Information Security Governance

Similar documents
How To Manage Security In A Federal System

Utilizing and Visualizing Geolocation Data for Powerful Analysis

Supply Chain Data Standards in Healthcare

Analytical Program Management

Ascent to the Cloud. Four Focus Areas for a Successful Enterprise Migration. by Michael Farber farber_michael@bah.com

Engaging Mobility in the Oil and Gas Sector

How To Reduce Greenhouse Gas Emissions Through A Regional Performance Based Framework

by Christopher P. Bell Elizabeth Conjar

Cloud Computing. Course: Designing and Implementing Service Oriented Business Processes

The Social Financial Advisor: A Path Forward

Cloud definitions you've been pretending to understand. Jack Daniel, Reluctant CISSP, MVP Community Development Manager, Astaro

Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

Cloud Computing Security

IS PRIVATE CLOUD A UNICORN?

Meeting the Challenges of the Modern CIO

Managing Cloud Computing Risk

Strategic Information Management Through Data Classification Reducing Corporate Risk and Cost by Gaining Control of Business Information Assets


CSO Cloud Computing Study. January 2012

Technology & Business Overview of Cloud Computing

Strategies for Secure Cloud Computing

The NIST Definition of Cloud Computing

The NIST Definition of Cloud Computing (Draft)

Federal Cloud Computing Initiative Overview

Cloud Computing; What is it, How long has it been here, and Where is it going?

Developing a Business Case for Cloud

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

White Paper on CLOUD COMPUTING

DEPARTMENT OF VETERANS AFFAIRS VA DIRECTIVE 6517 CLOUD COMPUTING SERVICES

Managing Risk in Global ICT Supply Chains

Legal Issues in the Cloud: A Case Study. Jason Epstein

WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Flying into the Cloud: Do You Need a Navigator? Services. Colin R. Chasler Vice President Solutions Architecture Dell Services Federal Government

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

The Economics of Cloud Computing

Business Intelligence (BI) Cloud. Prepared By: Pavan Inabathini

Realizing the Promise of Health Information Exchange

The Economics of Cloud Computing

Cloud Computing in the Federal Sector: What is it, what to worry about, and what to negotiate.

Awareness, Trust and Security to Shape Government Cloud Adoption

WHAT S ON YOUR CLOUD? Workload Deployment Strategies for Private and Hybrid Clouds RESEARCH AND ANALYSIS PROVIDED BY TECHNOLOGY BUSINESS RESEARCH

Written Testimony. Mark Kneidinger. Director, Federal Network Resilience. Office of Cybersecurity and Communications

Integrating IT Service Management Practices into the Defense Acquisition Lifecycle

Management Spans and Layers. Streamlining the Out-of-Shape Organization

Cyber Solutions Handbook

Enabling Cloud Analytics with Data-Level Security

Booz Allen Cloud Solutions. Our Capability-Based Approach

Seeing Though the Clouds

Cloud for Credit Unions Leveraging New Solutions to Increase Efficiency & Reduce Costs Presented by: Hugh Smallwood, Chief Technology Officer

TESTIMONY OF MR. RICHARD SPIRES CHIEF INFORMATION OFFICER U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE COMMITTEE ON HOMELAND SECURITY

Think Outside Your ERP Mission-Focused Inventory Strategies

Plant Software in the Cloud

The Integrated Data Exchange Program

Enterprise Governance and Planning

Guidelines for Successful Cloud Investments by deborah collier Technology Policy Director

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud

Cloud Computing. Bringing the Cloud into Focus

Capturing the New Frontier:

OVERVIEW Cloud Deployment Services

AskAvanade: Answering the Burning Questions around Cloud Computing

Kent State University s Cloud Strategy

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Overview. FedRAMP CONOPS

The HIPAA Security Rule: Cloudy Skies Ahead?

Towards the Cloud! Ian Osborne Director, Digital Systems KTN, Intellect

Overcoming Deployment Challenges for Financial Crimes Platforms

Accelerate Your Enterprise Private Cloud Initiative

The Keys to the Cloud: The Essentials of Cloud Contracting

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

Cloud Computing Submitted By : Fahim Ilyas ( ) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Cloud Computing Risk and Rewards

ADOPTING CLOUD COMPUTING AS AN ICT DEPLOYMENT STRATEGY FOR DELIVERING SERVICES IN THE GOVERNMENT

Management of Cloud Computing Contracts and Environment

Pulling Up Your SOX. Companies Can Gain from Compliance with U.S. Governance Act. Lisa Fabish Stuart Groves

OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT

Where in the Cloud are You? Session Thursday, March 5, 2015: 1:45 PM-2:45 PM Virginia (Sheraton Seattle)

