Open Data Center Alliance Usage: Provider Assurance Rev. 1.1



Similar documents
OPEN DATA CENTER ALLIANCE USAGE MODEL: Provider Assurance Rev. 2.0

Open Data Center Alliance Usage: Single Sign On Authentication REv. 1.0

Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0

OPEN DATA CENTER ALLIANCE Usage Model: Guide to Interoperability Across Clouds

Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY IN A HYBRID CLOUD ENVIRONMENT REV. 1.1

OPEN DATA CENTER ALLIANCE SM USAGE MODEL: E-DISCOVERY AND FORENSICS

Open Data Center Alliance Usage: VIRTUAL MACHINE (VM) INTEROPERABILITY

Open Data Center Alliance Usage: Identity Management Interoperability Guide rev. 1.0

OPEN DATA CENTER ALLIANCE USAGE Model: Software as a Service (SaaS) Interoperability Rev 1.0

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

How To Secure An Rsa Authentication Agent

Cloud Security Who do you trust?

OPEN DATA CENTER ALLIANCE USAGE: Data Security Rev. 1.0

GE Measurement & Control. Cyber Security for NEI 08-09

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

A Rackspace White Paper Spring 2010

SUPPLIER SECURITY STANDARD

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

CLOUD TECH SOLUTION AT INTEL INFORMATION TECHNOLOGY ICApp Platform as a Service

GoodData Corporation Security White Paper

Open Data Center Alliance Usage: SERVICE CATALOG

I D C S P O T L I G H T. Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s

TOP SECRETS OF CLOUD SECURITY

Security Controls for the Autodesk 360 Managed Services

OPEN DATA CENTER ALLIANCE SM CLOUD ADOPTION SURVEY

PCI Requirements Coverage Summary Table

Proven LANDesk Solutions

Did you know your security solution can help with PCI compliance too?

Securing the Service Desk in the Cloud

VMware vcloud Air Security TECHNICAL WHITE PAPER

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

PCI Requirements Coverage Summary Table

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Understanding Enterprise Cloud Governance

Supplier Information Security Addendum for GE Restricted Data

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

CloudDesk - Security in the Cloud INFORMATION

Best Practices for PCI DSS V3.0 Network Security Compliance

SafeNet Authentication Service

Implementation Guide

SRA International Managed Information Systems Internal Audit Report

1 Introduction 2. 2 Document Disclaimer 2

PCI DSS Requirements - Security Controls and Processes

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Protecting Your Organisation from Targeted Cyber Intrusion

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010

Security Overview. BlackBerry Corporate Infrastructure

Enhancing Organizational Security Through the Use of Virtual Smart Cards

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

F G F O A A N N U A L C O N F E R E N C E

McAfee Security Architectures for the Public Sector

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Payment Card Industry Data Security Standard

05.0 Application Development

White Paper. BD Assurity Linc Software Security. Overview

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS

Security Information & Policies

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Ayla Networks, Inc. SOC 3 SysTrust 2015

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Information security due diligence

Central Agency for Information Technology

Supplier IT Security Guide

A Decision Maker s Guide to Securing an IT Infrastructure

VA Office of Inspector General

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Cloud Security Who do you trust?

RMS. Privacy Policy for RMS Hosting Plus and RMS(one) Guiding Principles

Cloud IaaS: Security Considerations

FormFire Application and IT Security. White Paper

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Cloud security architecture

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Security Whitepaper. NetTec NSI Philosophy. Best Practices

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

ADDENDUM TO STATE OF MARYLAND PURCHASES ISSUED UNDER STATE CONTRACT NO. 060B

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

Supplier Security Assessment Questionnaire

VA Office of Inspector General

BYOD Guidance: BlackBerry Secure Work Space

Cloud Computing Governance & Security. Security Risks in the Cloud

Compute Infrastructure as a Service: Recommendations from the Open Data Center Alliance SM and TM Forum A joint perspective on the requirements of

Cisco Advanced Services for Network Security

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Administrative Improvements. Administrative Improvements. Scoping Guidance. Clarifications for Segmentation

WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

March

Transcription:

sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1

Legal Notice This Open Data Center Alliance SM Usage:Provider Assurance is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS WHO ARE NOT OPEN DATA CENTER ALLIANCE PARTICIPANTS: Non-OPEN DATA CENTER ALLIANCE Participants only have the right to review, and make reference or cite, this document. Any such references or citations to this document must give the OPEN DATA CENTER ALLIANCE, Inc. full attribution and must acknowledge the OPEN DATA CENTER ALLIANCE, Inc. s copyright in this document. Such users are not permitted to revise, alter, modify, make any derivatives of, or otherwise amend this document in any way. NOTICE TO USERS WHO ARE OPEN DATA CENTER ALLIANCE PARTICIPANTS: Use of this document by OPEN DATA CENTER ALLIANCE Participants is subject to the OPEN DATA CENTER ALLIANCE s bylaws and its other policies and procedures. OPEN DATA CENTER ALLIANCE SM, ODCA SM, and the OPEN DATA CENTER ALLIANCE logo (SM) are service marks owned by OPEN DATA CENTER ALLIANCE, Inc. and all rights are reserved therein. Unauthorized use is strictly prohibited. Notice This document and its contents are provided AS IS and are to be used subject to all of the limitations set forth herein. Users of this document should not reference any initial or recommended methodology, metric, requirements, or other criteria that may be contained in this document or in any other document distributed by the OPEN DATA CENTER ALLIANCE ( Initial Models ) in any way that implies the user and/or its products or services are in compliance with, or have undergone any testing or certification to demonstrate compliance with, any of these Initial Models. Any proposals or recommendations contained in this document including, without limitation, the scope and content of any proposed methodology, metric, requirements, or other criteria does not mean the OPEN DATA CENTER ALLIANCE will necessarily be required in the future to develop any certification or compliance or testing programs to verify any future implementation or compliance with such proposals or recommendations. This document does not grant any user of this document any rights to use any of the OPEN DATA CENTER ALLIANCE s trademarks. All other service marks, trademarks and trade names referenced herein are those of their respective owners. 2

sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 Executive Summary In many organizations today, there is a significant push towards introducing cloud computing into the enterprise. The hope is that the cloud s multi-tenant, shared infrastructure will enable greater computing efficiency and flexibility. At the same time, organizations require that compute platforms are secure and comply with all relevant rules, regulations and laws. These requirements must be met whether using a dedicated service available via a private cloud or a service shared with other subscribers via a public cloud. There s no margin for error or security breaches. According to a research study conducted by the Ponemon Institute and Symantec, the average organizational cost of a data breach in 2010 increased to $7.2 million, and the cost of lost business was about $4.5 million. It is the high cost of breaches and unclear and inadequate security assurances offered as part of cloud services that pose a barrier to the wider adoption of cloud computing and create resistance within organizations to public cloud services. The Open Data Center AllianceSM recognizes that security is the biggest challenge organizations face as they plan for migration to cloud services. This Usage Model provides standard definitions of security for cloud services, details mechanisms for service providers to demonstrate compliance, and gives organizations the ability to validate adherence to security standards within cloud services. This document serves a variety of audiences. Business decision makers looking for specific solutions, and enterprise IT groups involved in planning, operations, and procurement will find this document useful. Solution providers and technology vendors will benefit from its content to better understand customer needs and tailor service and product offerings. Standards organizations will find the information helpful in defining standards that are open and relevant to end-users. 3

