SlideShare a Scribd company logo
1 of 12
Cloud Computing Security
Government Acquisition Considerations for the Public Cloud
Computing Environments




by
Karen Mercedes Goertzel
goertzel_karen@bah.com
Holly Lynne M. Schmidt
schmidt_holly_lynne@bah.com
Theodore Winograd
winograd_theodore@bah.com
Kristy Mosteller
mosteller_kristy@bah.com
Table of Contents


Cloud Computing Security ................................................................................................... 1

Introduction ....................................................................................................................... 1

Purpose ............................................................................................................................ 1

Exclusions ......................................................................................................................... 1

Security Considerations in Government Acquisition of Public Cloud Services ........................... 1

Relevant Acquisition Security Policy and Guidance ................................................................ 2

Supplier Selection .............................................................................................................. 2

Candidate Supplier Identification ......................................................................................... 2

Criteria for Choosing From Among Candidate Vendors ........................................................... 4

Service–Level Agreements .................................................................................................. 5

Standard Vendor Service–Level Agreements and Their Negotiability ........................................ 5

Quality of Service and Quality of Protection Concerns ............................................................ 7

Conclusion......................................................................................................................... 7

About the Authors .............................................................................................................. 8

About Booz Allen ................................................................................................................ 9

Principal Offices ............................................................................................................... 10
Cloud Computing Security
Government Considerations for the Cloud Computing Environment

Introduction                                                     (MA) challenges public CCEs pose and how accounting
Cloud computing is not a new technology or even a                for those risks through acquisition security measures
new computing paradigm. It is an umbrella term for a             may affect public CCE options. It discusses security
conceptual framework through which existing technologies,        and risk management factors the Government should
capabilities, computing concepts, provisioning, and charge-      consider before acquiring public cloud services. For
back approaches are more smoothly coordinated and                example, it outlines security criteria for evaluating
integrated—often in ways that provide value far beyond           different public CCEs and vendors, as well as the
each component in isolation. The “cloud” can also be seen        abilities and limitations of service-level agreements
as an abstraction mechanism, interposing one or more             (SLA) and memoranda of agreement (MOA) with regard
layers between the user and the systems that provide             to risk.
computing services and resources. These abstraction
layers reduce or eliminate the end user’s need to operate        Exclusions
the mechanisms that make those services and resources            The focus of this paper is solely on government
accessible. Nevertheless, these same abstraction layers          acquisition and use of public cloud services. This
can make it difficult for the user to have any visibility into   paper does not address security issues associated
what happens to data or applications located “in the cloud.”     with government organizations’ implementation of
                                                                 private clouds or participation in community clouds
It is possible for U.S. government organizations to migrate      operated by government agencies (e.g., Defense
desired services to a public cloud computing environment         Information Systems Agency [DISA], National
(CCE), but doing so requires that CCE consumers have a           Aeronautics and Space Administration [NASA],
strong understanding of cloud technology’s capabilities          Department of the Interior [DOI]).
and limitations, evolving government security policies, and
how an organization’s security policies can be implemented       Security Considerations in Government
and enforced while using a public CCE—as well as a               Acquisition of Public Cloud Services
comprehensive transition methodology, such as Booz               Organizations must assess the viability of their
Allen Hamilton’s Cloud Computing transition Framework            infrastructure to adopt cloud-based services and
(C3F). An organization should have a planning effort that        should use a solid transition methodology that
includes all acquisition and cloud expertise necessary,          encompasses the transformation lifecycle. Through a
along with a clear realization that security is more than just   strategic diagnostics session, the assessment should
a compliance activity. As they would with all responsible        consider drivers, pain points, capabilities, stakeholders,
risk management decisions, government organizations              mission risks, federal continuity compliance, continuity
should avoid allowing cost considerations to trump security      of operations planning (COOP), IT infrastructure
considerations when deciding whether to acquire public           resilience, and critical infrastructure protection. An
cloud services, which type(s) of cloud services to acquire,      acquisition will only be successful if the acquired
and which cloud vendor(s) to trust with their data.              service fully meets the organization’s objectives. To
                                                                 this end, Booz Allen developed the C3F to support
Purpose                                                          organizations migrating to the cloud.1 An understanding
This paper is intended to help the reader understand             of relevant acquisition security policy and guidance will
the information assurance (IA) and mission assurance             also help organizations carefully consider the impact of
                                                                 1 “Cloud Computing: A Transition Methodology.” Accessed 20 September 2009 at http://
                                                                 www.boozallen.com/media/file/cloud-computing-transition-methodology.pdf




                                                                                                                                                        1
transitioning assets from their current IT infrastructure                               the effective and secure use of the technology in
    to a public CCE.                                                                        government and industry through technical guidance
                                                                                            and cloud computing standards.2
    Once an organization has fully analyzed and captured
    its CCE vision and strategy to transition its assets to
                                                                                            Supplier Selection
    the CCE, it can then assess its intellectual capital (IC)
    portfolio for CCE provider candidates and evaluate its                                  Candidate Supplier Identification
    options against the strategic diagnostic’s findings by                                  Depending on the type of service desired, organizations
    identifying suppliers, pinpointing and leveraging criteria                              can choose from a wide range of cloud vendors—as
    to assess candidate suppliers, and assessing supplier                                   well as vendors that offer cloud services but do not
    accountability through SLAs or MOAs. These actions will                                 distinguish themselves as cloud vendors (e.g., hosting
    promote provider transparency and ensure organizations                                  companies offering infrastructure as a service [IaaS]
    understand the protections afforded their data.                                         or platform as a service [PaaS]). One important aspect
                                                                                            for organizations to consider when selecting a cloud
    Relevant Acquisition Security Policy and                                                vendor is that the concept of cloud services that meet
    Guidance                                                                                government regulations or specific customer-driven
    Although the component services that comprise the                                       security and privacy requirements is relatively new.
    cloud (e.g., time-sharing services, virtual machine                                     Although current cloud SLAs tend to focus specifically
    hosting) are not new technologies, there is little                                      on reliability and geographic location of data,3 it is
    security-relevant acquisition, policy, or guidance                                      likely that cloud vendors will follow in the footsteps
    language for such services within the Federal                                           of other service providers in introducing language to
    Government. For that reason, there is little language                                   assuage security and privacy concerns.
    available for reinterpretation and adaptation to public
    cloud use. Section 4.1 of Department of Defense                                         Public IaaS Vendors
    Directive (DoDD) 8100.02, Use of Commercial
    Wireless Devices, Services, and Technologies in the
                                                                                            Exhibit 1 | Examples of IaaS Applications
    Department of Defense (DoD) Global Information Grid
    (GIG), provides a number of security mandates to
    which any commercial wireless devices or networks
                                                                                                                           Iaas Vendors
    integrated with or connected to a DoD network must                                                 Amazon Web Services (AWS)
    conform. Although a public CCE cannot be considered                                                Engine Yard
    a wireless network, the concepts within DoDD 8100.02                                               Joyent
    are relevant to any commercial network or devices                                                  Mosso
    connecting to DoD networks; it may be useful for                                                   FlexiScale
    government planners to review DoDD 8100.02 for                                                     GoGrid
    language that can be adapted into a policy governing                                               ElasticHosts
    DoD public cloud use.                                                                              Terremark
    The National Institute of Standards and Technology                                                 Savvis
    (NIST) has published the Draft NIST Working Definition
    of Cloud Computing v15 and Presentation on
    Effectively and Securely Using the Cloud Computing                                      Infrastructure comprises the hardware, networking,
    Paradigm v25. NIST is also planning to publish cloud                                    and operating systems that run the foundation of an
    computing guidance, including security guidance, for                                    information system. This infrastructure includes fiber
    federal agencies. This guidance will aim to promote                                     optic cables, hard drives, servers, and usually an
    2 Peter Mell, “Cloud Computing,” Computer Security Division, NIST. Accessed 27 August   3 “Will Microsoft Shake Up Cloud Computing SLAs?” J. Nicholas Hoover,
    2009 at http://csrc.nist.gov/groups/SNS/cloud-computing/                                InformationWeek, 30 October 2008. Accessed 15 July 2009 at: http://www.informa-
                                                                                            tionweek.com/cloud-computing/blog/archives/2008/10/will_microsoft_2.html