Capability Paper. Today, aerospace and defense (A&D) companies find

CLOUD COMPUTING, TRADE SECRET / KNOW-HOW & EUROPEAN LEGAL FRAMEWORK

Effectiveness and Efficiency

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

Right-Sizing Electronic Discovery: The Case For Managed Services. A White Paper

Compliance and the Cloud: What You Can and What You Can t Outsource

Running head: TAKING A DEEPER LOOK AT THE CLOUD: SOLUTION OR 1

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

Overcoming Deployment Challenges for Financial Crimes Platforms

The Cybersecurity Executive Order

Realizing the Promise of Health Information Exchange

Turning Big Data into Opportunity

CLOUD COMPUTING. A Primer

The Need for Service Catalog Design in Cloud Services Development

ITL BULLETIN FOR MARCH 2012 GUIDELINES FOR IMPROVING SECURITY AND PRIVACY IN PUBLIC CLOUD COMPUTING

The Hybrid Cloud: Bringing Cloud-Based IT Services to State Government

Cloud Computing Policy 1.0 INTRODUCTION 2.0 PURPOSE. Effective Date: July 28, 2015

12/1/2014. Cybersecurity and Cloud Services Compliance Considerations. Community Medical Centers. Cedars-Sinai. Dec. 5, 2014 San Francisco

Audit of the CFPB s Acquisition and Contract Management of Select Cloud Computing Services

GAO INFORMATION SECURITY. Federal Guidance Needed to Address Control Issues with Implementing Cloud Computing. Report to Congressional Requesters

Transcription:

Information Governance Government Considerations for the Cloud Computing Environment by Jamie Miller miller_jamie@bah.com Larry Candler candler_larry@bah.com Hannah Wald wald_hannah@bah.com

Table of Contents Introduction...1 Public Clouds...2 Private Clouds...2 Community Clouds...3 Hybrid Clouds...4 Information and Governance Framework...4 Architecting and Establishing the Information Program (PLAN)...5 Representative CCE Related Artifacts of the Plan Phase...9 Implementing and Operating the Information Program (DO)...9 Monitoring and Measuring the Information Program (CHECK)...10 Managing and Improving the Information Program (ACT)...11 Representing CCE Related Artifacts of the Check and Act Phases...12 Summary and Conclusions...13 Glossary of Acronyms...13 Glossary of Terms...14 About Booz Allen...16 Principal Offices...17

Information Governance Government Considerations for the Cloud Computing Environment Introduction Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. 1 Moving information assets to a cloud computing environment (CCE) offers the cloud user the potential for reduced costs, on-demand self-service, ubiquitous network access, location-independent resource pooling, rapid elasticity, and measured service. CCEs are offered in a variety of deployment and service models, as this paper describes, each with its own characteristics for cost/benefit, efficiency, flexibility, risk, and cloud consumer control. Although the potential cost savings and flexibility advantages of operating in the cloud are compelling, cloud users need to understand the security risks, compliance complications, and potential legal issues inherent in the CCE. Federal agencies desiring to take advantage of cloud computing benefits will need to invest in proactive and strategic management of the new environment. To do so, they must implement or modify information security management systems and governance programs to mitigate security risks and comply with their legal, regulatory, and contractual security requirements. As with the adoption of other new technologies and service offerings, transition to the CCE will likely be evolutionary, not revolutionary. Many organizations, particularly federal agencies, will migrate some capabilities to the cloud while maintaining existing computing environments for other capabilities, thus operating in a hybrid mode for the foreseeable future. 2 The goal of this paper is to present an information security governance framework and key considerations Outcomes of Effective Information Governance in a CCE Strategic Alignment Information security practices aligned with the agency s enterprise strategy and agreed-upon risk profile Value Delivery A standard set of information to effectively manage and monitor cloud provider security controls Risk An understanding of accepted risk exposure Performance Measurement A measurement process with feedback on progress made relevant to that framework to help inform agency leaders, information security professionals, and information security governance participants on how to take advantage of the benefits of the CCE without exposing their mission to excessive information security risk or potential legal and regulatory compliance failures. Information security governance is the mechanism through which organizations can ensure effective management of information security. Booz Allen Hamilton developed the information security management and governance framework presented in this paper. We have also customized it for and implemented it in several government and commercial client environments. The focus of this paper is the adaptation of our information security governance model for federal government entities planning to 1 Please see http://csrc.nist.gov/groups/sns/cloud-computing/index.html. 2 Cloud Computing User Transition Framework (C3F), Booz Allen Hamilton, 2009. 1

