unit -4
unit -4
The idea behind an inter cloud is that a single common functionality would combine many
different individual clouds into one seamless mass in terms of on-demand operations. To
understand how this works, it’s helpful to think about how existing cloud computing setups are
designed.
Cloud hosting is largely intended to deliver on-demand services. Through careful use of scalable
and highly engineered technologies, cloud providers are able to offer customers the ability to
change their levels of service in many ways without waiting for physical changes to occur.
Terms like rapid elasticity, resource pooling and on-demand self-service are already part of cloud
hosting service designs that are set up to make sure the customer or client never has to deal with
limitations or disruptions. Building on all of these ideas, the inter cloud would simply make sure
that a cloud could use resources beyond its reach by taking advantage of pre-existing contracts
with other cloud providers.
Federation Clouds: A Federation cloud is an Inter-Cloud where a set of cloud providers willingly
interconnect their cloud infrastructures in order to share resources among each other10. The
cloud providers in the federation voluntarily collaborate to exchange resources. This type of
Inter-Cloud is suitable for collaboration of governmental clouds (Clouds owned and utilized by
nonprofit institution or government) or private cloud portfolios (Cloud is a part of a portfolio of
clouds where the clouds belong to the same organization). Types of federation clouds are Peer to
Peer and Centralized clouds.
4. Integration and Interoperability: SMEs have a large amount of IT assets like business
applications in their premises and may not be migrated to the cloud. Sensitive data in an
enterprise also may not be migrated to the cloud for security reasons and privacy. A need
related to integration and interoperability arises between assets on premises and the cloud
services. Issues related to identity management, data management, and business process
orchestration need to be resolved.
RESOURCE PROVISIONING
Resource Provisioning means the selection, deployment, and run-time management of software
(e.g., database server management systems, load balancers) and hardware resources (e.g., CPU,
storage, and network) for ensuring guaranteed performance for applications.
This resource provisioning takes Service Level Agreement (SLA) into consideration for providing service
to the cloud users. This is an initial agreement between the cloud users and cloud service providers
which ensures Quality of Service (QoS) parameters like performance, availability, reliability, response
time etc. Based on the application needs Static Provisioning/Dynamic Provisioning and Static/Dynamic
Allocation of resources have to be made in order to efficiently make use of the resources without
violating SLA and meeting these QoS parameters
Here are some of the most common cloud computing security risks
Distributed-Denial-of-Service Attacks
When cloud computing first became popular, Distributed Denial-of-Service (DDoS) attacks
against cloud platforms were largely unthinkable; the sheer amount of resources cloud
computing services had made DDoS attacks extremely difficult to initiate. But with as many
Internet of Things devices, smartphones, and other computing systems as there are available
now, DDoS attacks have greatly increased in viability. If enough traffic is initiated to a cloud
computing system, it can either go down entirely or experience difficulties.
Not all cloud hosting solutions and cloud computing services are made equal. Many cloud
solutions do not provide the necessary security between clients, leading to shared resources,
applications, and systems. In this situation, threats can originate from other clients with the
cloud computing service, and threats targeting one client could also have an impact on other
clients.
Employee Negligence
Employee negligence and employee mistakes remain one of the biggest security issues
for all systems, but the threat is particularly dangerous with cloud solutions. Modern employees
may log into cloud solutions from their mobile phones, home tablets, and home desktop PCs,
potentially leaving the system vulnerable to many outside threats.
Inadequate data backups and improper data syncing is what has made many businesses
vulnerable to ransomware, a specific type of cloud security threat. Ransomware "locks" away a
company's data in encrypted files, only allowing them to access the data once a ransom has
been paid. With appropriate data backup solutions, companies need no longer fall prey to these
threats.
Due to the openness of a cloud computing system, phishing and social engineering attacks
have become particularly common. Once login information or other confidential information is
acquired, a malicious user can potentially break into a system with ease -- as the system itself is
available from anywhere. Employees must be knowledgeable about phishing and social
engineering enough to avoid these types of attackS.
System Vulnerabilities
Cloud computing systems can still contain system vulnerabilities, especially in networks that
have complex infrastructures and multiple third-party platforms. Once a vulnerability becomes
known with a popular third-party system, this vulnerability can be easily used against
organizations. Proper patching and upgrade protocols -- in addition to network monitoring
solutions -- are critical for fighting this threat.
