The Cloud Security Policy outlines the organization's practices for ensuring security in cloud computing services, applicable to all business functions and information systems. It details the evaluation of assets, compliance with regulations, and security measures across various cloud service models (SaaS, PaaS, IaaS, BPaaS) and deployment models (Public, Private, Hybrid). Additionally, it emphasizes the importance of incident management, data isolation, encryption, and contractual requirements with cloud service providers to protect organizational data and maintain business continuity.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
12 views9 pages
Cloud Security
The Cloud Security Policy outlines the organization's practices for ensuring security in cloud computing services, applicable to all business functions and information systems. It details the evaluation of assets, compliance with regulations, and security measures across various cloud service models (SaaS, PaaS, IaaS, BPaaS) and deployment models (Public, Private, Hybrid). Additionally, it emphasizes the importance of incident management, data isolation, encryption, and contractual requirements with cloud service providers to protect organizational data and maintain business continuity.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9
Policy Name: 2.
19 Cloud Security Policy
1 PURPOSE To define the Organization desired practices regarding Cloud Security. 2 SCOPE This policy applies to all business functions and its information systems, information assets and all communication and network connections that use or plan to use cloud computing services or cloud infrastructure services. Information systems, communications and network connections include, but are not limited to network devices such as routers and firewalls, servers and mainframes and operating systems, databases and applications. a. Data b. Application c. Functions d. Process e. Network connections f. Underlying Hardware The assets are to be evaluated on the following factors: I. Determine how important the data or function is to Insurance Company II. Analyze the impact of the scenarios: i. The asset becoming widely public and widely distributed ii. An employee of the Cloud service provider accessing the asset iii. The process or function being manipulated by an outsider iv. The process or function failing to provide expected results v. The information/data being unexpectedly changed vi. The asset being unavailable for a period of time 3POLICY The objectives of this policy are: a. To ensure that the cloud service is in accordance with the business and security requirements and relevant laws and regulations for: b. Provisioning and Commissioning of Cloud Services. c. Operations and Management of Cloud Services. d. De-commissioning of Cloud Services. e. To evaluate the following factors in cloud adoption decisions: i. Technical adequacy for porting the application to the Cloud – Assess the application profile to ensure it is a right fit to be ported to the Cloud. ii. Risk including availability requirements, regulatory, compliance and statutory requirements, data sensitivity. iii. Control over intrusion decisions, vulnerability monitoring, denial of service attacks. Any deviation from this policy shall be treated through risk management and exception management as defined in the ICSP 3.1 Cloud Service Models Cloud service delivery is divided among Four archetypal models Cloud Software as a Service (SaaS) 1. The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure. 2. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based email). 3. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user specific application configuration settings. Cloud Platform as a Service (PaaS) 1. The capability provided to the consumer is to deploy onto the cloud infrastructure consumer- created or acquired applications created using programming languages and tools supported by the provider. 2. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations. Cloud Infrastructure as a Service (IaaS) 1. The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. 2. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of selected networking components Business Process as a Service (BPaaS) 1. The capability provided which includes, business process outsourcing (BPO) services that are sourced from the cloud and constructed for multitenancy 2. The Services are often automated, and where human process actors are required, there is no overtly dedicated labor pool per client 3.2 Cloud Deployment Models 1. Public Cloud- Cloud infrastructure owned and operated by a third-party organization selling cloud services and available on a rental basis to the general public or a large industry group 2. Private Cloud - Cloud infrastructure is owned and operated solely for a single organization. It may be managed by the organization or a third party and may exist on-premises or off premises. 3. Hybrid Cloud- Cloud infrastructure is a composition of two or more different cloud infrastructures (private, community, or public) that remain separate entities, but are bound together by standardized or proprietary technology that enables data and application portability (e.g., load balancing between clouds). 3.3 Compliance Organization shall ensure compliance with various IRDAI guideline and related laws, regulations and guidelines issued by the regulating authority in India as applicable 3.4Cloud security lifecycle Governance and risk management, while the deployment model may define accountability and expectations. Organization shall ensure before signing an agreement with the cloud service provider, to the complete approval of all the mandatory controls. 3.4.1 Authentication It shall be ensured that the Cloud Service Provider supports various Multi-factor authentication mechanisms. Authorization shall be followed as per the existing “Information and Cyber Security Policy, Security Domain Policy, Section 2.2 – ‘Asset management’, subsection 3.2.2.3 – ‘Authorization Inventory’”. Organization shall affirm that the cloud service providers authentication process, access control, accountability and logging is in line with applicable regulatory and legal requirements. Customer data shall be protected from any unauthorized access. 