become users of cloud computing services. Potential cloud service providers to the Government will require a somewhat different adaptation of the information security management and governance framework, but this will be the topic of a separate white paper. Before we present our proposed information security governance framework, it is first necessary to review the challenges and risks associated with each of the four existing cloud computing deployment models. To that effect, we offer a high-level description of each deployment model, including graphical depictions. Public Clouds The most common type of CCE is the public cloud. In this construct, the cloud infrastructure is owned and operated by an organization that provides services to multiple enterprises and individuals on a utility basis (consumers are often referred to as tenants ) (see Exhibit 1). Public clouds present the highest security risk to federal agency cloud consumers because of the lack of direct control over information security control implementation and monitoring, global multi-tenancy with other users, virtualization and data location management, limited service-level agreement (SLA) flexibility, contractual liability limitations, and the lack of common legal and regulatory environments between cloud providers and cloud consumers. 3 Lack of visibility compounds these issues and prevents cloud consumers from effectively measuring or demonstrating compliance with any kind of security requirements. In the future, providers of public services will probably adapt their offerings and increase the flexibility of SLAs and contracts to better accommodate the unique legal, regulatory, and contractual information security compliance requirements of the federal government environment. Some positive signs of movement in this direction are beginning to appear in the market, as evidenced by Amazon s recent introduction of optional virtual private cloud services that combine the outsourcing advantages of public clouds with increased customer visibility, control, and service tailoring. Organizations should limit public cloud deployment to public information and systems with acceptable risk profiles and no legal or regulatory security requirements until service providers adapt to meet the user community s security, compliance, and liability needs. 4 Private Clouds In sharp contrast to the public cloud is the private CCE. In the private cloud, the cloud infrastructure is owned/leased and operated by a single organization solely for the user community of that organization (see Exhibit 2). An example in the Federal Government is an agency-wide cloud that offers services to all entities within that agency. Cost efficiencies and economies of scale are likely to be more limited in private clouds Exhibit 1 Public Cloud Illustration Many, Many Organizations Internet e.g. Google Microsoft Amazon Core Network Public Clouds Source: Booz Allen Hamilton 3 This specific issue is addressed in depth by the Booz Allen Cloud Computing White Paper, June 2, 2008, and Booz Allen s Cloud Computing Basics: Cloud Computing 101 (White Paper). 4 Cloud Computing Report, Considerations for Public Cloud Service Acquisition, Booz Allen Hamilton, August 2009. 2

Exhibit 2 Private Cloud Illustration Organization s Private Network Internet Core Network Private Cloud Source: Booz Allen Hamilton than public clouds, but information security risk and governance issues are minimized largely because of the shared mission goals and legal/regulatory security requirements between the cloud service provider and the cloud consumers. Community Clouds In a community CCE, multiple tenant organizations with many common characteristics (e.g., mission goals, legal and regulatory security requirements, compliance considerations) share the cloud infrastructure, thus forming a community (see Exhibit 3). The cloud owner may be a member of the community or an independent service provider with experience in the community and knowledge of the specific user community s characteristics. Two examples in the Federal Government are the Defense Information Systems Agency (DISA) Rapid Access Computing Environment (RACE) and the National Aeronautics and Space Administration s (NASA) Nebula (both are still in the early stages of development). Community clouds represent a lower information security risk profile than a public cloud environment and fewer legal and regulatory compliance issues, but they carry certain risks associated with multi-tenancy. Exhibit 3 Community Cloud Illustration Internet Organization #1 Private Network Organization #2 Private Network Community Cloud Source: Booz Allen Hamilton 3

Hybrid Clouds Hybrid CCEs represent a combination of two or more cloud deployment models (e.g., two public clouds, one public and one community cloud) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability throughout the hybrid environment (see Exhibit 4). As a result, hybrid clouds present a combination of the information security risks and governance challenges inherent in the deployment models they combine. A combination of private and community clouds represents the lowest risk; a combination of multiple public cloud environments presents the greatest information security risks and challenges to legal and regulatory compliance. Each CCE presents a different profile of benefits and risks that organizations should carefully consider before cloud adoption. Organizations should use a suitable framework that helps them address risks and ensures their requirements are met. Although the information security management and governance model we describe in the next section can be adapted to any of the cloud computing deployment models, we focus our discussion primarily on information security governance within the community cloud environment because we believe the community CCE is the most likely near-term adoption and migration strategy for federal government agencies. Information and Governance Framework Booz Allen developed the information security management and governance framework and has customized and deployed it in a variety of client environments. This framework is a system of management and functional processes implemented in a standard quality management (or Plan, Do, Check, Act) cycle of continuous improvement. The framework is based on evolving international standards 5 and planned evolution of the National Institute of Standards and Technology (NIST) Risk Framework. 6 Seven management processes strategy and planning, policy portfolio management, risk management, awareness and training, communication and outreach, compliance and performance management, and management oversight comprise this framework and support the functional processes of the Do phase (see Exhibit 5). Although the purpose of each of the seven framework processes will not change when applied to a CCE, many of the process considerations and required actions will need to be modified to effectively plan, manage, and govern information security in a CCE. In all cases, it will be necessary to clarify specific roles, responsibilities, and accountability for each major process step. Some steps may be points for Exhibit 4 Hybrid Cloud Illustration Organization s Private Network Internet Spill Over Capacity as Needed Core Network Private Cloud Public or Community Cloud Source: Booz Allen Hamilton 5 ISO/IEC 27001 Information Technology Techniques Information Systems Requirements. 6 NIST SP 800-39 Managing Risk from Information Systems. 4