Data Breach
Data Breaches result from an attack or employee negligence and error. This is a primary cause
for concern in cloud platforms. Vulnerabilities in the application or ineffective security practices
can also cause data breaches. Employees may log into cloud systems from their phones or
personal laptops thus exposing the system to targeted attacks.
Account Hijacking
With the increase in adoption of cloud services, organizations have reported an increased
occurrence of account hijacking. Such attacks involve using employee’s login information to
access sensitive information. Attackers can also modify, insert false information and manipulate
the data present in the cloud. They also use scripting bugs or reused passwords to steal
credentials without being detected.
Account hijacking could have a detrimental effect at the enterprise level, undermining the firm’s
integrity and reputation. This could also have legal implications in industries such as healthcare
where patients’ personal medical records are compromised. A robust IAM (Identity Access
Management) system can prevent unauthorized access and damage to the organization’s data
assets.
These are used to extract, manage and interact with information on the cloud. However, the
unique characteristics of API leave the door wide open for threats. Hence the security of APIs
affects the security and availability of cloud services and platforms.
APIs facilitate communication between applications, herein lies the vulnerability. Firms need to
focus on designing APIs with adequate authentication, other access control methods, and
encryption technology.
The most recent example of an insecure API was at Salesforce, where an API bug in its
Marketing Cloud service exposed customer data. This caused data to be written from one
customer account to another.
Insider Threat
An Insider threat is the misuse of information through hostile intent, malware, and even
accidents. Insider threats originate from employees or system administrators, who can access
confidential information they can also access even more critical systems and eventually data.
When the relationship between the employer and system administrator turn sour, they may
resort to leaking privileged information.
There can be several instances of insider threat such as a Salesperson who jumps ship or a
rogue admin. In scenarios where the cloud service provider is responsible for security, the risk
from insider threat is often greater.
Insider threats can be circumvented through business partnerships, controlled access and
prioritizing initiatives.
Cloud security governance refers to the management model that facilitates effective and efficient
security management and operations in the cloud environment so that an enterprise’s business
targets are achieved. This model incorporates a hierarchy of executive mandates, performance
expectations, operational practices, structures, and metrics that, when implemented, result in the
optimization of business value for an enterprise. Cloud security governance helps answer
leadership questions such as:
1. Strategic Alignment
Enterprises should mandate that security investments, services, and projects in the cloud
are executed to achieve established business goals (e.g., market competitiveness,
financial, or operational performance).
2. Value Delivery
Enterprises should define, operationalize, and maintain an appropriate security
function/organization with appropriate strategic and tactical representation, and charged
with the responsibility to maximize the business value (Key Goal Indicators, ROI) from
the pursuit of security initiatives in the cloud.
3. Risk Mitigation
Security initiatives in the cloud should be subject to measurements that gauge
effectiveness in mitigating risk to the enterprise (Key Risk Indicators). These initiatives
should also yield results that progressively demonstrate a reduction in these risks over
time.
5. Sustained Performance
Security initiatives in the cloud should be measurable in terms of performance, value and
risk to the enterprise (Key Performance Indicators, Key Risk Indicators), and yield results
that demonstrate attainment of desired targets (Key Goal Indicators) over time.
Cloud Security Governance Challenges
Whether developing a governance model from the start or having to retrofit one on existing
investments in cloud, these are some of the common challenges:
For example, the security configuration of a device may be modified (change event) by a staffer
without proper analysis of the business impact (control) of the modification. The net result could
be the introduction of exploitable security weaknesses that may not have been apparent with this
modification. The enterprise would now have to live with an inherent operational risk that could
have been avoided if the control had been embedded in the change execution process.
For example, a metric that quantitatively measures the number of exploitable security
vulnerabilities on host devices in the cloud over time can be leveraged as an indicator of risk in
the host device environment. Similarly, a metric that measures the number of user-reported
security incidents over a given period can be leveraged as a performance indicator of staff
awareness and training efforts. Metrics enable executive visibility into the extent to which
security tone and expectations (per established policy) are being met within the enterprise and
support prompt decision-making in reducing risks or rewarding performance as appropriate.
Following are some step that can ensure security virtual cloud management:-
Step one in securing virtual machine security in cloud computing is to isolate the
new hosted elements. For example, let's say three features hosted inside an edge
device could be deployed in the cloud either as part of the service data plane, with
addresses visible to network users, or as part of a private sub network that's
invisible. If you deploy in the cloud, then any of the features can be attacked, and
it's also possible your hosting and management processes will become visible and
vulnerable. If you isolate your hosting and feature connections inside a private sub
network, they're protected from outside access.