2
operating system. From the perspective of a software        virtual operating system presented to the customer.
developer, this infrastructure runs the code that           The customer may place additional software-based
produces the screens, data, and workflows the end           controls on the virtual server (provided the controls
users interact with, but the infrastructure is not the      do not violate the cloud vendor’s terms of use) to help
code itself. In short, IaaS abstracts a particular type     secure organizational data and processes that will be
of hardware with a stack (e.g., Windows, Linux, other       hosted on the cloud.
operating system), as well as one or two databases
and networking support.                                     Public PaaS Vendors
                                                            A cloud PaaS—which is the delivery of a computing
The basic principle on which IaaS stands is the
                                                            platform and/or solution stack as a service—facilitates
multiplexing of resources among many users to
                                                            the deployment of applications without the cost and
increase average utilization. Users are able to allocate
                                                            complexity of buying and managing the underlying
and de-allocate virtual servers from a virtual pool on
                                                            hardware and software layers.
demand, providing users with elasticity that is generally
unavailable in traditional computing models. To support     It is important to note that, as with IaaS vendors, the
IaaS, organizations agree to have their virtual servers     cloud vendor provides the security controls in place
potentially co-located with other organizations’ servers    below the base platform and APIs presented to the
on the same physical platform—this is similar in            customer. The customer may place additional software-
concept to virtual servers that can be provisioned from     based controls on the application or service to help
commercial hosting providers. Although the logical          secure organizational data and processes that will be
separation provided by the IaaS vendor is usually           hosted on the cloud. For example, the web application
sufficient, the act of co-locating data on a single         or service can be developed to process anonymous or
physical platform may make it a more valuable target        generic data that can be correlated to the original data
for attackers.                                              when it is returned to the organization’s boundary.

It is important to note that although the cloud vendor
provides some security controls, these controls are
only at the infrastructure level, conceptually below the



Exhibit 2 | Examples of PaaS Applications


      PaaS Vendors           Description
     Google App Engine      Provides the base platform and application programming interfaces (API) for
                            developing and deploying Python and Java-based web applications and web
                            services
     Microsoft Azure        Provides the base platform and APIs for developing and deploying .NET-based web
                            applications and web services
     Morph                  Provides the Morph Application Platform for developing web applications
     Heroku                 Provides the base platform and APIs for developing and deploying Ruby on Rails-
                            based web applications and web services
     Bungee                 Provides an IDE and platform for developing and deploying web applications and
                            web services




                                                                                                                       3
Public Software as a Service (SaaS) and Data as a
    Service (DaaS)4 Providers


    Exhibit 3 | Examples of SaaS Applications


                 PaaS Vendors                         Description
                Google Apps                         Offers a suite of office products through the cloud for customers to use
                AWS                                 Offers a number of service APIs that can be used to extend the capabilities of an
                                                    organization’s software
                SAP                                 Provides the same functionality as its commercial off-the-shelf (COTS) offering
                                                    through a subscription model via the cloud
                Salesforce.com                      Provides the same functionality as its COTS offering through a subscription model
                                                    via the cloud
                Microsoft Azure                     Offers a number of service APIs that can integrate with both thin and thick clients
                                                    on users’ computers



    A cloud SaaS leverages the cloud in software                                              protect the entire software stack. With SaaS and DaaS
    architecture, often eliminating the need to install                                       services in particular, cloud vendors may be unwilling
    and run the application on the customer’s own                                             to modify their security practices, particularly when
    computer and thus alleviating the burden of software                                      a COTS version of the software in the SaaS or DaaS
    maintenance, ongoing operation, and support. A cloud                                      service offering can be deployed and secured at a
    SaaS includes “products, services and solutions that                                      customer’s organization.
    are delivered and consumed in real-time over the
    Internet,”5 such as web services (“software system[s]                                     Security Concerns Common Across All Cloud Services
    designed to support interoperable machine-to-machine                                      The primary concern associated with cloud offerings
    interaction over a network”6). Other cloud computing                                      is that customer data is stored offsite at the vendor’s
    components, software (e.g., software plus services),                                      data centers and therefore must be protected
    or end users may directly access a SaaS. Cloud data                                       by the vendor’s security controls. An additional
    storage services (DaaS) involve the delivery of data                                      concern with cloud offerings is that the data from
    storage as a service, including database-like services.                                   multiple customers is potentially co-located in one
    DaaS is often billed on a utility computing basis (e.g.,                                  facility—increasing the value of the data stored at
    per gigabyte per month).                                                                  the center. Although many vendors provide customers
                                                                                              thorough descriptions of their existing security
    It is important to note that the cloud vendor provides
                                                                                              controls, few vendors—if any—allow customers to
    the security controls in place for the entire software
                                                                                              perform a detailed audit of their security controls and
    stack presented to the customer. The customer may
                                                                                              standards. In addition, few cloud vendors are willing to
    place additional controls between the user and the
                                                                                              modify their security controls for cloud offerings at a
    application (i.e., anonymizing data before submitting it
                                                                                              customer’s request.
    to the service) to help secure organizational data and
    processes that will be hosted on the cloud. However,
                                                                                              Criteria for Choosing From Among Candidate Vendors
    for SaaS and DaaS offerings, organizations must trust
                                                                                              As with selecting a supplier for any IT service, the
    that the vendor’s security controls are sufficient to
                                                                                              first and foremost criterion for provider selection
    4 NIST does not formally recognize the terminology “Data as a Service (DaaS)” as a        5 “Defining ‘Cloud Services’ and ‘Cloud Computing,’” Frank Gens, IDC eXchange, 23
    defined service in its cloud computing documentation; however, it is phrased as such in   September 2008. Accessed 15 July 2009 at: http://blogs.idc.com/ie/?p=190
    this paper for consistency and ease of readability                                        6 “Web Services Glossary,” Hugo Haas, W3C and Allen Brown, Microsoft, W3C, 11
                                                                                              February 2004. Accessed 15 July 2009 at http://www.w3.org/TR/ws-gloss/

