5 criteria to evaluate the security of a cloud provider

Over the past years, many businesses have moved or engaged with the cloud by using a Cloud Service Provider (CSP). A Cloud Service Provider is a company that offers some component of cloud computing in the form of infrastructure as a service, software as a service, or platform as a service. The Cloud Security Alliance takes it one step further: “A Cloud Service is any system that provides on-demand availability of computer system resources, e.g; data storage and computing power, without direct active management by the user.”
For many new businesses and start-ups the approach has been to adopt a cloud-first approach and use cloud service providers for the majority of their systems. This approach simplified their adoption of IT.
But since the beginning of 2020, many organizations rushed to deploy remote and hybrid work environments. They accelerated their migration to the cloud as they scrambled to ensure their businesses could operate while supporting staff to work remotely. Many businesses rapidly migrated from on-premise solutions to cloud service providers. Their goal was to quickly provide cloud service based applications to their staff and customers. While this rush to the cloud might have addressed immediate business needs, it may not have included the appropriate steps to evaluate any security risks or regulatory impacts on the business.
Prior to 2020, the approach by businesses was to migrate systems to the cloud in a controlled manner. Examples include moving email from on-premise to a cloud based solution, or the Customer Relationship Management (CRM) system from their own internal systems to the cloud.
It’s important to evaluate the security of your cloud service provider, whether you rushed into migrating to the cloud or not. Using the cloud is trusting your business to an external third party. So the question you need to consider is this: How can I ensure that a third party is protecting my data, my systems, and ultimately, my business and reputation in the most appropriate way? In other words, how much can I trust my cloud service provider?
According to the European Union Agency for Cybersecurity (ENISA) the cloud is defined as an on-demand service model for IT provision, often based on virtualization and distributed computing technologies.
“Cloud computing architectures have:
In effect, the cloud provides companies with the ability to migrate all or part of their IT functions to an external third party firm specialized in that area. These third parties are better known as cloud service providers. Examples of Cloud Security Providers are Microsoft Azure, Amazon Web Services (AWS), and Google Cloud platform. Cloud service providers can invest time, money, and personnel to ensure the appropriate security controls are in place. This of course helps to protect customer data against cyber threats and cyber risks.
The cloud provides many advantages, such as ease and speed of adoption, access from anywhere with reliable internet connectivity, and up-to-date software and services. From a security perspective the cloud makes good business sense, too. Many cloud service providers have large teams looking after the security of their environments; they often have much larger security budgets than their customers.
These steps help ensure the security of the data stored and processed in the cloud. They can be taken whether you’ve already moved to the cloud or are currently considering migrating.
To help achieve this you need to first identify exactly what data you will migrate to the cloud. The type of data you migrate can vary. Ultimately, they will be determined by the type of system, application, or service you engage with.
Here are a few examples of data that could be migrated to the cloud:
Once you have identified the data, you then need to conduct a thorough risk assessment. This helps to identify the various security risks that could be posed to the data. This risk assessment should include security risks associated with the data no longer under your direct control. In other words, it should take into consideration the data being stored and processed by the cloud service provider. The risk assessment should take into account the various risks that are unique to the cloud. That includes the risks posed by any other organizations that cloud service providers may engage with to provide its services, such as hardware support personnel, helpdesk staff, or software developers. The European Union Agency for Cybersecurity (ENISA) provides an excellent guide on how to conduct a “Cloud Computing Risk Assessment.”
A traditional way for you to assess the security of your on-premise applications would be to conduct a penetration test. A penetration test is where cybersecurity professionals run a series of security tests that emulate how an attacker would break into those target systems. The results of these tests can identify key security weaknesses that you can then address.
When you move to the cloud you may no longer have the ability to run your own penetration test. Your cloud service provider may not want you and multiple customers running penetration tests at the same time. So you might need to coordinate with your cloud service provider to find a date and time to run your penetration test. If that’s not possible, you may need to rely on your cloud service provider to engage an independent third-party firm that specializes in penetration tests. For obvious security reasons the cloud service provider may not provide you with a detailed report of the results. However they may provide you with a summary overview highlighting the findings.
You may also consider a security assessment of the technical controls employed by the cloud service provider to be conducted. This security assessment can be carried out by cybersecurity professionals. This ensures that the service you are using has been configured and adapted to suit your own particular security and compliance needs, such as the European Union General Data Protection Regulation or the Payment Card Industry Data Security Standard (PCI-DSS). It can also ensure that you are operating within that cloud service provider in line with industry-recognized good security practices.
Many businesses are bound either by laws, regulations, or customer contracts to ensure the data they manage on behalf of their clients is stored and managed under certain conditions. Depending on your industry, you need to ensure your cloud service provider is compliant with the applicable laws and regulations. While you can outsource applications and tasks to a cloud service provider, you can’t outsource your responsibility for them.
This is particularly the case for regulations such as the European Union’s General Data Protection Regulation (GDPR). Under the GDPR, your organization is legally accountable for ensuring the personal data entrusted to you by your customers. In turn, you entrust this information to cloud service providers, and it’s stored and processed in accordance with the GDPR. A key principle under the GDPR is that personal data belonging to EU residents can’t be exported to countries outside the EU and the European Economic Area. If the cloud service provider you use is located in a country that doesn’t meet those requirements, you must contractually oblige that cloud service provider to deliver levels of security in line with the GDPR requirements.
Penetration tests and security assessments may provide you with details regarding the efficiency of the technical security controls employed by your cloud service provider, but you’ll need to go one step further. You need to seek assurances from the cloud service providers you use. You want to ensure that they have appropriate security governance in place. Here are some of the criteria to inquire about:
Migrating to the cloud provides many advantages for organizations. Careful consideration of security and governance issues relating to cloud service providers will enable those advantages to be gained. While businesses can outsource the processing of their data, they need to remember that they can’t outsource the responsibility for any compliance requirements for said data.
—
Photo by Adi Goldstein on Unsplash