Exhibit 5 Information Governance Framework Architect and Establish (Plan) Implement and Operate (Do) Monitor and Review (Check, Act) Processes Functional Processes Processes Strategy and Planning Asset Human Resources Communications and Outreach Policy Portfolio Physical and Environmental Identity and Access Comms and Operations Information Systems Acquisition Compliance and Performance Risk Incident Business Continuity Awareness and Training Source: Booz Allen Hamilton Oversight negotiation with prospective cloud service providers for inclusion in SLAs and contracts. Our assumption in the following discussion is that management and governance processes are primarily the responsibility of a centralized information security function (such as the office of the Chief Information Officer [CISO]) for an agency or large government entity, with considerable participation by information technology management (such as the office of the Chief Information Officer [CIO]). This centralized security and technology group would perform the cloud provider acquisition function and manage the service provider relationship over the duration of the agreement. This group would also provide the information, policy, and guidelines necessary for users to follow when implementing cloud computing-based services. Architecting and Establishing the Information Program (PLAN) Designing and planning for an effective information security governance structure occurs through three major management processes: strategy and planning, policy portfolio management, and risk management. These processes comprise the Plan phase of the continual improvement process. Strategy and Planning Process Strategy and planning are essential to an effective information security management and governance program. The primary purposes of the strategy and planning process are to Establish information security program direction and guide activities Ensure alignment of the information security program with mission goals and objectives Define the information security program vision, goals, requirements, and scope Architect and Establish (Plan) Implement and Operate (Do) Monitor and Review (Check, Act) Processes Functional Processes Processes Strategy and Planning Policy Portfolio Risk Asset Physical and Environmental Identity and Access Incident Oversight Human Resources Comms and Operations Information Systems Acquisition Business Continuity Communications and Outreach Compliance and Performance Awareness and Training 5

Ensure consistency with the enterprise information security architecture Proactively plan activities to achieve goals and meet requirements Policy Portfolio Process Architect and Establish (Plan) Implement and Operate (Do) Monitor and Review (Check, Act) Processes Functional Processes Processes Strategy and Planning Asset Human Resources Communications and Outreach Determine the operating model to enable enterprise program efficiency. Policy Portfolio Physical and Environmental Identity and Access Comms and Operations Information Systems Acquisition Compliance and Performance The process is performed in collaboration with the risk management and policy portfolio management processes to ensure plans effectively communicate management intent, clearly define roles and responsibilities, sufficiently identify and address information security risks, and provide management clear choices for resource allocation and optimization. The activities of the strategy and planning process will not change significantly to accommodate the use of cloud computing services, but additional knowledge and understanding of the information security risks and issues related to compliance and performance management in varying cloud computing deployment and service models will be required. The major impact of the CCE on the strategy and planning process will be the development of CCEbased cost/benefit analyses that include the cost of effective governance to manage risk and ensure legal, regulatory, and contractual compliance. In conjunction with the risk management process, the strategy and planning process will define information security implementations that are allowable for each cloud computing service model (refer to the Risk Process section) based on the relative risk rating of the information and systems migrating to the cloud (e.g., cloud services allowed by system categorization). In addition, the process will clarify roles, responsibilities, and accountability for baseline information security capabilities in each environment allowed. The planning process will also determine the cloud service provider contractual requirements and negotiations and will include the long-term management of the provider relationship. Risk Incident Oversight Business Continuity The major purposes of the security policy portfolio management process are to Define and communicate management expectations of information security Translate goals and requirements into actionable mandates Establish clearly defined roles and responsibilities for information security Inform compliance measurement Awareness and Training Facilitate efficient and consistent implementations with supporting standards, guidelines, and procedures. These purposes will not materially change when applied to a CCE. However, the policy portfolio will require additional policies, guidelines, standards, and procedures to effectively communicate and govern information security in a CCE. An overall policy on rules governing agency acquisition and use of cloud computing services will be needed to communicate agency leadership intentions for the safe use of cloud computing, as well as the authorization process required to initiate such use. Agencies will also need to document guidelines for the appropriate evaluation and acquisition of cloud computing service providers, along with environments that meet information and system risk and compliance requirements. Also, the policy portfolio management process (in coordination with the strategy and planning and risk management processes [Plan phase] and with the approval and authority of the management oversight process [Act 6