Purpose This Usage Model seeks to define requirements for standardized definitions of security levels within the cloud. Used with the companion Alliance Usage Model on Security Monitoring, it will enable cloud subscribers to: Ensure that a cloud provider meets certain standards and common levels of security Compare security levels between different providers of cloud services and between internally and externally hosted clouds Enable organizations that subscribe to cloud services to make more informed choices on the levels of security they may want to adopt, based on the confidentiality, integrity and availability requirements of their hosted solutions The intent for this Usage Model is to define the security requirements for cloud computing and implement a framework to assure against them. To do this, the Usage Model seeks to define minimum levels for cloud security within tiers. These tiers will provide offerings with increasing levels of security to meet the requirements of organizations that subscribe to cloud services. These levels are: Assurance Levels Level Description Basic Security Enterprise Security equivalent Financial Organization Security equivalent Military Organization Security equivalent Through the use of these assurance standards (i.e., delivering accredited,, or services), the cloud provider will be able to show demonstrable evidence of its security posture. This will then allow the provider to issue templated responses to answer potential customer security concerns. This also will allow a level of trust to be maintained with the customer through the continued accreditation to these standards. It is anticipated that provider of cloud services may be able to self-certify to bronze levels; however, it will be required to undertake third-party certification to assure to the higher levels. The base level requirements defined in the Provider Assurance Model aim to give the provider of cloud services the ability to differentiate their services by offering more than the standard, while giving customers confidence that systems are securely maintained. It is also envisioned that while a provider of cloud services may be certified to levels of security, that provider may also choose to offer lower levels (such as or ) by providing solutions that meet the security requirements for those levels. 4

taxonomy Actor Cloud Subscriber Cloud Provider Cloud Compliance Agency Cloud Standards Body Description A person or organization that has been authenticated to a cloud and maintains a business relationship with a cloud. An organization providing network services and charging cloud subscribers. A (public) cloud provider provides services over the Internet. An accredited entity that is responsible for ensuring the compliance to cloud security standards. A cloud compliance agency may also be a third party trusted by the cloud subscriber. They could then determine and monitor the security state of the cloud provider and respond to the cloud subscriber when requested. An entity responsible for setting and maintaining the cloud security standards as defined in this Usage Model. Usage Model DIAGRAM Accredited Auditor Vendor Assessment(s) Regulatory Assessment(s) Usage Model Assess the Service for Cloud Consumption Cloud-Subscriber Engages Cloud-Provider Assess the Cloud-Provider Decision on Usage Model Usage Model Usage Model Cloud-Provider Provided Attestation(s) Data Sensitivity Assessment(s) Usage Model 5

Usage Model DETAILS Managing risks in interacting with cloud providers requires a process to provide an appropriate assurance level. While a cloud provider may support many levels of assurance, it is the cloud subscriber s responsibility to evaluate its risk appetite and determine the appropriate level of security required. This evaluation may be done by the cloud subscriber when choosing a particular cloud provider or when selecting a security assurance level. This may also be done as part of the negotiation between the cloud subscriber and cloud provider Some examples of security concerns, which may be addressed by progressing to a higher level of security assurance are shown below: Deployment Considerations Level at Which Risks Should Be Diminished Loss of Governance ü Lock In (no standardized data) ü ü ü Isolation Failure ü ü Compliance Risks ü ü Management Interface Compromise ü ü ü Data Protection ü ü Insecure or Incomplete Data Deletion ü ü ü Malicious Insider ü Intercepting Data in Transit ü ü ü ü Distributed Denial of Service ü ü ü Loss of Encryption Keys ü ü Network Breaks ü ü 6

Usage Model Scenarios Goals: To provide standardized definitions of security for cloud-based services so cloud subscribers can better compare and understand different cloud offerings. This will, in turn, increase the efficiencies of managing multiple cloud providers. To give cloud providers the ability to demonstrate compliance to an agreed standard through certification processes maintained by a cloud compliance agency. To give cloud subscribers the ability to validate adherence to cloud security standards either by direct assessment or third-party accreditation. Assumptions: Cloud providers must follow compliance reporting standards as detailed in Open Data Center Alliance Usage: Cloud Security Monitoring. Success Scenario 1 (full): The cloud standards body defines standards and a number of cloud providers gain certification through cloud compliance agencies. Cloud providers advertise services that demonstrate compliance to standards and consistently meet the standards. Failure Condition 1: The cloud provider advertises a higher level of security than actually exists and claims certification when none exists. This leads to the situation where the cloud subscriber purchases services that do not exist and creates significantly greater risk for the cloud subscriber. The cloud provider achieves certification, but then does not maintain the required processes. This means that the cloud subscriber faces a varying level of risk dependent on the level of deviation from the standards. Success Scenario 2 (partial): Failure Condition 2: Failure Handling: The cloud standards body ratifies a number of standards, but no certification processes are established. The cloud provider accepts responsibility to operate to the standards and regularly achieve the required levels. The cloud provider advertises a higher level of security than actually exists and claims to adhere to the standards without achieving it. This leads to a situation where the cloud subscriber purchases services that do not meet the required security level, resulting in significantly greater risk for the cloud subscriber. The cloud provider achieves the required standard when the contract is initiated, but then does not maintain the required processes. This means that the cloud subscriber faces a varying level of risk dependent on the level of deviation from the standards. For all failure scenarios, the monitoring prescribed by the Security Monitoring Usage Model would identify deviations from the standard, thereby allowing the cloud subscriber to take necessary actions to reduce risk. 7