4
must be whether the vendor meets the organization’s         recognize a need to meet their customers halfway in
needs. For example, one CCE provider may be willing         order for widespread public CCE adoption to occur.
to provide security controls that exceed customer           For example, Amazon has begun offering “virtual
requirements while also allowing the organization to        private cloud” services that combine the outsourcing
audit the provider’s security practices, but the services   advantages of the public cloud with increased
offered by the provider may not fit correctly with the      customer visibility, control, and service tailoring (at a
organization’s business processes or expectations. In       cost higher than that of Amazon’s fully public Elastic
such situations, simply choosing a CCE provider based       Compute Cloud [EC2] cloud service). But for many
on the security and privacy assurances it provides          customers, the perceived cost savings associated
would not meet the needs of the organization.               with using public CCEs offered under less-than-ideal
                                                            standard SLA terms will outweigh the potential losses
As with any acquisition, it may be necessary to make
                                                            associated with the increased risk that accompanies
some compromises in terms of requirements to meet
                                                            the acceptance of such terms.
the organization’s needs—but it is of utmost importance
that such decisions are made with a full understanding      The key to success is setting realistic expectations
of their potential consequences. When choosing              from the outset so that all stakeholders in the
between candidate suppliers, it is important to use         acquiring organization understand the exact level of
security and auditing practices as distinguishing factors   service their public cloud provider is willing to provide.
in addition to price, performance, and other factors.       If the SLA meets the performance/availability/reliability
                                                            (PAR) needs of the organization, the cost-benefit
Service–Level Agreements                                    analysis is usually clear (keeping in mind that PAR
SLAs represent both a source of security risk in            must explicitly include all of the customer’s security
public CCEs and a means of addressing security              considerations). If the SLA falls short, organizations
risk. The SLA is the main means by which the cloud          should factor the quantified level of risk associated
consumer can mitigate the security risks that this shift    with the shortfall into the cost-benefit equation.
of operational responsibility engenders. To address
the consumer’s lack of visibility, lack of control, and     Standard Vendor Service-Level Agreements and Their
lack of accountability, the SLA can explicitly state the    Negotiability
security requirements of the cloud customer, including      SLAs are not a new concept for service providers or
requirements for service quality and availability, MA,      the customers that purchase them. Customers should
data confidentiality and privacy, data and software         apply the same SLA standards in a CCE that they
integrity, incident response, vulnerability management,     would in an outsourcing requirement. When entering
and problem resolution.                                     the tenuous nature of the cloud, however, customers
                                                            must be increasingly vigilant in assessing their needs,
As providers of a “commodity” service, many public
                                                            what they are or are not willing to negotiate, and
CCE providers tend to standardize their SLAs for all of
                                                            the price they are willing to pay for guarantees and
their customers. SLA standardization can introduce risk
                                                            assurances. As a customer, the key is to annotate the
by failing to address and accommodate the specific
                                                            organization’s nonnegotiable needs as the baseline
security requirements of individual customers. In the
                                                            price point and proceed from there. At a minimum,
absence of an SLA that satisfies all of a customer’s
                                                            the SLA should include details about asset ownership,
requirements, that customer will need to negotiate
                                                            downtime, customer service, and pricing. Organizations
with the provider to tailor the SLA to satisfy the
                                                            should be familiar with common language used in the
organization’s needs; otherwise, the organization will
                                                            CCE, as well as standard SLA language. Combined,
need to find alternative means by which to minimize
                                                            this language creates an agreement that may differ
residual risk. Some of the leading public CCE providers




                                                                                                                         5
from an organization’s understanding of typical SLA                                  information must be made available to substantiate
    terminology. Larger scale providers typically use more                               the provider’s claim for compensation.
    generic language to encompass broader capabilities
                                                                                         This point is particularly true in developing an SLA. If
    and to relieve the organization’s (i.e., the customer’s)
                                                                                         the organization’s infrastructure is regularly adjusting
    responsibility. It is the organization’s responsibility
                                                                                         to meet demands, it is essential to be able to verify
    to ensure the SLA expressly identifies and defines
                                                                                         that the infrastructure is reacting the way that was
    specific issues and desired services.
                                                                                         contracted.7 To complicate matters further, CCEs—
                                                                                         which are innately self-service and on demand—create
    Data Ownership and Control
                                                                                         a plethora of data to be maintained and filtered. For
    Organizations should ensure the SLA clearly defines
                                                                                         this reason, SLAs with providers should explicitly state
    who has access to the data and the protections that
                                                                                         that real-time auditing or logging (for accountability)
    are in place. The customer’s data and IT managers will
                                                                                         will be performed and resulting reports will be
    need to understand how the provider’s infrastructure
                                                                                         made accessible to customers. A tailored audit can
    and services are used to provide persistent access
                                                                                         provide the customer a clear understanding of where
    to needed applications and data sets. Continuity is
                                                                                         responsibilities lie.
    important. In a perfect world, a vendor could guarantee
    access 100 percent of the time, but, in reality, a
                                                                                         Compliance Environments
    guarantee like that is impossible. The customer’s
                                                                                         Compliance environments cited by experts as
    legal department needs to understand the differences
                                                                                         important for cloud computing include Statement on
    between common SLA terms such as “average
                                                                                         Auditing Standard (SAS) 70, Payment Card Industry
    configuration downtime” or “network downtime” versus
                                                                                         Data Security Standards (PCI DSS), and the Health
    “systems downtime.” Organizations should also have
                                                                                         Insurance Portability and Accountability Act (HIPAA).
    a clear definition of who owns the data and should
                                                                                         In particular, experts cite the section in SAS 70 on
    consider self-protecting data options as necessary.
                                                                                         Service Organizations issued by the Auditing Standards
                                                                                         Board of the American Institute of Certified Public
    Auditing and Accountability
                                                                                         Accountants (AICPA). Basically stated, the vendor
    Although most cloud providers will record access to the
                                                                                         managing the cloud must be able to describe what is
    system in specified log files, gaining access to audit
                                                                                         happening, where the information comes in, what the
    logs can be a difficult process. In some instances, the
                                                                                         vendor does when it gets the information, how it gets
    cloud provider’s logs may be insufficient for a particular
                                                                                         back to the users, the controls over the processing of
    organization’s needs. To this end, organizations are
                                                                                         the data, and, most importantly, what is happening to
    often forced to run their production applications on
                                                                                         the data when it gets to the cloud.
    an implicit SLA that is usually interpreted as a simple
    equation of receiving X units of service for N price.                                Although many public CCE providers have SAS 70
    Unfortunately, this implicit SLA does not address the                                or even PCI compliance, many do not fully address
    scalability of an organization’s resources based on                                  NIST Special Publication (SP) 800-53, Recommended
    changes in demand. Auditing becomes another key                                      Security Controls for Federal Information Systems and
    factor in assessing the organization’s true needs and                                Organizations. SP 800-53 outlines the security controls
    being able to meet ever-changing demands in service.                                 expected of federal government organizations. Although
    Instead of accepting what the CCE provider sends                                     many cloud providers lack a full understanding of
    the organization at the end of the month as a bill, an                               recommended security controls, some cloud providers
    organization should understand that cloud computing                                  trying to pursue the government market are adequately
    is complex enough that a reasonable set of runtime                                   complying with NIST SP 800-53. When assessing a
                                                                                         provider, organizations should consider the following:
    7 “Auditing the Cloud,” Rich Wellner, Grid Gurus, 20 October 2008. Accessed 2 July
    2009 at http://gridgurus.typepad.com/grid_gurus/2008/10/auditing-the-cl.html