In container hosting today, both in the data center and in the cloud, application
components deploy inside a private sub network. As a result, only the addresses
representing APIs that users are supposed to access are exposed. That same
principle needs to be applied to virtual functions; expose the interfaces that users
actually connect to and hide the rest with protected addresses.
Step two in cloud-virtual security is to certify virtual features and functions for
security compliance before you allow them to be deployed. Outside attacks are a
real risk in virtual networking, but an insider attack is a disaster. If a feature with a
back-door security fault is introduced into a service, it becomes part of the service
infrastructure and is far more likely to possess open attack vectors to other
infrastructure elements.
This approach, however, doesn't relieve operators of the burden of security testing.
It's important to insist on a strong lifecycle management compliance process flow
for all hosted features and functions -- one that operators can audit and validate. If
the companies supplying your hosted features or functions properly test their new
code, it's less likely it will contain accidental vulnerabilities or deliberately
introduced back-door faults
By containing access, you limit your security risk. Additionally, operators should
require that access to infrastructure management and orchestration APIs by any
source is chronicled, and that any access or change is reviewed to prevent a
management access leak from occurring.
4. Keep connections secure and separate
The fourth and final point in cloud-virtual network security is to ensure that virtual
network connections don't cross over between tenants or services. Virtual
networking is a wonderful way of creating agile connections to redeployed or scaled
features, but each time a virtual network change is made, it's possible it can
establish an inadvertent connection between two different services, tenants or
feature/function deployments. This can produce a data plane leak, a connection
between the actual user networks or a management or control leak that could allow
one user to influence the service of another
BENEFITS OF IAM
While this may seem the most obvious benefit, it deserves to be said: SSO eliminates the need
for users to remember and input multiple passwords to access different areas of your system.
Gone are the days of trying to keep dozens of password variations straight; with SSO, users can
enjoy automatic logins every time they move to a different connected system.
All vendors offer a variety of user authentication schemes ranging from more strict multi-factor
authentication to federated solutions that leverage existing user security profiles.
Consolidating user identities and passwords with SSO makes it easier for IT departments to audit
where and how these user credentials are used. In the event that user credentials are
compromised, IAM systems make it easier for IT departments to identify which user was
compromised and which data was accessed during the breach. PingFederate allows you to
monitor sign on performance metrics, traffic, and compliance centrally. Detailed audit trails
allow systems to record user provisioning and de-provisioning as employees are on-boarded or
teminated. OneLogin allows you to run detailed analytical reports on users, apps, logins other
events.
IAM/SSO allows users to access to all interconnected systems, regardless of where the user is
physically located. This can be especially useful for large companies doing business globally,
providing ease of access to employees, parnters and clients alike. OneLogin offers apps that
allow users to access any enterprise web-based application anywhere on any device. OneLogin
Mobile identity management provides users one-click access to all enterprise apps on
smartphones and tablets.
Some vendors offer suites of identity management solutions that require additional setup and
configuration. Okta claims to provide the only truly comprehensive mobile solution to securely
and efficiently enable new mobile initiatives, with enterprise mobility management completely
integrated with its identity management solutions.
The original benefit of SSO for IT departments was to eliminate the cost of internal help
desks helping users locked out of their application accounts.
IAM is purporting to do much more. By leveraging already existing identity stores such
as Active Director or LDAP, IAM allows you to extend what you have into the future.
Cloud-based and mobile-based IAM tools not only allow users to authenticate from
anywhere anytime, they also provide the extensive audit trails, analytics, access rules and
policies to truly automate identity access and management across the enterprise.
DISADVANTAGES OF IAM
Major cloud providers specifically design and optimize their IAM products for their
own platforms. This might be fine for organizations that run all of their operations
on that platform, but many IT teams also manage on-premises applications,
multiple cloud services, hybrid environments, distributed data stores and
customized legacy systems. In these situations, IT must either balance multiple IAM
products or find a single product that supports multiple environments, such as tools
from Ping Identity or RSA.