3.4.2 Physical Security Controls The Physical Security Controls shall be followed according to the existing “Information and Cyber Security Policy, Security Domain Policy, Section 2.15 – ‘Physical and Environment Security’”. The additional physical security controls are mentioned as follows: Organization shall ensure that the Cloud Service Provider complies with the appropriate security controls of the infrastructure. Effective physical security shall ensure that centralized management system allows for correlation of inputs from various sources, including property, authorized employees. It shall be recommended to opt for Cloud service providers that conform to the ISO 27001 standard for physical and environmental security. 3.4.3 Infrastructure Security (for private cloud and IaaS for public cloud) Design of the Cloud environment shall be based on appropriate security guidelines such Cloud Security Matrix by Cloud Security Alliance or as per guidelines defined by IS Team. The IS team shall perform an assessment of private Cloud services prior to roll out based on industry standards and IS policy provisions. An infrastructure standard shall be defined and implemented for commissioning of cloud infrastructure including servers and network equipment. The standard shall consider legacy infrastructure or provision for reuse or retiring the same if required. The standard shall also include minimum security baseline standard. Appropriate tools / procedures shall be put in place for managing and monitoring infrastructure operations including Cloud characteristics such as storage utilization, provisioned allocation vs. actual utilization, host machine uptime, virtual machine uptime, network uptime and infrastructure and application response times, patch management, change management, incident management, antivirus management. Infrastructure integration architecture shall be defined for integration within the data center and across multiple data center. All applications and infrastructure elements shall be evaluated for their suitability to operate on the Cloud environment prior to migration, including checks for compatibility and information security baseline. A procedure document shall be made available for performing such a migration. Necessary approvals from Security and Business shall be obtained at various stages during migration as defined in the existing “Information and Cyber Security Policy, Security Domain Policy, section 2.5 - Information Systems acquisition and development. Cloud infrastructure shall follow the existing Organization’s Information Systems Maintenance policy including access control, change management, Data security, backup and restoration, patch management, job scheduling, capacity and performance management, malicious software management, vulnerability management, and IT service management. 3.4.4 Network Security Network security consists of security services that restrict or allocate access and distribute, monitor, log, and protect the underlying resources services. It shall be followed according to the existing “Information and Cyber Security Policy, Security Domain Policy, Section 2.11. ‘Network Security’”. Also, Organization shall ensure that the cloud service provider has documented and tested processes for: a. Access controls, for management of the network infrastructure b. Traffic filtering provided by firewalls c. Creating secure Virtual Private Networks (if VPN is offered) d. Intrusion detection / prevention e. Mitigating the effects of DDoS (Distributed Denial of Service) attacks f. Logging and notification, so that systematic attacks can be reviewed. 3.4.5 Data Isolation In case of utilization of cloud services, Organization shall ensure that its data is adequately isolated in the cloud environment. Organization’s data on the cloud shall be isolated such that it can operate as a separately managed entity/entities. Mechanisms shall be established to ensure appropriate isolation exists at the network, operating system, application layer and database. For a multi-tenant cloud environment, the following shall be ensured: Mechanisms shall be defined for separating the usage of storage, memory, and routing. The isolation of applications and data shall be ensured. In an isolated architecture, the data shall be segregated into its own database instance. For multi-tenancy, an architectural and design approach shall be adopted to economies of scale, availability, management, segmentation, isolation, and operational efficiency. For the application deployed on the Cloud using native multi-tenancy features offered by the application, privacy of data across tenants or entities shall be ensured through appropriate access control mechanisms. Application shall clearly log business errors and technical errors separately to support separation of duties between business users and data center operator. 3.4.6 Data Classification Data Classification shall be followed in accordance with the existing “Information and Cyber security policy, Security Domain Policy, Section 2.1 – ‘Data Classification’”. 