6
Is the provider familiar with federal requirements? Are                                   Conclusion
the security controls the CCE provider is responsible                                     Public CCEs are a potentially viable option for
for compliant? How does the CCE provider display                                          government organizations as an alternative
evidence of compliance? How is compliance                                                 to government ownership and operation of IT
maintained?                                                                               infrastructure and systems. However, government
                                                                                          agencies must recognize that many security-related
Quality of Service and Quality of Protection Concerns                                     issues surround such a move. Before a government
Public cloud service SLAs must account for at least                                       organization migrates some or all of its data to
two vendors: (1) the cloud service provider and (2)                                       a public CCE, it must have a clear grasp of cloud
the communications vendor that provides the circuit                                       technology and emerging government policies, as well
by which the customer accesses the cloud service.                                         as a comprehensive transition methodology, such
This dual-provider scenario adds complexity to not                                        as Booz Allen’s C3F. Moreover, it must realize that
only the SLA language but also the ability to hold                                        public CCE providers may not meet federal standards
vendors accountable (and legally liable) for failures.                                    for security controls and may not be able to provide
In addition, organizations must acknowledge that all                                      government organizations the requisite security
service providers will experience downtime at some                                        measures. Government acquirers of public CCEs need
point because of situations beyond their control,                                         to be fully aware of the security risks associated with
including natural disasters and interruptions in the                                      the different public cloud service operating models
public infrastructure. Most service providers offer an                                    (e.g., IaaS, PaaS, SaaS), as well as how the use of a
assurance of 99.5-percent uptime. Even with expected                                      particular model will affect the organization’s ability to
legalese, a provider can make a reasonable attempt to                                     maintain its mission.
guarantee an acceptable level of service.
                                                                                          As a cloud technology expert with deep knowledge
With that in mind, the real question becomes the                                          of related government standards, Booz Allen can
following: What happens when service is interrupted?8                                     help clients navigate the new and complex cloud
Some providers have established mechanisms to assist                                      environment. Booz Allen addresses the challenges
organizations in assessing the quality of service (QoS)                                   of the public cloud with an objective understanding
they are receiving and to inform organizations of any                                     of the security issues the cloud presents. To fully
potential downtime or service disruptions. Although                                       address all facets of a potential move to the cloud,
these mechanisms do not mitigate the actual loss of                                       Booz Allen offers the C3F to address the need for
time or data, they can be used to prepare preventative                                    government organizations to have a trusted, unbiased
and contingency measures after an SLA has been                                            advisor on their side as they determine whether to
established. The bottom line in addressing sustainment                                    take this next step in computing. Through the C3F,
issues is an organization’s ownership of risk. Using                                      Booz Allen’s consultants assist organizations with
available resources to monitor the health of a provider’s                                 mission assessment, potential solution evaluation,
service capabilities (as available) is one viable option;                                 requirements development, vendor selection, and,
however, if an organization is clear in its expectations                                  ultimately, acquisition. Booz Allen can also help
early on and develops appropriate SLA language, it will                                   organizations ensure their provider SLAs and MOAs are
enjoy greater business continuity assurance.                                              comprehensive and will protect them in any situation.
                                                                                          With appropriate security-aware acquisition practices,
                                                                                          government customers of public cloud services can
                                                                                          decrease their security risks by moving to the cloud.



8 “What to look for in a cloud computing SLA,” Frank Ohlhorst, SearchCIO, 16 June 2009.
Accessed 9 July 2009 at http://searchcio.techtarget.com.au/articles/33073-What-to-look-
for-in-a-cloud-computing-SLA


                                                                                                                                                       7
About the Authors
    Karen Mercedes Goertzel, CISSP, is an Associate in      Theodore Winograd, CISSP, is an Associate in Booz
    Booz Allen Hamilton’s McLean office and currently       Allen Hamilton’s McLean office. He specializes in
    leads the firm’s security research service. She is a    information and software assurance, concentrating on
    subject matter expert in software security and safety   service-oriented architecture and, more recently, cloud
    assurance, cyber security, information assurance, and   computing technologies.
    software system survivability.
                                                            Kristy Mosteller is an Associate in Booz Allen
     Holly Lynne M. Schmidt, SSCP, CSSLP, is an             Hamilton’s One Dulles office. She specializes in
    Associate in Booz Allen Hamilton’s McLean office.       system security engineering development and delivery,
    She specializes in application security; system/        concentrating on security management, information
    software assurance; and security policy, law, and       technology, and operations risk analysis.
    regulation. She has performed research, analysis,
    and development of reports, guidance, and policy for
    various government clients.