Primary concern with SSO systems is that it creates a single point of failure. One of
the main disadvantages to SSO is decreased security, especially if it isn’t
implemented properly. For starters, there’s a single sign-on, but there’s no single
logout. The logout process will vary across applications. Just because a user logs out
of one application doesn’t mean that the rest also shut down. In fact, user sessions
stay active long after a user logs out of a single application. Because SSO only
requires one set of credentials to access all of a user’s resources, a hacker could
quite easily utilize all of them. This is especially dangerous if that user has access to
privileged information or mission-critical data.
It is a set of best practices and guidelines that define an integrated, process-based approach for
managing information technology services. ITIL helps make sure that proper security measures
are taken at all important levels, namely strategic, tactical, and operational level.
Realization of security requirements: “Security requirements are usually defined in the SLA as
well as in other external requirements, which are specified in underpinning contracts, legislation,
and internally or externally imposed policies".
Realization of a basic level of security: “This is necessary to guarantee the security and
continuity of the organization and to reach simplified service-level management for information
security management".
The major challenge for organizations that fail to adopt ITIL efficiently is that they might have to
re-define or re-implement the entire set of ITIL processes that they have. Thus, for implementing
ITIL a detailed analysis of existing processes along with gaps in relation to the ITIL framework
and level of process integration would be needed.
An OVF format virtual machine can be deployed easily by customers. They can do so on the
platform of their choice. It helps enhance customer experience as it provides customers with
portability, platform independence, verification, signing, versioning, and licensing terms
[OVF2].
Portable VM packaging
Optimization for secure distribution
Simplified Installation and Deployment
Supports both VM and multi-VM configurations
Vendor and platform independent
Extensible
Localizable
.3 ITU-T X.1601
The ITU standard presents a sketch of issues pertaining to cloud computing and proposes a
framework for cloud security. It talks in detail about various security challenges and ways to
reduce these security risks in cloud computing. It also discusses a framework that provides an
insight into what security capabilities are required for making the cloud secure and facing
security challenges. ITU-T X.1601 starts by listing down major security threats that the cloud
can encounter. As we have already discussed major security threats for cloud computing in
section 2, in this section we will discuss the cloud security challenges and the security
capabilities that this standard deals with and those help in mitigating the relevant threats.
The standard discusses the security challenges based on the nature of the role that an individual
or an organization plays in the cloud computing paradigm. The standard divides the roles of an
individual or an organization into following three categories :
.4 PCI DSS
Payment Card Industry Data Security Standard (PCI DSS) was released by PCI security
standards council. PCI's main objective is to provide security guidelines for credit card usage and
address CSP's and CSC's. Cloud security is a shared responsibility between the CSP and its
clients. "For example, if payment card data is stored, processed or transmitted in a cloud
environment, PCI DSS will apply to that environment, and will typically involve validation of
both the CSP's infrastructure and the client's usage of that environment".
Though the responsibility for managing security is shared between client and provider the client
still has an important role to play. The client holds the responsibility of ensuring their cardholder
data is secure under PCI DSS requirements. The division of responsibilities between the client
and the CSP for managing PCI DSS controls is influenced by multiple factors, which are :
The client must have a clear understanding of the scope of responsibility that the CSP is
accepting for each PCI DSS requirement.
This standard is yet to be launched in the market. It aims to provide further guidance in the
information security domain of cloud computing. It is aimed at supplementing the guidance in
ISO/IEC 27002 and various other ISO27k standards including ISO/IEC 27018 on the privacy
aspects of cloud computing, ISO/IEC 27031 on business continuity, and ISO/IEC 27036-4 on
relationship management, as well as all the other ISO27k standards [ISO27017].
Virtual network security is the worst problem of all because it combines issues generated by traditional
hosting and application security with those from network security, and then adds the challenges of
virtual resources and services. In short, cloud-virtual service security issues occur because security tools
designed to protect hosted software features are different than those safeguarding physical devices.
Following are some step that can ensure security virtual cloud management:-
Step one in securing virtual machine security in cloud computing is to isolate the new hosted elements.
For example, let's say three features hosted inside an edge device could be deployed in the cloud either
as part of the service data plane, with addresses visible to network users, or as part of a private sub
network that's invisible. If you deploy in the cloud, then any of the features can be attacked, and it's also
possible your hosting and management processes will become visible and vulnerable. If you isolate your
hosting and feature connections inside a private sub network, they're protected from outside access.
In container hosting today, both in the data center and in the cloud, application components deploy
inside a private sub network. As a result, only the addresses representing APIs that users are supposed
to access are exposed. That same principle needs to be applied to virtual functions; expose the
interfaces that users actually connect to and hide the rest with protected addresses.
