Blogue sur l'informatique en nuage
Federal cloud blog

The need for clear cloud security assessment boundaries
As a Cloud Service Provider (CSP) on GSA’s Infrastructure as a Service (IaaS) BPA, CGI has learned we must help our customers understand the extent of the security features they inherit from our certified IaaS services. GSA appropriately made these boundary distinctions a key issue during the risk assessment process. Since different CSPs have chosen different boundaries, it is very important that customers be aware of the extent of the security provided with their IaaS.
The system security plan (SSP) is used to define the assessment boundary. For customers, it makes definitive the guidelines of scope and selection in NIST Special Publication (SP) 800-53 rev 3, Recommended Security Controls for Federal Information Systems and Organizations for each service model.
This diagram shows the differences in scope and control between the cloud provider and customer for each service model, as described in NIST SP 800-144, Guidelines on Security and Privacy in Public Cloud Computing. Depending on the services procured, different CSPs provide different security controls within a service model.
The Federal Risk Assessment Management Program (FedRAMP), which represents the next evolution of cloud security, recently released version 1.0 of NIST SP 800-53 rev 3 controls (ZIP) for assessing CSPs. To narrow the differences among CSPs, FedRAMP is raising the precision of its control assessments.
As an example, one control that will be thoroughly assessed is the IA-2 Identification and Authentication control for organizational users. IA-2 includes three enhancements. The CSP’s SSP now needs to provide implementation details for privilege, non-privilege and local access by CSP employees and contractors to applicable layers of the cloud environment. It should also describe how the base control and enhancements apply, or do not apply, to customers accessing the specific service model.
When comparing cloud services from BPA or non-BPA providers, customers need to evaluate closely what security they get with their service. While one CSP may seem less expensive, the comparison may not be apples-to-apples. For example, does each CSP provide operating system and web host scanning? Does each give customers the ability to perform a scan providing meaningful results? What kind of security transparency does each provide? Since customers accept the CSP’s security control of their infrastructure in the cloud, they will want to compare cloud controls to their own set of NIST SP 800-53 rev 3 controls, and should know what the deltas mean.
Voir les offres du nuage informatique
- S'inscrire au blogue
-
- Tous les billets sur l'informatique en nuage
- Billets sur le gouvernement fédéral américain (en anglais)
- Billets sur la sécurité en nuage
- Billets sur l'infrastructure service (IaaS)
- Billets sur le logiciel service (SaaS)
- Billets sur la gestion en nuage
- Billets sur les nouvelles sur le nuage informatique de CGI
Catégories du blogue sur le nuage informatique
- Gouvernement fédéral américain (en anglais)
- Sécurité en nuage
- Infrastructure service (IaaS)
- Logiciel service (SaaS)
- Gestion en nuage
- Nouvelles sur le nuage informatique de CGI

-
- Centre des médias
- Salle de presse
- Événements
- Études de cas
- Documents de réflexion
- Brochures
© Groupe CGI inc. | Restrictions et conditions juridiques | Confidentialité | Plan du site | Site mobile | Trouvez un bureau