    Contact Information:

    Karen Mercedes Goertzel,      Holly Lynne M. Schmidt,       Theodore Winograd,          Kristy Mosteller
    CISSP                         SSCP, CSSLP                   CISSP
    Associate                     Associate                     Associate                   Associate
    goertzel_karen@bah.com        schmidt_holly_lynne@bah.com   author@bah.com              author@bah.com
    703/698-7454                  703/377-5547                  703/377-5544                703/984-7085
8
About Booz Allen
Booz Allen Hamilton has been at the forefront of            technology, systems engineering, and program
strategy and technology consulting for 95 years. Every      management, Booz Allen is committed to delivering
day, government agencies, institutions, corporations,       results that endure.
and not-for-profit organizations rely on the firm’s
                                                            With more than 22,000 people and $4.5 billion in
expertise and objectivity, and on the combined
                                                            annual revenue, Booz Allen is continually recognized for
capabilities and dedication of our exceptional people
                                                            its quality work and corporate culture. In 2009, for the
to find solutions and seize opportunities. We combine
                                                            fifth consecutive year, Fortune magazine named Booz
a consultant’s unique problem-solving orientation with
                                                            Allen one of “The 100 Best Companies to Work For,”
deep technical knowledge and strong execution to help
                                                            and Working Mother magazine has ranked the firm
clients achieve success in their most critical missions.
                                                            among its “100 Best Companies for Working Mothers”
Providing a broad range of services in strategy,
                                                            annually since 1999.
operations, organization and change, information




To learn more about the firm and to download digital versions of this article and other Booz Allen Hamilton
publications, visit www.boozallen.com.




                                                                                                                       9
Principal Offices
ALABAMA                                  KANSAS                                  OHIO
Huntsville                               Leavenworth                             Dayton
CALIFORNIA                               MARYLAND                                PENNSYLVANIA
Los Angeles                              Aberdeen                                Philadelphia
San Diego                                Annapolis Junction
San Francisco                            Lexington Park                          SOUTH CAROLINA
COLORADO                                 Linthicum                               Charleston
Colorado Springs                         Rockville                               TEXAS
Denver
                                         MICHIGAN                                Houston
FLORIDA                                  Troy                                    San Antonio
Pensacola
Sarasota                                 NEBRASKA                                VIRGINIA
Tampa                                    Omaha                                   Arlington
                                                                                 Chantilly
GEORGIA                                  NEW JERSEY                              Falls Church
Atlanta                                  Eatontown                               Herndon
HAWAII                                                                           McLean
Honolulu                                 NEW YORK                                Norfolk
                                         Rome                                    Stafford
ILLINOIS
O’Fallon                                                                         WASHINGTON, DC




The most complete, recent list of offices and their and addresses and telephone numbers can be found on
www.boozallen.com by clicking the “Offices” link under “About Booz Allen.”


www.boozallen.com                                                                           ©2009 Booz Allen Hamilton Inc.

                                                                                                              08.111.09

More Related Content

What's hot

Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?Gabe Akisanmi
 
Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011Redspin, Inc.
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperMartin Ruubel
 
Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?Gabe Akisanmi
 
2013 global security report
2013 global security report2013 global security report
2013 global security reportYury Chemerkin
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up EMC
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010thaiantivirus
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...Dana Gardner
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
Improving cyber-security through acquisition
Improving cyber-security through acquisitionImproving cyber-security through acquisition
Improving cyber-security through acquisitionChristopher Dorobek
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challengespaperpublications3
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...Manish Sahani
 
The Economic Impact of File Virtualization
The Economic Impact of File VirtualizationThe Economic Impact of File Virtualization
The Economic Impact of File VirtualizationFindWhitePapers
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guideYury Chemerkin
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 

What's hot (20)

J3602068071
J3602068071J3602068071
J3602068071
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?
 
Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
 
Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?
 
2013 global security report
2013 global security report2013 global security report
2013 global security report
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
Information Security Shake-Up
Information Security Shake-Up  Information Security Shake-Up
Information Security Shake-Up
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
Improving cyber-security through acquisition
Improving cyber-security through acquisitionImproving cyber-security through acquisition
Improving cyber-security through acquisition
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Research Report on Preserving Data Confidentiality & Data Integrity in ...
Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...Research Report on Preserving  Data  Confidentiality  &  Data  Integrity  in ...
Research Report on Preserving Data Confidentiality & Data Integrity in ...
 
The Economic Impact of File Virtualization
The Economic Impact of File VirtualizationThe Economic Impact of File Virtualization
The Economic Impact of File Virtualization
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
 
Citrix security booklet
Citrix security bookletCitrix security booklet
Citrix security booklet
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 

Similar to Cloud Computing Security: Government Acquisition Considerations for the Cloud Computing Environment

Information Security Governance: Government Considerations for the Cloud Comp...
Information Security Governance: Government Considerations for the Cloud Comp...Information Security Governance: Government Considerations for the Cloud Comp...
Information Security Governance: Government Considerations for the Cloud Comp...Booz Allen Hamilton
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and ServicesIOSR Journals
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud securityArun Gopinath
 
Ast 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAst 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAccenture
 
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...SafeNet
 
Pillars Of Cloud Computing: Decoding The Fundamentals
Pillars Of Cloud Computing: Decoding The FundamentalsPillars Of Cloud Computing: Decoding The Fundamentals
Pillars Of Cloud Computing: Decoding The FundamentalsCiente
 
Exploring Cloud Deployment Models for 2023.pdf
Exploring Cloud Deployment Models for 2023.pdfExploring Cloud Deployment Models for 2023.pdf
Exploring Cloud Deployment Models for 2023.pdfCiente
 
Three Strategies to Accelerate Your Agency's Migration to the Cloud
Three Strategies to Accelerate Your Agency's Migration to the CloudThree Strategies to Accelerate Your Agency's Migration to the Cloud
Three Strategies to Accelerate Your Agency's Migration to the CloudGov BizCouncil
 
Exploring Cloud Deployment Models for 2023.pdf
Exploring Cloud Deployment Models for 2023.pdfExploring Cloud Deployment Models for 2023.pdf
Exploring Cloud Deployment Models for 2023.pdfCiente
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhShah Sheikh
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesIJCSIS Research Publications
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docxcherry686017
 
10 Lessons Learned from Cloud Offerings
10 Lessons Learned from Cloud Offerings10 Lessons Learned from Cloud Offerings
10 Lessons Learned from Cloud OfferingsVishal Sharma
 

Similar to Cloud Computing Security: Government Acquisition Considerations for the Cloud Computing Environment (20)

Information Security Governance
Information Security GovernanceInformation Security Governance
Information Security Governance
 
Information Security Governance: Government Considerations for the Cloud Comp...
Information Security Governance: Government Considerations for the Cloud Comp...Information Security Governance: Government Considerations for the Cloud Comp...
Information Security Governance: Government Considerations for the Cloud Comp...
 
