be properly documented into the newer version of the
incident response plan.
Ensure effective data backup and Disaster Recovery (DR) arrangements [I] [O]
[P]
Business Continuity Plan (BCP) of B/Ds should include scenarios for loss of
the CSP's services and third party-dependent capabilities. Testing of this part
of the plan should be coordinated with the CSP. If possible, CSP's BCPs
should also be inspected. It would be good to ask for evidence of active
management support and periodic review of the CSP's BCPs.
5.14 Compliance
It is important to note that cloud computing can refer to several different service
models, including SaaS, PaaS and IaaS. The risks and security controls associated
with each model as well as the key considerations in outsourcing for the model of
service will differ. As a result, the process for conducting the SRAA may also be
different.
Assess security risks for cloud systems or applications [I] [O] [P]
5.14.2 Auditing
B/D should seek the right to audit. The B/D and CSP need to agree in advance
to what extent the B/D has access to the CSP to audit and verify the existence
and effectiveness of security controls specified in the SLA. The pre-
engagement security controls audit then becomes the benchmark for on-going
audits once the cloud contract is in place. Both sides should agree on how to
collect, store, and share compliance evidence (e.g., audit logs, activity reports,
system configurations).
B/Ds should also engage independent auditors to perform audits regularly,
including penetration testing and vulnerability assessments, and provide
relevant rationale and evidences to substantiate judgement regarding the
compliance of security requirements. If conducting security audit on the CSP is
not feasible, the CSP should be requested to provide third party audit reports.
CSP should assist B/D to perform onsite security audit and gain understanding
of the current security measures adopted in data centres. The audit team should
involve the parties from various areas including IT, Information Security,
Business Continuity and Physical Security. B/Ds should request the CSP for
business continuity plan, disaster recovery plan, relevant certifications (e.g.
ISO17, ITIL standards), audit reports and test plans prior to visit for checking.
With wide adoption of cloud computing, traditional security controls may not be sufficient to
protect information assets of an organisation in cloud environment. Because of this, security
vendors introduce some new measures for cloud computing security in order to address the
related security concerns. Below highlights some examples of emerging technologies in
related to cloud security.
When more and more cloud services are deployed, it is a challenge to manage
various user access and their access logs across different cloud applications. Identity
Management as a Service ("IDaaS") is a cloud-based service that provides a set of
identity and access management functions to manage cloud applications as well as
legacy applications in user premises. IDaaS provides the following functionalities:
Public Cloud
Public Cloud Service 3
Service 2
Public Cloud
Service 4
Public Cloud Public Cloud
Service 1 Service 5
IDaaS
Cloud Platform
Client Endpoint
A critical risk analysis and detailed compliance review should be conducted before
using such cloud services. B/Ds should ensure compliance to government security
requirements when handling classified information in cloud platforms, especially
when IDaaS service is considered. To reduce the risk of compromising across cloud
platforms, re-using the identities across different cloud platforms should be avoided.
The best practices described in Section 5 – Security Consideration and Controls for
Cloud Services are also applied to the IDaaS as it is also a kind of cloud services.
Cloud Access Security Broker (CASB) is a software that acts as a control point to
enforce security policies, compliance and governance across multiple cloud
applications. CASB has the following functionalities:
Redirected
Platform as Traffic Access Monitoring Redirected
a Service Traffic
Policy Enforcement Workstations
(PaaS)
Data Encryption
Endpoint Control
18 The VM has a full image of the underline OS while the cloud container only consists of applications, settings
and storage that are needed for that application to run.
In public cloud deployment, the cloud user may not have security control enforced
as readily on-premises and also may lack of monitoring to the security control of the
cloud service. To cater for this, CWPP is a suite of software to ease the
administrative effort in deploying workload protection across various cloud
platforms including on-premises, private cloud, and public cloud. CWPP can
monitor security policies across hybrid cloud infrastructure through central
management so as to enforce consistent security policies (Figure B.3).
Container
Container
VM
Public Cloud
Container
Container
VM
VM
Security
Administrator
On-Premises Data Centre
Figure B.3 Cloud Workload Protection Platform
Some CWPP vendors would provide additional protection capabilities such as:
Data Encryption
Host Intrusion Prevention System (HIPS)
Endpoint protection e.g. Anti-malware etc.
Similar to CASB, CWPP is relatively new and still evolving, B/Ds should conduct
proper market research and product evaluation before deployment. In particular, the
compatibility of the solutions across heterogeneous environment (such as support to
server OS, virtualisation, container, API, etc.) and risks of using centralise software
to manage various cloud services should be considered.