Cloud Risk Management Mod 5
Cloud Risk Management Mod 5
Management
The Cloud Migration
• Gartner has identified seven critical risks that Cloud should raise with
vendors before selecting a cloud vendor. The seven risks are:-
• When you use the cloud, you probably won't know exactly where
your data is hosted.
• In fact, you might not even know what country it will be stored in.
• Ask providers if they will commit to storing and processing data in
specific jurisdictions, and whether they will make a contractual
commitment to obey local privacy requirements on behalf of their
customers
Data Segregation
• Even if you don't know where your data is, a cloud provider should
tell you what will happen to your data and service in case of
a disaster.
• Any offering that does not replicate the data and application
infrastructure across multiple sites is vulnerable to a total failure.
• Ask your provider if it has the ability to do a complete restoration,
and how long it will take.
Investigative Support
• Step-2
• Evaluating the cloud service model, cloud deployment model and the
presence of subservice providers aided in ensuring the following controls
were in place:
• Obtaining assurance throughout the chain of providers
• Awareness of shared responsibilities between three different parties
• Awareness of and mitigation in place for malicious insiders
• Evaluation of the lock-in risk
• Due diligence
Cloud Octagon Model
• Step-3
• Making procurement part of the risk assessment
methodology for cloud ensured
• Right to audit for the bank and the regulator
• Permission to conduct penetration testing
• Early risk identification and mitigation
• Step-4
• Consideration of diverse geographical locations in the risk assessment
methodology ensures that
• Data cannot be transferred to another country without consent
• Data in motion shall be protected
• Compliance to laws and regulations in multiple countries
Cloud Octagon Model
• Step-5
• The start-up company was subjected to a full risk assessment in
order to determine whether there was a gap between the
requirements set by the bank (and its regulators) and the
procedures and standards of the start-up and its subservice
provider. Doing so resulted in the following:
• Agreements of roles and responsibilities
between the bank and start-up were described in the contract
• Agreements on IT operating procedures including but not limited to access control,
change management, patch management, logging and monitoring, incident response,
back-up and Disaster Recovery and data deletion upon contract termination
• Implementing/applying the aspects of the octagon model allows
identification of the context or profile of a cloud change. And since projects
do not usually know from the beginning exactly which providers and services
they are going to use, this process can be repeated in multiple workshops
during the cloud journey.
Cloud Control Matrix(CCM)