phase]) will need to provide guidance on the minimum information security and compliance management requirements to be included in SLAs and contracts with prospective cloud service providers. A review of all agency security policies must occur to determine the changes required to ensure effective governance in a cloud environment. Each policy should be tailored to reflect the unique cloud deployment model and account for the information and information systems authorized for cloud migration. Additional policy and supporting guidance, standards, and procedures will be necessary to effectively manage the functional control processes when operating in a CCE (e.g., configuration and change management guidelines, incident management, chain of evidence and e-discovery, mission continuity of cloud services, the monitoring and reporting of cloud service compliance, system and data life-cycle assurance, and compliance testing and assurance of cloud-based services). Guidelines may also be developed to specify mandatory and recommended tools for use in the monitoring and evaluation of cloud service compliance and performance (e.g., certification and accreditation [C&A] tools, technical compliance tools such as Layer7). Policy decisions regarding each of the functional control processes must account for the level of control each organization is willing to transfer to the cloud provider while ensuring the goals and requirements of the information security program are met. Risk Process The risk management process will require modification and significant additional variable considerations to securely migrate agency services to a CCE. The primary purposes of the risk management process include Enable information asset-based protection and mitigation planning Enhance the organization s ability to select and apply protection based on the specific risks and threats affecting an asset Ensure consistent information security risk assessment methodologies are used throughout the organization Architect and Establish (Plan) Implement and Operate (Do) Monitor and Review (Check, Act) Processes Functional Processes Processes Strategy and Planning Policy Portfolio Risk Asset Physical and Environmental Identity and Access Incident Oversight Human Resources Comms and Operations Information Systems Acquisition Business Continuity Communications and Outreach Compliance and Performance Awareness and Training Enable better optimization of security expenditures, resources, and activities Inform security priorities and planning Provide the basis for measuring information security program efficiency and effectiveness. Risk management methodologies will require modification to effectively consider, treat, or accept the risks inherent in migrating agency information and systems to a CCE. For practical reasons, we limit our discussion to the use of private, community, or a hybrid of both CCEs as the most likely evolution of federal agency CCE transition. As noted earlier, until the providers of public cloud services make significant changes to their current offerings and SLAs, the use of those services by the Federal Government will need to be limited to public information and systems with minimal risk and no legal or regulatory security requirements. Limiting our discussion to the use of private, community, or combined hybrid cloud services will still require the consideration and inclusion of additional risk factors related to the relative degrees of agency control over the service models adopted. The risk methodology will also need to determine risk mitigations and the residual risks of each service model for the hierarchy of risk profiles associated with agency information assets and systems. For example, agencies will need to modify their current risk calculations that focus on system categorization, privacy, and regulation to appropriately assess changes to the risks of these systems when migrating to a CCE utilizing one or more of the three cloud service models. 7

Exhibit 6 summarizes the models and their relative risk. These example risk ratings may be modified to fit with agency-specific risk assessment methodologies, but in general they are consistent with the degree of direct agency control represented by each service model. Each cloud service model can be assessed as an information service asset with unique risk ratings and resultant control selection for risk mitigation (e.g., contract terms, SLA content, compliance, monitoring tools). The relative risk ratings increase as the cloud consumer moves from IaaS to PaaS and finally to SaaS. The service models build on one another, resulting in cumulative risk as the cloud provider assumes more direct control (i.e., PaaS builds on IaaS, and SaaS builds on both IaaS and PaaS, resulting in an increasing assumption of control by the cloud provider and therefore greater security risk to the cloud consumer). New risk analysis methodologies should be closely monitored during the compliance and performance management process (Check phase) and modified as necessary to reduce overall information security risk over time. In all cases, the modified risk analysis methodologies and resulting risk rankings must be reviewed during the management oversight process (Act phase) to ensure management participation, risk awareness, review, and acceptance of both risk treatment options and resultant residual risks. Exhibit 6 Service Model Risk Characteristics Service Model Risk Characteristics Relative Additional Risk Infrastructure as a service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Source: Booz Allen Hamilton The capability provided to the cloud consumer is to rent processing, storage, networks, and other fundamental computing resources and to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly select networking components (e.g., firewalls, load balancers). The capability provided to the consumer is to deploy consumercreated applications onto the cloud infrastructure using programming languages and tools supported by the provider (e.g., Java, Python,.Net). The consumer does not manage or control the underlying cloud infrastructure, network, servers, operating systems, or storage, but the consumer has control over the deployed applications and possibly application hosting environment configurations. The capability provided to the consumer is to use the provider s applications running on a cloud infrastructure and accessible from various client devices through a thin client interface, such as a web browser (e.g., web-based e-mail). The consumer does not manage or control the underlying cloud infrastructure, network, servers, operating systems, storage, or individual application capabilities, with the possible exception of limited user-specific application configuration settings. Medium High Very High 8