Usage Requirements: Security Proposal for Initial Security Requirements Note: This is not yet an exhaustive list, and it is envisioned that the list will be expanded as the Usage Model matures. Further details to a number of sections are provided below the summary table. Security Requirement Level at Each Capability is Offered Antivirus and malware protection (with definition updates within 24 hours) ü ü ü ü Vulnerability management process exists and is fully tested to ensure no impact to target or application (further details below) Network and firewall isolation of cloud subscriber systems with management as described below ü ü ü ü ü ü ü ü Physical access control into cloud data center ü ü ü ü Secure protocols used for remote administration (e.g., SSL,SSH, RDP, etc.) ü ü ü ü All default passwords and guest access removed ü ü ü ü Mandatory use of non-disclosure agreements (NDAs) for cloud provider staff ü ü ü ü Mandatory use of Information Technology Infrastructure Library (ITIL) processes for change, incident and configuration management ü ü ü ü Identity management for subscriber assets as described below ü ü ü ü Data retention and deletion managed as described below ü ü ü ü Security incident and event monitoring as described below ü ü ü ü Network intrusion prevention; updates applied within 48 hours ü ü ü Event logging for all administration-level events (requires controlled access to logs) ü ü ü Four-eye principle for key administrator changes ü ü ü Cloud provider has an implemented and tested technical continuity plan ü ü ü Fully documented and controlled network ü ü ü Systems must be developed using Secure Software Development Lifecycle Coding Standards ü ü ü 8

Security Requirement Level at Each Capability is Offered Option to perform penetration testing on hosted systems and applications ü ü Physical segmentation of hardware (server, storage, network, etc.) to ensure isolation from all other systems ü ü Encrypted communication between cloud provider and cloud subscriber ü ü Multi-factor authentication ü ü Ability for cloud subscriber to define geographic limits for hosting ü ü Storage encryption at logical unit number (LUN) level ü ü No administrative access for cloud provider staff Strong encryption mandatory for all data in-flight and at rest ü ü Detailed Security Requirements for Assurance Levels Vulnerability Management A vulnerability management process that ensures installation of system and software patches within the targets is identified below. The test process must ensure proper function of the patch and compatibility to the actual target systems with no negative impact on resource utilization (i.e., memory and CPU consumption). Vulnerabilities with a basic Common Vulnerability Scoring System (CVSS) score of greater than 9 (or those rated as High by Microsoft or other vendors) must be patched within 96 hours, and all others within 1 month. Vulnerabilities with a basic CVSS score of greater than 5 (or those rated as Medium or High by Microsoft or other vendors) must be patched within 96 hours; all others within 1 month. Vulnerabilities with a basic CVSS score of greater than 2 (or those rated as Low, Medium, or High by Microsoft or other vendors) must be patched within 96 hours; all others within 1 month. All vulnerabilities must be patched within 24 hours of their release by the vendor. Network and Firewall Isolation Network segregation and firewalls are required to protect all assets managed in the cloud. The level of involvement of the cloud provider in the management of firewall rule sets will vary depending on the level of service offered. The firewall rule sets are managed by the cloud provider with no direct involvement of the cloud subscriber. The firewall rule sets are managed by the cloud provider with changes advised to the cloud subscriber before implementation. The cloud provider should offer network segmentation between logical tiers. 9