3.4.7 Encryption As defined in the existing “Information and Cyber Security Policy, Security Domain policy, Section2.12 – ‘Cryptographic Controls’”, Organization shall ensure that appropriate cryptographic controls are applied to data depending upon its classification as per encryption requirements defined in the data classification policy. Organization shall ensure that a unique set of encryption key(s) are utilized, in accordance with the existing “Information and Cyber Security Policy, Security Domain Policy, Section 2.12 – ‘Cryptographic Controls”. Organization shall ensure that the cloud service provider support Key Management Interoperability Protocol (KMIP). KMIP provides a standardized way to manage encryption keys across diverse infrastructures. Organization shall prefer Hardware encryption keys, in compliance with the Federated Information Processing Standard (FIPS) 140 2-3 and above, whenever compatible. Organization shall devise encryption, key management procedures in accordance with the already existing Organization’s information security policy for the following: a. To encrypt data in transit, at rest, backup media b. To Secure key store c. To protect encryption keys d. To ensure encryption is based on industry/ government standards e. To Limit access to key stores f. Key backup and recoverability g. To test these procedures 3.4.8 Application Security Organization shall ensure Application Security for applications hosted over the Cloud in accordance with the existing “Information and Cyber Security Policy, Security Domain Policy, Section 2.5 – ‘Information Systems acquisition and development’, subsection –‘Application Security’”. 3.4.9 Incident Management The incident management for cloud services shall be followed in accordance with the existing “Information and Cyber Security Policy, Security Domain policy, Section 2.10 - ‘Incident and Problem Management’”. 3.4.10 Business Continuity and Disaster Recovery Organization shall ensure Business Continuity for cloud services shall be in accordance with the existing “Information and Cyber Security Policy, Security Domain Policy, Section 2.13 – ‘Business Continuity Management and Disaster Recovery’”. In addition, Organization shall also audit the Cloud service provider’s disaster recovery plan and ensure it meets Organization’s requirements. At minimum, the following shall be considered: i. The ability to retrieve and restore data following data loss incidents. ii. The cloud service provider shall provide Organizational disaster recovery testing report that would be extensive, covering from exercise scope to the final outcome and recommendations. iii. Make sure the DR (Disaster Recovery) solution is capable of maintaining the same levels of security measures and controls utilized in normal operation mode. iv. Assure that the Disaster recovery solution is owned and managed completely by the contracted Cloud Service Provider. It is recommended to opt for cloud service providers who are BS25999 or ISO 22301 certified. Business Continuity Plans shall be in place for cloud sourced services based on regular BCP and provisions for the same shall be included in Organization contracts. A confidential document containing account information for business continuity purposes shall be maintained 3.4.11 Exception Management An “exception” shall be defined as circumstances when a particular policy or standard; security program requirement; or security best practice cannot be fully implemented. Organization shall develop, publish and implement administrative, technical and physical safeguards in an effort to adequately protect the confidentiality, integrity and availability of its assets on an exception basis. The Exception Management for Cloud Services shall be followed in accordance with the existing “Information and Cyber Security Policy, General Guidelines, Section 1.8 –‘Exceptions’”. 3.5 Off boarding of cloud service provider Upon termination of contract, all data transferred by Insurance Company, or generated by the third party for Insurance Company, shall be handed over to Organization. Evidence shall be provided to Organization for deletion and purging of all copies of data at service provider site/s When in transit, data shall be subject to stringent controls based on the classification of data as laid down in the Information and Cyber Security Policy: Security Domain Policy, Section 2.1 – ‘Data Classification’. Upon termination of services, the service provider shall provide a certificate to ensure that de- commissioning has been carried out and further access shall not be provided to Organization employees. 3.6 Virtualization In cloud computing, majority of logical separation controls are not physical, it is enforced through logical system and application controls designed to help ensure data segmentation and integrity across the platform. The mechanism for providing this separation of data and services is “virtualization”. 3.6.1 Evaluation of Cloud Service Provider virtualization environment Organization shall evaluate the Cloud service providers’ virtualization hardening guidelines and policies and evaluate the third-party gap assessment against technology risk assessment checklist. This includes but not limited to: a. Disable or remove all unnecessary interfaces, ports, devices and services; b. Securely configure all virtual network interfaces and storage areas; c. Establish limits on VM resource usage; d. Ensure all operating systems and applications running inside the virtual machine are hardened; e. Validate the integrity of the cryptographic key- management operations; f. Harden individual VM virtual hardware and containers; 3.6.2 Virtualization Security Organization shall ensure that the Cloud security provider has controls to guarantee that only authorized snapshots/ images are taken and that these snapshots’/ images’ level of classification, storage location and encryption is incompliance with the production virtualization environment. Organization shall assure the following controls are applied as a part of hypervisor security: a. Organization can access the Hypervisor administrative access log reports. b. Hypervisor complete logging is enabled. Organization shall ensure that the cloud service provider gives assistance of trusted Virtual Machines (VM) and those VMs were made in compliance with the hardening guidelines. The cloud service provider shall provide Organization with its complete vendor list that will have access to Organization’s data; at any point throughout the duration of the agreement. The Cloud Service Provider shall update Organization about any change in the vendor list. For multi-tenancy