Representative CCE-Related Artifacts of the Plan Phase The three management processes of the information security governance framework s Plan phase will produce several documents to inform and guide users in the effective and appropriate use of cloud computing services. Some specific examples are included in each process description, but Exhibit 7 summarizes artifacts that are typical outputs of the governance model and that will likely have specific references to operating in a CCE. In some cases, the cloud provider may be partially or completely responsible for these artifacts, depending on the final agreements between the cloud consumer and the cloud provider. Implementing and Operating the Information Program (DO) Because this paper focuses on information security governance, we will not discuss in detail the functional processes that constitute the Do phase of the Plan, Do, Check, Act cycle. The implementation and operation of information security controls contained in each of the functional process areas will vary Architect and Establish (Plan) Implement and Operate (Do) Monitor and Review (Check, Act) Processes Functional Processes Processes Strategy and Planning Policy Portfolio Risk Asset Physical and Environmental Identity and Access Incident Human Resources Comms and Operations Information Systems Acquisition Business Continuity Communications and Outreach Compliance and Performance Awareness and Training Oversight Exhibit 7 Plan Phase Artifacts Process Strategy & Planning Policy Portfolio Risk Example Artifact Strategic Plan Consolidated Requirements Organization Model Modifications Roles & Responsibilities Charts CCE Implementation Plans Budget & Resource Requirements CCE Contract & SLA CCE Policy CCE Acquisition Policy CCE Authorization Procedure CCE Standards/Guidelines CCE Monitoring/Compliance Tools CCE Configuration Guidelines CCE-Specific Processes Risk Procedure Risk Methodology Modifications Service Model Risks Risk Assessment Reports CCE Controls & Risk Treatments Systems/Assets Allowed in CCE Contract/SLA Implications Goal Performance Requirements Compliance Relationship Consumer/Provider None None Terms & Conditions Terms & Conditions Terms & Conditions None None Terms & Conditions Technical Compliance Terms & Conditions None None None None Terms/Responsibilities None Source: Booz Allen Hamilton 9

significantly depending on CCE deployment and the service models employed. However, other Booz Allen papers address the implementation and operation of information security functional processes and controls, and this topic is not essential to discussions related to the effective management and governance of information security in a cloud environment. Monitoring and Measuring the Information Program (CHECK) Three management processes are included in the Check phase of the information security management and governance framework: awareness and training, communication and outreach, and compliance and performance management. Of these three, the compliance and performance management process represents the area with the most significant issues for consideration when migrating services to a CCE. Awareness and Training and Communication and Outreach Processes Architect and Establish (Plan) Implement and Operate (Do) Monitor and Review (Check, Act) Processes Functional Processes Processes Strategy and Planning Policy Portfolio Risk Asset Physical and Environmental Identity and Access Incident Oversight Human Resources Comms and Operations Information Systems Acquisition Business Continuity Communications and Outreach Compliance and Performance Awareness and Training The major purposes of these management processes are complementary and similar. The purposes include Consistently communicate the importance of information security throughout the organization Educate staff on required actions related to changes in regulatory, legislative, and other mandates Broaden and deepen the security awareness of the organization Enhance compliance through better understanding and knowledge Clarify roles and responsibilities Drive the ongoing competency of information security staff. Execution of these important management processes will not vary as a result of the introduction of a CCE. However, the processes will need to include formal awareness, training, communication, and outreach to inform all relevant agency users of the new policies, guidelines, standards, procedures, risks, and compliance issues related to the migration of information services to a CCE. Compliance and Performance Process Architect and Establish (Plan) Implement and Operate (Do) Monitor and Review (Check, Act) Processes Functional Processes Processes Strategy and Planning Policy Portfolio Risk Asset Physical and Environmental Identity and Access Incident Oversight Human Resources Comms and Operations Information Systems Acquisition Business Continuity Communications and Outreach Compliance and Performance Awareness and Training Compliance and performance management is the key process in the Check phase of the framework. The primary purposes of the process include Create regular measurement and reporting of progress and issues Inform and prioritize program improvements Record progress toward achieving strategic goals and compliance with requirements Drive continuous improvement of the information security program Minimize potential for recurrence of systemic issues Optimize consistency and efficiency of security implementations Inform modifications to risk analyses and risk mitigations 10