Step two in cloud-virtual security is to certify virtual features and functions for security compliance
before you allow them to be deployed. Outside attacks are a real risk in virtual networking, but an insider
attack is a disaster. If a feature with a back-door security fault is introduced into a service, it becomes
part of the service infrastructure and is far more likely to possess open attack vectors to other
infrastructure elements.
Private subnetworks can help in addressing virtual machine security in cloud computing. If new
components can only access other components in the same service instance, the risk is reduced that
malware can be introduced in a new software-hosted feature. Yes, a back-door attack could put the
service itself at risk, but it's less likely the malware will spread to other services and customers.
This approach, however, doesn't relieve operators of the burden of security testing. It's important to
insist on a strong lifecycle management compliance process flow for all hosted features and functions --
one that operators can audit and validate. If the companies supplying your hosted features or functions
properly test their new code, it's less likely it will contain accidental vulnerabilities or deliberately
introduced back-door faults
Step three is to separate infrastructure management and orchestration from the service. Management
APIs will always represent a major risk because they're designed to control features, functions and
service behavior. It's important to protect all such APIs, but it's critical to protect the APIs that oversee
infrastructure elements that should never be accessed by service users.
By containing access, you limit your security risk. Additionally, operators should require that access to
infrastructure management and orchestration APIs by any source is chronicled, and that any access or
change is reviewed to prevent a management access leak from occurring.
The fourth and final point in cloud-virtual network security is to ensure that virtual network connections
don't cross over between tenants or services. Virtual networking is a wonderful way of creating agile
connections to redeployed or scaled features, but each time a virtual network change is made, it's
possible it can establish an inadvertent connection between two different services, tenants or
feature/function deployments. This can produce a data plane leak, a connection between the actual
user networks or a management or control leak that could allow one user to influence the service of
another
While this may seem the most obvious benefit, it deserves to be said: SSO eliminates the need
for users to remember and input multiple passwords to access different areas of your system.
Gone are the days of trying to keep dozens of password variations straight; with SSO, users can
enjoy automatic logins every time they move to a different connected system.
All vendors offer a variety of user authentication schemes ranging from more strict multi-factor
authentication to federated solutions that leverage existing user security profiles.
Just because SSO can grant users automatic access to all applications does not mean it has to.
More advanced IAM systems, most commonly using Security Assertion Markup Language
(SAML) 2.0 can use SSO with additional levels of security. IAM systems can authenticate and
authorize users based on the access level indicated in their directory profiles. IAM system can
also automaetically control user access using other factors. to specific functions of your system.
For example, Okta allows you to create identity management policies restricting access to
applications based on time of day, or adding additional authentication factors such as physical
location. PingFederate can extend a user security profile integrating with existing identity stores,
directories or other social identity providers. Additional rules can automate access decisions by
identity attribute, group membership or authentication method.
Consolidating user identities and passwords with SSO makes it easier for IT departments to audit
where and how these user credentials are used. In the event that user credentials are
compromised, IAM systems make it easier for IT departments to identify which user was
compromised and which data was accessed during the breach. PingFederate allows you to
monitor sign on performance metrics, traffic, and compliance centrally. Detailed audit trails
allow systems to record user provisioning and de-provisioning as employees are on-boarded or
teminated. OneLogin allows you to run detailed analytical reports on users, apps, logins other
events.
IAM/SSO allows users to access to all interconnected systems, regardless of where the user is
physically located. This can be especially useful for large companies doing business globally,
providing ease of access to employees, parnters and clients alike. OneLogin offers apps that
allow users to access any enterprise web-based application anywhere on any device. OneLogin
Mobile identity management provides users one-click access to all enterprise apps on
smartphones and tablets.
Some vendors offer suites of identity management solutions that require additional setup and
configuration. Okta claims to provide the only truly comprehensive mobile solution to securely
and efficiently enable new mobile initiatives, with enterprise mobility management completely
integrated with its identity management solutions.
5. Increases Productivity and Reduces IT Costs
The original benefit of SSO for IT departments was to eliminate the cost of internal help
desks helping users locked out of their application accounts.
IAM is purporting to do much more. By leveraging already existing identity stores such
as Active Director or LDAP, IAM allows you to extend what you have into the future.