Requirements and Challenges for Securing Cloud Applications and Services
Requirements and Challenges for Securing Cloud Applications  and ServicesRequirements and Challenges for Securing Cloud Applications  and Services
Requirements and Challenges for Securing Cloud Applications and Services
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Ccsw
CcswCcsw
Ccsw
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Strategies for assessing cloud security
Strategies for assessing cloud securityStrategies for assessing cloud security
Strategies for assessing cloud security
 
Ast 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_securityAst 0064255 strategies-for_assessing_cloud_security
Ast 0064255 strategies-for_assessing_cloud_security
 
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
 
Pillars Of Cloud Computing: Decoding The Fundamentals
Pillars Of Cloud Computing: Decoding The FundamentalsPillars Of Cloud Computing: Decoding The Fundamentals
Pillars Of Cloud Computing: Decoding The Fundamentals
 
3822424.ppt
3822424.ppt3822424.ppt
3822424.ppt
 
Exploring Cloud Deployment Models for 2023.pdf
Exploring Cloud Deployment Models for 2023.pdfExploring Cloud Deployment Models for 2023.pdf
Exploring Cloud Deployment Models for 2023.pdf
 
Three Strategies to Accelerate Your Agency's Migration to the Cloud
Three Strategies to Accelerate Your Agency's Migration to the CloudThree Strategies to Accelerate Your Agency's Migration to the Cloud
Three Strategies to Accelerate Your Agency's Migration to the Cloud
 
Exploring Cloud Deployment Models for 2023.pdf
Exploring Cloud Deployment Models for 2023.pdfExploring Cloud Deployment Models for 2023.pdf
Exploring Cloud Deployment Models for 2023.pdf
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
 
A Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust IssuesA Survey on Cloud Computing Security – Challenges and Trust Issues
A Survey on Cloud Computing Security – Challenges and Trust Issues
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
 
10 Lessons Learned from Cloud Offerings
10 Lessons Learned from Cloud Offerings10 Lessons Learned from Cloud Offerings
10 Lessons Learned from Cloud Offerings
 

More from Booz Allen Hamilton

You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest ChallengesYou Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest ChallengesBooz Allen Hamilton
 
Examining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working MomsExamining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working MomsBooz Allen Hamilton
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen Hamilton
 
Homeland Threats: Today and Tomorrow
Homeland Threats: Today and TomorrowHomeland Threats: Today and Tomorrow
Homeland Threats: Today and TomorrowBooz Allen Hamilton
 
Preparing for New Healthcare Payment Models
Preparing for New Healthcare Payment ModelsPreparing for New Healthcare Payment Models
Preparing for New Healthcare Payment ModelsBooz Allen Hamilton
 
The Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile CoachingThe Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile CoachingBooz Allen Hamilton
 
Immersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is HereImmersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is HereBooz Allen Hamilton
 
Nuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving PerformanceNuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving PerformanceBooz Allen Hamilton
 
Frenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join ForcesFrenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join ForcesBooz Allen Hamilton
 
Booz Allen Secure Agile Development
Booz Allen Secure Agile DevelopmentBooz Allen Secure Agile Development
Booz Allen Secure Agile DevelopmentBooz Allen Hamilton
 
Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Hamilton
 
Booz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey ReportBooz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey ReportBooz Allen Hamilton
 
Modern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military NetworksModern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military NetworksBooz Allen Hamilton
 
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Booz Allen Hamilton
 
Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science Booz Allen Hamilton
 

More from Booz Allen Hamilton (20)

You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest ChallengesYou Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
 
Examining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working MomsExamining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working Moms
 
The True Cost of Childcare
The True Cost of ChildcareThe True Cost of Childcare
The True Cost of Childcare
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of Directors
 
Inaugural Addresses
Inaugural AddressesInaugural Addresses
Inaugural Addresses
 
Military Spouse Career Roadmap
Military Spouse Career Roadmap Military Spouse Career Roadmap
Military Spouse Career Roadmap
 
Homeland Threats: Today and Tomorrow
Homeland Threats: Today and TomorrowHomeland Threats: Today and Tomorrow
Homeland Threats: Today and Tomorrow
 
Preparing for New Healthcare Payment Models
Preparing for New Healthcare Payment ModelsPreparing for New Healthcare Payment Models
Preparing for New Healthcare Payment Models
 
The Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile CoachingThe Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile Coaching
 
Immersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is HereImmersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is Here
 
Nuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving PerformanceNuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving Performance
 
Frenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join ForcesFrenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join Forces
 
Booz Allen Secure Agile Development
Booz Allen Secure Agile DevelopmentBooz Allen Secure Agile Development
Booz Allen Secure Agile Development
 
Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat Briefing
 
Booz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey ReportBooz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey Report
 
CITRIX IN AMAZON WEB SERVICES
CITRIX IN AMAZON WEB SERVICESCITRIX IN AMAZON WEB SERVICES
CITRIX IN AMAZON WEB SERVICES
 
Modern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military NetworksModern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military Networks
 
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
 
Women On The Leading Edge
Women On The Leading Edge Women On The Leading Edge
Women On The Leading Edge
 
Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science
 

Recently uploaded

A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Recently uploaded (20)

A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Cloud Computing Security: Government Acquisition Considerations for the Cloud Computing Environment

