131
SECURITY COMPLIANCE CHALLENGES ON CLOUDS
Yury Chemerkin
Independent Security Researcher / PhD in progress
Russian State University for the Humanities (RSUH)
Moscow, Russia
[email protected]
ABSTRACT
Today cloud vendors provide amount features of integration and optimization in many fields like business
or education; there many way to adopt it for medical purposes, maintaining medical records, or
monitoring patients. Not all cloud solutions totally changed an original security paradigm and customers
still need to manage the accessibility, monitoring and auditing. An appropriate security level has become
very important issue for the customers. The compliance is part of security and a cornerstone when cloud
vendors refer to worldwide standards.
KEYWORDS:
Cloud security, compliance, amazon web services, aws, csa cloud controls matrix, csa, cmm, caiq, csa
consensus assessments initiative questionnaire
1. INTRODUCTION
Cloud Computing has been one of the top security topics for the last several years. The clouds
increasing popularity [1] is based on flexibility of virtualization as a technology for replacing
and improving of complex parts of systems reducing unnecessary computation and usage of
existing resources. Besides the well-known threats, the clouds introduce new security and
management level. Cloud security vendors (not only cloud vendors, almost of all kind of
vendors) claim that the end-user companies prefer a cost reduction instead the security to reduce
the operation complexity of their clouds (or systems) that eventually ends with a lower amount
of security that the end-user will accept. Some security questions about clouds are: how is it
implemented, how are the data or communication channels secured, how are the cloud and
application environments secure, etc. For example, the well-known phrase “physical security
does not exist in clouds” make no serious sense because it was this way as it had been when the
hosting service arrived. Customer must make any improvements than by-default configuration
with each new technology. If the virtual OS is a Windows Server, then the OS has the quite
similar security and patch management state as Desktop/Server OS. In addition, it is mere trust
than downloading and buying third-party solutions and it might be more trustable, than cloud
vendor (they are all third-party solutions).The cloud simply uses well-known protocols like
SMTP, HTTP, SSL, TCP/IP etc. to communicate, send email, file handling and other activity.
The methods that are compliant as a part of the RFC should indicate that they are OK. However,
a key problem is a lack of a systematic analysis on the security and privacy for such cloud
services. Third party organizations like the Cloud Security Alliance (CSA) promote their
recommendations to improve a cloud security and have a registry of cloud vendors' security
controls to help the users to make a right choice on security field.
This research analyzes security aspects, which the customers rely, are basic for cloud and
security standards and represent a minimal set of security state at least. Enterprises need to
comply with of the different regulations and standards (PCI, CSA, HIPAA, ISO etc.). The aim
of research is gaps in the recommendations of security standards (if they are) let cloud vendors