through virtualization, Application shall be explicitly tested and qualified using virtualization product that is deployed within the Cloud. Application vendor shall provide sizing considering deployment under virtualized environment. Alternatively, vendor shall provide sizing based on physical servers and state the overhead with specific virtualization product. Application image shall be available for the virtualization product used. Each virtual machine shall be allocated resources commensurate with projected transaction. Resource consumption shall be periodically monitored against actual load so that necessary refinements can be carried out. Putting different tiers of the application onto separate physical boxes shall allow passing communication between tiers to go through physical network and facilitate implementation of firewall policies to allow communication only between VMs belonging to the same company. Also, using different disk partitions to isolate VMs belonging to different companies can provide further isolation. 3.7 Legal, Regulatory and Contractual Requirements 3.7.1 Contractual Requirements Organization shall sign a non-disclosure agreement (NDA) with the cloud service provider before providing any service. All aspects relating to privacy, confidentiality, security and business continuity shall be fully met. If the vendor is certified under the Cloud Security Alliance Trust or is providing control information under the Cloud Trust Protocol, and if the scope of services provided to Organization is included under the scope / statement of applicability for the certification, the vendor shall be exempt from the requirement for periodic audits by Organization. However, in such a scenario, the vendor will be required to furnish the following: o A self-certificate of compliance to all IS provisions in the contract o Copy of a valid certification demonstrating that the scope of services provided to Organization is included under the scope / statement of applicability for the certification o In order to be able to enforce performance, information security and other controls to address outsourcing risks, Organization shall build the right to audit as part of contract with vendors. Information Security department shall be engaged during the establishment of Service level agreements (SLAs) and contractual obligations to ensure that security requirements are contractually enforceable. Organization shall prepare a service contract addressing the following domains: a. Architectural Framework b. Governance, Risk Management c. Clarity on Cloud service provider’s role and Organization’s role d. e-Discovery searches e. Expert testimony f. Primary and secondary(logs) data g. Location of storage h. Contract termination i. Ownership of data Organization shall ensure that the Service Level Agreement(SLA) reflect the applications and data availability requirements in the occurrence of planned or unplanned disruptions or outages, business continuity and disaster recovery planning and backup and redundancy mechanisms defined by Organization. Organization shall include the financial remedies in the event of a business disruption in the SLA. Third party service providers shall be empaneled for the cloud services of Organization only after a contract is signed between Organization and the service provider. The contracted terms and condition shall be approved and drafted by the Legal department of Organization for safeguarding the interest of Organization in consultation with Compliance, Risk and Information Security departments. Automated tools shall monitor and track SLA's and generate reports to project the impact on costs, ROI etc. The provisioning process shall be completely automated. 3.7.2 Contractual clauses on Data Privacy Organization shall assure that it retains the “Exclusive” right to data ownership throughout the duration of the agreement. Ownership includes all copies of data available with cloud service provider including the backup media copies, if any. Organization shall ensure that the cloud service providers are not permitted to use Insurance Company’s’ data for advertising or any other non-authorized secondary purpose Organization shall contractually assure that they are informed of any confirmed breach immediately without any delay. For suspected breach, Organization shall be informed within 4 hours from the time of breach discovery. Organization shall contractually require that the cloud service provider be responsible for any financial losses or penalties that may occur in event of a cloud service provider breach. Organization shall contractually require that the cloud service provider will completely eliminate any trace of data/ information at the termination of the Contract as agreed in the contract. Organization shall contractually require and ensure that the cloud service provider will fulfill the data and media destruction and sanitization controls. Organization shall ensure that the cloud service provider complies with the requirement of return of data to Organization. There shall be no Vendor-lock in by the cloud service provider. 5.7.3 Legal Requirements Organization shall ensure that the Cloud service provider’s own data privacy policy is in compliance with the applicable laws in Organization. Also, the cloud service provider shall adhere to all regulatory and legal requirements of the country. Data and processes in Cloud Computing shall comply with both Indian and international laws when Organization availing the Cloud service has an international presence. Legal compliance shall be ensured when using the Cloud service. 5.7.4 Regulator Independence Organization shall contractually agree with the cloud service provider that the infrastructure and applications are made available for audit/ inspection by the regulators of the country. Regulator shall have access to all information resources that are consumed by Insurance Company, though the resources are not physically located in the premises of Organization.