The firewall rule sets are managed by the cloud subscriber. Cloud provider retains access to the firewall at administrator level in order to provide system maintenance. The cloud provider must offer network segmentation between logical tiers and should offer Layer-7 protection to prevent application level attacks. Cloud provider has no access to firewalls. All admin tasks including rule updates are managed by the cloud subscriber. The cloud provider must offer network segregation between logical tiers and Layer-7 protection to prevent application level attacks. Identity Management All services in the cloud must be secured by authentication management systems. Basic username and password systems will exist. Passwords may be basic (but must exist) and no requirement for password aging or reuse exists. Basic username and password systems will exist. Strong passwords must be used (e.g., minimum character length of 8 characters, multiple types of characters) and an agreed password aging and reuse policy exists. Service access should support Single Sign-On (SSO) integration using standards-based assertions. System and privileged access must be secured using identity federation or strong authentication (i.e., two-factor authentication). In addition to normal passwords, a second secret must be used: a onetime password or a physical token. Service access must support SSO integration using standards-based assertions. System and privileged access must be secured using identity federation or strong authentication (i.e., twofactor authentication). In addition to normal passwords, a unique biometric password system must be used. Service access must support SSO integration using standards-based assertions. Security Incident and Event Monitoring (SIEM) The cloud provider must ensure that any security-related events are advised to the cloud subscriber. The minimum requirements for each level are listed below. A SIEM process exists and is operated during normal working hours. Responsibility is assigned within the cloud provider organization. Notification of security-related events is forwarded to the cloud provider within 48 hours of the event. A SIEM process exists and is operated 24x7x365. Responsibility is assigned within the cloud provider organization. Notification of security-related events is forwarded to the cloud-provider within 24 hours of the event. Security event forwarding to cloud subscriber system is possible. A SIEM process exists and is operated 24x7x365. A dedicated team exists and is known to the cloud subscriber. Notification of security-related events is forwarded to the cloud provider within 2 hours of the event. Security event forwarding to cloud subscriber system is mandatory (where such a system exists). SIEM is managed by the cloud subscriber. Security events from the cloud provider s environment must also be forwarded. Data Retention and Deletion The cloud provider must ensure that there are adequate controls to support the cloud subscriber s requirements for Information Handling and Data Retention/Deletion. In particular, all data whether transient or fixed remains the property of the cloud subscriber at all times. The minimum requirements for each level are listed below. Data stored on the cloud provider systems must be deleted when instructed by the cloud subscriber (whether through software or any other means). 10

Data stored on the cloud provider systems must be deleted when instructed by the cloud subscriber (whether through software or any other means) and all transient cloud subscriber data tied to a particular user session should be deleted at termination of that session. Cloud subscriber can define retention policies that can be honored by cloud provider process and automation; full and guaranteed disposal of all data/information from systems that are no longer used by cloud subscriber (session-based for dynamically allocated resources and at end of contract for dedicated systems). Cloud subscriber can manage retention policies directly as per their processes (highly automated environment with self-help capabilities provided by cloud provider). Confidentiality The cloud provider must ensure the services offered provide levels of confidentiality dependant on the cloud subscriber s requirements. The minimum requirements for each level are listed below: Public website, no requirement for confidential information (e.g., marketing website). Suitable controls in place for protecting public and private information (e.g., company website including content management portal). Suitable controls in place for protecting public, private or confidential information (e.g., customer relationship management platform). Suitable controls in place for protecting public, private, confidential or highly confidential information (e.g., financial risk modeling product). Integrity and Trust The cloud provider must ensure that adequate and appropriate trust models be established to determine the integrity of assets. Such models must provide immutable verification mechanisms for key systems and software and enable attestable infrastructure for reporting of such configuration information (see supporting Security Monitoring Usage Model). The minimum requirements for each level are listed below. Trusted Root Certificate Authority (CA) may be provisioned by cloud provider or trusted third party; basic integrity verifications by cloud subscriber. Trusted Root CA provisioned by cloud subscriber or trusted third party; could be hosted outside the cloud. If hosted within cloud, it should be hosted on high integrity platform/environment that is verifiable by cloud subscriber, such as a hardware security module (HSM). Reliable integrity checks of static assets. Reliable integrity checks of dynamic assets (configurations, files, etc.). Reliable integrity checks of dynamic assets (configurations, files, etc.). Availability The cloud provider must ensure the services offered provide levels of resiliency dependent on the level requested by the cloud subscriber. The minimum requirements for each level are listed below. The cloud provider made the best effort at security assurance. Cloud provider implemented and tested the Technical Continuity Plan. Cloud provider implemented and tested Technical Continuity Plan. Distributed denial-of-service (DDoS) protection capability available to protect the cloud subscriber s service. Cloud provider implemented and tested Technical Continuity Plan. DDoS protection capability available to protect the cloud subscriber s service. 11