  • 1. Cloud Computing Security Government Acquisition Considerations for the Public Cloud Computing Environments by Karen Mercedes Goertzel goertzel_karen@bah.com Holly Lynne M. Schmidt schmidt_holly_lynne@bah.com Theodore Winograd winograd_theodore@bah.com Kristy Mosteller mosteller_kristy@bah.com
  • 2. Table of Contents Cloud Computing Security ................................................................................................... 1 Introduction ....................................................................................................................... 1 Purpose ............................................................................................................................ 1 Exclusions ......................................................................................................................... 1 Security Considerations in Government Acquisition of Public Cloud Services ........................... 1 Relevant Acquisition Security Policy and Guidance ................................................................ 2 Supplier Selection .............................................................................................................. 2 Candidate Supplier Identification ......................................................................................... 2 Criteria for Choosing From Among Candidate Vendors ........................................................... 4 Service–Level Agreements .................................................................................................. 5 Standard Vendor Service–Level Agreements and Their Negotiability ........................................ 5 Quality of Service and Quality of Protection Concerns ............................................................ 7 Conclusion......................................................................................................................... 7 About the Authors .............................................................................................................. 8 About Booz Allen ................................................................................................................ 9 Principal Offices ............................................................................................................... 10
  • 3. Cloud Computing Security Government Considerations for the Cloud Computing Environment Introduction (MA) challenges public CCEs pose and how accounting Cloud computing is not a new technology or even a for those risks through acquisition security measures new computing paradigm. It is an umbrella term for a may affect public CCE options. It discusses security conceptual framework through which existing technologies, and risk management factors the Government should capabilities, computing concepts, provisioning, and charge- consider before acquiring public cloud services. For back approaches are more smoothly coordinated and example, it outlines security criteria for evaluating integrated—often in ways that provide value far beyond different public CCEs and vendors, as well as the each component in isolation. The “cloud” can also be seen abilities and limitations of service-level agreements as an abstraction mechanism, interposing one or more (SLA) and memoranda of agreement (MOA) with regard layers between the user and the systems that provide to risk. computing services and resources. These abstraction layers reduce or eliminate the end user’s need to operate Exclusions the mechanisms that make those services and resources The focus of this paper is solely on government accessible. Nevertheless, these same abstraction layers acquisition and use of public cloud services. This can make it difficult for the user to have any visibility into paper does not address security issues associated what happens to data or applications located “in the cloud.” with government organizations’ implementation of private clouds or participation in community clouds It is possible for U.S. government organizations to migrate operated by government agencies (e.g., Defense desired services to a public cloud computing environment Information Systems Agency [DISA], National (CCE), but doing so requires that CCE consumers have a Aeronautics and Space Administration [NASA], strong understanding of cloud technology’s capabilities Department of the Interior [DOI]). and limitations, evolving government security policies, and how an organization’s security policies can be implemented Security Considerations in Government and enforced while using a public CCE—as well as a Acquisition of Public Cloud Services comprehensive transition methodology, such as Booz Organizations must assess the viability of their Allen Hamilton’s Cloud Computing transition Framework infrastructure to adopt cloud-based services and (C3F). An organization should have a planning effort that should use a solid transition methodology that includes all acquisition and cloud expertise necessary, encompasses the transformation lifecycle. Through a along with a clear realization that security is more than just strategic diagnostics session, the assessment should a compliance activity. As they would with all responsible consider drivers, pain points, capabilities, stakeholders, risk management decisions, government organizations mission risks, federal continuity compliance, continuity should avoid allowing cost considerations to trump security of operations planning (COOP), IT infrastructure considerations when deciding whether to acquire public resilience, and critical infrastructure protection. An cloud services, which type(s) of cloud services to acquire, acquisition will only be successful if the acquired and which cloud vendor(s) to trust with their data. service fully meets the organization’s objectives. To this end, Booz Allen developed the C3F to support Purpose organizations migrating to the cloud.1 An understanding This paper is intended to help the reader understand of relevant acquisition security policy and guidance will the information assurance (IA) and mission assurance also help organizations carefully consider the impact of 1 “Cloud Computing: A Transition Methodology.” Accessed 20 September 2009 at http:// www.boozallen.com/media/file/cloud-computing-transition-methodology.pdf 1
  • 4. transitioning assets from their current IT infrastructure the effective and secure use of the technology in to a public CCE. government and industry through technical guidance and cloud computing standards.2 Once an organization has fully analyzed and captured its CCE vision and strategy to transition its assets to Supplier Selection the CCE, it can then assess its intellectual capital (IC) portfolio for CCE provider candidates and evaluate its Candidate Supplier Identification options against the strategic diagnostic’s findings by Depending on the type of service desired, organizations identifying suppliers, pinpointing and leveraging criteria can choose from a wide range of cloud vendors—as to assess candidate suppliers, and assessing supplier well as vendors that offer cloud services but do not accountability through SLAs or MOAs. These actions will distinguish themselves as cloud vendors (e.g., hosting promote provider transparency and ensure organizations companies offering infrastructure as a service [IaaS] understand the protections afforded their data. or platform as a service [PaaS]). One important aspect for organizations to consider when selecting a cloud Relevant Acquisition Security Policy and vendor is that the concept of cloud services that meet Guidance government regulations or specific customer-driven Although the component services that comprise the security and privacy requirements is relatively new. cloud (e.g., time-sharing services, virtual machine Although current cloud SLAs tend to focus specifically hosting) are not new technologies, there is little on reliability and geographic location of data,3 it is security-relevant acquisition, policy, or guidance likely that cloud vendors will follow in the footsteps language for such services within the Federal of other service providers in introducing language to Government. For that reason, there is little language assuage security and privacy concerns. available for reinterpretation and adaptation to public cloud use. Section 4.1 of Department of Defense Public IaaS Vendors Directive (DoDD) 8100.02, Use of Commercial Wireless Devices, Services, and Technologies in the Exhibit 1 | Examples of IaaS Applications Department of Defense (DoD) Global Information Grid (GIG), provides a number of security mandates to which any commercial wireless devices or networks Iaas Vendors integrated with or connected to a DoD network must Amazon Web Services (AWS) conform. Although a public CCE cannot be considered Engine Yard a wireless network, the concepts within DoDD 8100.02 Joyent are relevant to any commercial network or devices Mosso connecting to DoD networks; it may be useful for FlexiScale government planners to review DoDD 8100.02 for GoGrid language that can be adapted into a policy governing ElasticHosts DoD public cloud use. Terremark The National Institute of Standards and Technology Savvis (NIST) has published the Draft NIST Working Definition of Cloud Computing v15 and Presentation on Effectively and Securely Using the Cloud Computing Infrastructure comprises the hardware, networking, Paradigm v25. NIST is also planning to publish cloud and operating systems that run the foundation of an computing guidance, including security guidance, for information system. This infrastructure includes fiber federal agencies. This guidance will aim to promote optic cables, hard drives, servers, and usually an 2 Peter Mell, “Cloud Computing,” Computer Security Division, NIST. Accessed 27 August 3 “Will Microsoft Shake Up Cloud Computing SLAs?” J. Nicholas Hoover, 2009 at http://csrc.nist.gov/groups/SNS/cloud-computing/ InformationWeek, 30 October 2008. Accessed 15 July 2009 at: http://www.informa- tionweek.com/cloud-computing/blog/archives/2008/10/will_microsoft_2.html 2