Measure and report on compliance with legal, regulatory, and contractual requirements; internal policies; and technical guidelines and standards. The purposes of the compliance and performance management process remain unchanged in a CCE, but the execution of the process will require significant modification to effectively monitor and measure compliance and performance in the cloud. Focusing again on agency use of private clouds, community clouds, or hybrid combinations will lead to enhanced information security compliance and performance in a public cloud environment. Compliance includes legal, regulatory, and contractual security compliance; compliance with internal policies, guidelines, standards, and procedures; and technical compliance checking. All compliance and performance checking is dependent on a comprehensive measurement and management reporting system covering each area of compliance, as well as the information security program s effectiveness in meeting goals, objectives, and requirements. Compliance and performance measurement and reporting will require detailed specification in the SLAs and contracts with the cloud service provider covering each service model allowed in the agreements. In the case of private or community cloud service providers, there will be a greater level of trust, understanding, and flexibility in the agreement negotiations because of the shared mission goals and common legal and regulatory compliance requirements between the cloud provider and the cloud consumer. Based on the cloud service risk profiles; strategic planning of the cloud service; and CCE-specific policies, guidelines, standards, and procedures defined in the Plan phase, federal agency cloud consumers can determine their minimum information security requirements and controls for each level of cloud service and drive the SLA and contract negotiations to a satisfactory agreement. SLAs and contracts must minimize security risks; enable effective monitoring and measuring of all legal, regulatory, and contractual security requirements (by either the service provider or the cloud consumer); and clearly define accountability for legal liability related to an information security breach in the cloud. Measurement and monitoring reports should be presented in periodic management reviews of the overall information security program to the information security governance body, along with recommendations for corrective and preventive actions. Managing and Improving the Information Program (ACT) Participation by management representing all agency stakeholder organizations is essential to the effective management and oversight of any information security management system. The process and the governance bodies that execute it form the governance program and represent the Act phase of the continuous improvement model. Oversight Process An information security governance body conducts the functions of the management oversight process. This body consists of senior leadership and representatives from each functional area of the organization to Ensure ongoing management involvement in program direction and priorities Establish enterprise information security governance Ensure the information security program supports mission goals and objectives Reinforce the importance of information security throughout the organization Oversee risk management to balance mission goals and information security costs Track and optimize information security resource allocation Authorize improvements to the information security program on a continuing basis. 11

These management oversight objectives are valid regardless of the information security operating environments deployed. However, the governance body will need to actively participate in the review, authorization, and communication of all information security plans, policies and supporting documentation, risks, and compliance issues related to the use of cloud-based services. Therefore, the governance body will need to include or consult with cloud computing information technology and information security subject matter experts. The group should also include or consult with agency counsel to ensure a complete understanding and inclusion of legal and liability issues specific to a CCE and to verify sufficient coverage of all issues in the negotiated SLAs and contracts for cloud-based services. It is imperative that management sponsors and monitors the effectiveness of cloudspecific awareness, training and communication, and outreach programs to ensure broad awareness of agency policy and guidelines by all responsible users. Finally, management must be vigilant in its review of compliance and monitoring of cloud services and must drive continuous improvement in the overall information security program, including all cloud-based services. Representative CCE-Related Artifacts of the Check and Act Phases The four management processes of the Check and Act phases of the information security management and governance framework will result in several documents and reports to inform and guide users in the effective and appropriate use of cloud computing services and Exhibit 8 Act Phase Artifacts Process Awareness & Training; Communication & Outreach Compliance & Performance Risk Example Artifact User Awareness CCE Policy CCE Authorization CCE Guidelines/Standards CCE Procedures CCE Technical Training Awareness Tests & Records Compliance/Performance Measures Legal, Regulatory Compliance Policy Portfolio Compliance Privacy Compliance Technical Compliance Log Monitoring Reports Incident Reporting Internal Compliance Audits Performance Measurement Reports Technical Controls Testing SLA Reporting Recommended Improvement Plans CCE Review Reports Authorized Improvement Plans Contract/SLA Implications Provider Participation? Yes No Sometimes Sometimes No No Terms & Conditions Roles, Responsibilities Roles, Responsibilities Roles, Responsibilities Roles, Responsibilities Roles, Responsibilities Roles, Responsibilities Terms, Responsibilities Terms, Responsibilities Terms, Responsibilities Terms & Conditions Negotiation None Negotiation Source: Booz Allen Hamilton 12