RFP Requirements Following are requirements that the Alliance believes should be included in requests for proposal to cloud providers to ensure that security requirements are met according to four support levels (bronze, silver, gold, and platinum). ODCA Principle Requirement Solution is open, works on multiple virtual and non-virtual infrastructure platforms, and is standards-based. Describe how the solution meets this principle and any limitations it has in meeting these goals. ODCA Security Provider Assurance Usage Model 1.1 Solution must allow assurance levels to be represented and tracked in the SIEM and compliance monitoring tools. ODCA Security Provider Assurance Usage Model 1.1 Solution must be able to support the following security requirements by support level 1 : level must be able to provide all of the following: Antivirus and malware protection (with definition updates within 24 hours) Vulnerability management process exists and is fully tested to ensure no impact to target or application Network and firewall isolation of Cloud-Subscriber systems with management Physical access control into cloud data center Secure protocols used for remote administration (e.g., SSL, SSH, RDP, etc.) All default passwords and guest access removed Mandatory use of non-disclosure agreements (NDAs) for cloud provider staff Mandatory use of Information Technology Infrastructure Library (ITIL) processes for change, incident, and configuration management Identity management for subscriber assets Data retention and deletion management Security incident and event monitoring level must be able to provide all of the security requirements for level, plus the following: Network intrusion prevention; updates applied within 48 hours Event logging for all administration-level events (requires controlled access to logs) Four-eye principle for key administrator changes Cloud provider has an implemented and tested technical continuity plan Fully documented and controlled network Systems must be developed using Secure Software Development Lifecycle Coding Standards level must be able to provide all of the security requirements for level, plus the following: Option to perform penetration testing on hosted systems and applications Physical segmentation of hardware (server, storage, network, etc.) to ensure isolation from all other systems Encrypted communication between cloud provider and Cloud-Subscriber Multi-factor authentication 1 Note: These security requirements are current as of February 21, 2012. Please refer to the ODCA Security Monitoring Usage Model for updates before making any changes to RFP requirements. 12

Ability for Cloud-Subscriber to define geographic limits for hosting Storage encryption at logical unit number (LUN) level level must be able to provide all of the security requirements for level, plus the following: No administrative access for cloud provider staff Strong encryption mandatory for all data in-flight and at rest ODCA Security Provider Assurance Usage Model 1.1 Solution must be able to provide clear guidance to allow a cloud subscriber to make an informed choice on the security level they require for their solution. ODCA Security Provider Assurance Usage Model 1.1 Solution must be able to protect the cloud subscribers information both in transit and at rest. For further assistance in developing an RFP, please use this online engine: http://www.opendatacenteralliance.org/ourwork/ proposalengineassistant Summary of Industry Actions Required In the interest of giving guidance on how to create and deploy solutions that are open, multi-vendor and interoperable, we have identified specific areas where the Alliance believes there should open specifications, formal or defacto standards or common intellectual propertyfree (IP-free) implementations. Where the Alliance has a specific recommendation on the specification, standard or open implementation, it is called out in this Usage Model. In other cases, we will be working with the industry to evaluate and recommend specifications in future releases of this document. The following are industry actions required to refine this Usage Model: 1. Cloud providers and other interested parties requested to submit input on proposed criteria at each level (,,, ). 2. Cloud providers requested to submit early implementations of this framework for consideration. 13