Cloud-based and mobile-based IAM tools not only allow users to authenticate from
anywhere anytime, they also provide the extensive audit trails, analytics, access rules and
policies to truly automate identity access and management across the enterprise.
DISADVANTAGES OF IAM
Major cloud providers specifically design and optimize their IAM products for their own platforms. This
might be fine for organizations that run all of their operations on that platform, but many IT teams also
manage on-premises applications, multiple cloud services, hybrid environments, distributed data stores
and customized legacy systems. In these situations, IT must either balance multiple IAM products or find
a single product that supports multiple environments, such as tools from Ping Identity or RSA.
Primary concern with SSO systems is that it creates a single point of failure. One of the main
disadvantages to SSO is decreased security, especially if it isn’t implemented properly. For starters,
there’s a single sign-on, but there’s no single logout. The logout process will vary across applications.
Just because a user logs out of one application doesn’t mean that the rest also shut down. In fact, user
sessions stay active long after a user logs out of a single application. Because SSO only requires one set
of credentials to access all of a user’s resources, a hacker could quite easily utilize all of them. This is
especially dangerous if that user has access to privileged information or mission-critical data.
It is a set of best practices and guidelines that define an integrated, process-based approach for
managing information technology services. ITIL helps make sure that proper security measures
are taken at all important levels, namely strategic, tactical, and operational level.
Realization of security requirements: “Security requirements are usually defined in the SLA as
well as in other external requirements, which are specified in underpinning contracts, legislation,
and internally or externally imposed policies".
Realization of a basic level of security: “This is necessary to guarantee the security and
continuity of the organization and to reach simplified service-level management for information
security management".
An OVF format virtual machine can be deployed easily by customers. They can do so on the
platform of their choice. It helps enhance customer experience as it provides customers with
portability, platform independence, verification, signing, versioning, and licensing terms
[OVF2].
Portable VM packaging
Optimization for secure distribution
Simplified Installation and Deployment
Supports both VM and multi-VM configurations
Vendor and platform independent
Extensible
Localizable
.3 ITU-T X.1601
The ITU standard presents a sketch of issues pertaining to cloud computing and proposes a
framework for cloud security. It talks in detail about various security challenges and ways to
reduce these security risks in cloud computing. It also discusses a framework that provides an
insight into what security capabilities are required for making the cloud secure and facing
security challenges. ITU-T X.1601 starts by listing down major security threats that the cloud
can encounter. As we have already discussed major security threats for cloud computing in
section 2, in this section we will discuss the cloud security challenges and the security
capabilities that this standard deals with and those help in mitigating the relevant threats.
The standard discusses the security challenges based on the nature of the role that an individual
or an organization plays in the cloud computing paradigm. The standard divides the roles of an
individual or an organization into following three categories :
1. Cloud Service Provider (CSP): An individual or an organization responsible for making cloud
services available.
2. Cloud Service Customer (CSC): An individual or an organization that uses cloud services.
3. Cloud Service Partner (CSN): A partner that helps support the CSPs or the CSCs.
.4 PCI DSS
Payment Card Industry Data Security Standard (PCI DSS) was released by PCI security
standards council. PCI's main objective is to provide security guidelines for credit card usage and
address CSP's and CSC's. Cloud security is a shared responsibility between the CSP and its
clients. "For example, if payment card data is stored, processed or transmitted in a cloud
environment, PCI DSS will apply to that environment, and will typically involve validation of
both the CSP's infrastructure and the client's usage of that environment".
Though the responsibility for managing security is shared between client and provider the client
still has an important role to play. The client holds the responsibility of ensuring their cardholder
data is secure under PCI DSS requirements. The division of responsibilities between the client
and the CSP for managing PCI DSS controls is influenced by multiple factors, which are :
The client must have a clear understanding of the scope of responsibility that the CSP is
accepting for each PCI DSS requirement.
This standard is yet to be launched in the market. It aims to provide further guidance in the
information security domain of cloud computing. It is aimed at supplementing the guidance in
ISO/IEC 27002 and various other ISO27k standards including ISO/IEC 27018 on the privacy
aspects of cloud computing, ISO/IEC 27031 on business continuity, and ISO/IEC 27036-4 on
relationship management, as well as all the other ISO27k standards [ISO27017].
It aims to provide an advancement to ISO/IEC 27002 in terms of adding value to its practices of
control implementation
Additionally the standard will provide further security advice for both: clients and service
providers. It will do that by offering advice for both side-by-side in each section.