to report on the compliance and performance of cloudbased systems. Some specific examples are included in each process description, but Exhibit 8 summarizes artifacts that are typical outputs of the governance model and that are likely to have specific references to operating in a CCE. In some cases, the cloud provider may be partially or completely responsible for these artifacts, depending on the final agreements between the cloud consumer and the cloud provider. Summary and Conclusions Cloud computing takes advantage of economies of scale to offer compelling cost benefits to federal agencies for information services performed in support of their mission. Migration of agency information assets and systems to a CCE can also provide impressive benefits related to deployment flexibility and service on demand and can enable capabilities not feasible in many enterprise computing environments, such as massive data analysis and intelligence analysis. 7 However, the nature of cloud deployment and service models presents new information security risks and introduces complications to compliance with legal, regulatory, and contractual security requirements for cloud consumers. Some complications have serious legal liability implications. Key to the successful adoption and transition of information systems to a CCE is the implementation/ modification of a strategic proactive information security management and governance framework. At Booz Allen, we have developed a framework that we have successfully implemented in several commercial and federal government client environments. Our model consists of a set of management processes that interact in a Plan, Do, Check, Act cycle of continuous improvement to effectively manage and govern enterprise information security. The management processes of the governance model require some modifications to the major steps in their execution to effectively manage the risk and compliance issues inherent in a CCE. Information security governance is a critical component of a successful transition to the cloud. An organization s mission and risk profile must drive the implementation of the management processes described in this paper, as well as the artifacts they produce. It is also vital to treat the management processes as integrated components of a larger information security governance framework rather than as individual silos. Using this framework to guide the transition to and ongoing operations in the CCE will ultimately enable an organization to maximize its benefits in the cloud while sensibly and cost-effectively addressing the cloud s inherent risks. Glossary of Acronyms C&A Certification and Accreditation C3F CCE CIO CISO DISA IaaS NIST Booz Allen s Cloud Computing User Transition Framework Cloud Computing Environment Chief Information Officer Chief Information Officer Defense Information Systems Agency, part of the Department of Defense Infrastructure as a Service National Institute of Standards and Technology. NIST guidelines on information security are officially standard practice for federal information technology and are codified in information security regulations PaaS Platform as a Service RACE Rapid Access Computing Environment. This refers to a working prototype cloud developed by DISA. As of this writing, it is being used for open-source software development, and many additional functions are in the works SaaS Software as a Service SLA SP Service-Level Agreement. In this case, this refers to a contract between the cloud computing provider and client(s) Special Publication 7 Massive Data Analytics and the Cloud A Revolution in Intelligence Analysis, Drew Cohen and Joshua D. Sullivan, 2009. 13

Glossary of Terms Cloud Cloud Infrastructure as a Service (IaaS) Cloud Platform as a Service (PaaS) Cloud Software as a Service (SaaS) Community Cloud Hybrid Cloud Multi-tenancy Private Cloud Public Cloud Service Model The cloud consists of computing resources (software, operating platform, memory, and processors) that are abstracted from the user by some form of virtualization and (often) physical separation between the user and the infrastructure on which the services are supported. Cloud computing means the use of a cloud for IT functions. The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems; storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls). The capability provided to the consumer is to deploy onto the cloud infrastructure consumercreated or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations. The capability provided to the consumer is to use the provider s applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based email). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings. The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on premise or off premise. The cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds). Property of a cloud environment used by multiple customers ( tenants ). Contrast with the single-tenancy private cloud, which is used by only one customer. The cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on premise or off premise. The cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services. Refers to the ownership of the cloud infrastructure. See the Introduction for descriptions of different service models. 14

15

About Booz Allen Booz Allen Hamilton has been at the forefront of strategy and technology consulting for 95 years. Every day, government agencies, institutions, corporations, and not-for-profit organizations rely on the firm s expertise and objectivity, and on the combined capabilities and dedication of our exceptional people to find solutions and seize opportunities. We combine a consultant s unique problem-solving orientation with deep technical knowledge and strong execution to help clients achieve success in their most critical missions. Providing a broad range of services in strategy, operations, organization and change, information technology, systems engineering, and program management, Booz Allen is committed to delivering results that endure. With more than 22,000 people and $4.5 billion in annual revenue, Booz Allen is continually recognized for its quality work and corporate culture. In 2009, for the fifth consecutive year, Fortune magazine named Booz Allen one of The 100 Best Companies to Work For, and Working Mother magazine has ranked the firm among its 100 Best Companies for Working Mothers annually since 1999. Contact Information: Jamie Miller Larry Candler Hannah Wald Associate Associate Consultant miller_jamie@bah.com candler_larry@bah.com wald_hannah@bah.com 703/377-1274 703/377-4534 703/377-6646 To learn more about the firm and to download digital versions of this article and other Booz Allen Hamilton publications, visit www.boozallen.com. 16

Principal Offices ALABAMA Huntsville CALIFORNIA Los Angeles San Diego San Francisco COLORADO Colorado Springs Denver FLORIDA Pensacola Sarasota Tampa GEORGIA Atlanta HAWAII Honolulu ILLINOIS O Fallon KANSAS Leavenworth MARYLAND Aberdeen Annapolis Junction Lexington Park Linthicum Rockville MICHIGAN Troy NEBRASKA Omaha NEW JERSEY Eatontown NEW YORK Rome OHIO Dayton PENNSYLVANIA Philadelphia SOUTH CAROLINA Charleston TEXAS Houston San Antonio VIRGINIA Arlington Chantilly Falls Church Herndon McLean Norfolk Stafford WASHINGTON, DC The most complete, recent list of offices and their and addresses and telephone numbers can be found on www.boozallen.com by clicking the Offices link under About Booz Allen. www.boozallen.com 2009 Booz Allen Hamilton Inc. 09.205.09