  • 5. operating system. From the perspective of a software virtual operating system presented to the customer. developer, this infrastructure runs the code that The customer may place additional software-based produces the screens, data, and workflows the end controls on the virtual server (provided the controls users interact with, but the infrastructure is not the do not violate the cloud vendor’s terms of use) to help code itself. In short, IaaS abstracts a particular type secure organizational data and processes that will be of hardware with a stack (e.g., Windows, Linux, other hosted on the cloud. operating system), as well as one or two databases and networking support. Public PaaS Vendors A cloud PaaS—which is the delivery of a computing The basic principle on which IaaS stands is the platform and/or solution stack as a service—facilitates multiplexing of resources among many users to the deployment of applications without the cost and increase average utilization. Users are able to allocate complexity of buying and managing the underlying and de-allocate virtual servers from a virtual pool on hardware and software layers. demand, providing users with elasticity that is generally unavailable in traditional computing models. To support It is important to note that, as with IaaS vendors, the IaaS, organizations agree to have their virtual servers cloud vendor provides the security controls in place potentially co-located with other organizations’ servers below the base platform and APIs presented to the on the same physical platform—this is similar in customer. The customer may place additional software- concept to virtual servers that can be provisioned from based controls on the application or service to help commercial hosting providers. Although the logical secure organizational data and processes that will be separation provided by the IaaS vendor is usually hosted on the cloud. For example, the web application sufficient, the act of co-locating data on a single or service can be developed to process anonymous or physical platform may make it a more valuable target generic data that can be correlated to the original data for attackers. when it is returned to the organization’s boundary. It is important to note that although the cloud vendor provides some security controls, these controls are only at the infrastructure level, conceptually below the Exhibit 2 | Examples of PaaS Applications PaaS Vendors Description Google App Engine Provides the base platform and application programming interfaces (API) for developing and deploying Python and Java-based web applications and web services Microsoft Azure Provides the base platform and APIs for developing and deploying .NET-based web applications and web services Morph Provides the Morph Application Platform for developing web applications Heroku Provides the base platform and APIs for developing and deploying Ruby on Rails- based web applications and web services Bungee Provides an IDE and platform for developing and deploying web applications and web services 3
  • 6. Public Software as a Service (SaaS) and Data as a Service (DaaS)4 Providers Exhibit 3 | Examples of SaaS Applications PaaS Vendors Description Google Apps Offers a suite of office products through the cloud for customers to use AWS Offers a number of service APIs that can be used to extend the capabilities of an organization’s software SAP Provides the same functionality as its commercial off-the-shelf (COTS) offering through a subscription model via the cloud Salesforce.com Provides the same functionality as its COTS offering through a subscription model via the cloud Microsoft Azure Offers a number of service APIs that can integrate with both thin and thick clients on users’ computers A cloud SaaS leverages the cloud in software protect the entire software stack. With SaaS and DaaS architecture, often eliminating the need to install services in particular, cloud vendors may be unwilling and run the application on the customer’s own to modify their security practices, particularly when computer and thus alleviating the burden of software a COTS version of the software in the SaaS or DaaS maintenance, ongoing operation, and support. A cloud service offering can be deployed and secured at a SaaS includes “products, services and solutions that customer’s organization. are delivered and consumed in real-time over the Internet,”5 such as web services (“software system[s] Security Concerns Common Across All Cloud Services designed to support interoperable machine-to-machine The primary concern associated with cloud offerings interaction over a network”6). Other cloud computing is that customer data is stored offsite at the vendor’s components, software (e.g., software plus services), data centers and therefore must be protected or end users may directly access a SaaS. Cloud data by the vendor’s security controls. An additional storage services (DaaS) involve the delivery of data concern with cloud offerings is that the data from storage as a service, including database-like services. multiple customers is potentially co-located in one DaaS is often billed on a utility computing basis (e.g., facility—increasing the value of the data stored at per gigabyte per month). the center. Although many vendors provide customers thorough descriptions of their existing security It is important to note that the cloud vendor provides controls, few vendors—if any—allow customers to the security controls in place for the entire software perform a detailed audit of their security controls and stack presented to the customer. The customer may standards. In addition, few cloud vendors are willing to place additional controls between the user and the modify their security controls for cloud offerings at a application (i.e., anonymizing data before submitting it customer’s request. to the service) to help secure organizational data and processes that will be hosted on the cloud. However, Criteria for Choosing From Among Candidate Vendors for SaaS and DaaS offerings, organizations must trust As with selecting a supplier for any IT service, the that the vendor’s security controls are sufficient to first and foremost criterion for provider selection 4 NIST does not formally recognize the terminology “Data as a Service (DaaS)” as a 5 “Defining ‘Cloud Services’ and ‘Cloud Computing,’” Frank Gens, IDC eXchange, 23 defined service in its cloud computing documentation; however, it is phrased as such in September 2008. Accessed 15 July 2009 at: http://blogs.idc.com/ie/?p=190 this paper for consistency and ease of readability 6 “Web Services Glossary,” Hugo Haas, W3C and Allen Brown, Microsoft, W3C, 11 February 2004. Accessed 15 July 2009 at http://www.w3.org/TR/ws-gloss/ 4
  • 7. must be whether the vendor meets the organization’s recognize a need to meet their customers halfway in needs. For example, one CCE provider may be willing order for widespread public CCE adoption to occur. to provide security controls that exceed customer For example, Amazon has begun offering “virtual requirements while also allowing the organization to private cloud” services that combine the outsourcing audit the provider’s security practices, but the services advantages of the public cloud with increased offered by the provider may not fit correctly with the customer visibility, control, and service tailoring (at a organization’s business processes or expectations. In cost higher than that of Amazon’s fully public Elastic such situations, simply choosing a CCE provider based Compute Cloud [EC2] cloud service). But for many on the security and privacy assurances it provides customers, the perceived cost savings associated would not meet the needs of the organization. with using public CCEs offered under less-than-ideal standard SLA terms will outweigh the potential losses As with any acquisition, it may be necessary to make associated with the increased risk that accompanies some compromises in terms of requirements to meet the acceptance of such terms. the organization’s needs—but it is of utmost importance that such decisions are made with a full understanding The key to success is setting realistic expectations of their potential consequences. When choosing from the outset so that all stakeholders in the between candidate suppliers, it is important to use acquiring organization understand the exact level of security and auditing practices as distinguishing factors service their public cloud provider is willing to provide. in addition to price, performance, and other factors. If the SLA meets the performance/availability/reliability (PAR) needs of the organization, the cost-benefit Service–Level Agreements analysis is usually clear (keeping in mind that PAR SLAs represent both a source of security risk in must explicitly include all of the customer’s security public CCEs and a means of addressing security considerations). If the SLA falls short, organizations risk. The SLA is the main means by which the cloud should factor the quantified level of risk associated consumer can mitigate the security risks that this shift with the shortfall into the cost-benefit equation. of operational responsibility engenders. To address the consumer’s lack of visibility, lack of control, and Standard Vendor Service-Level Agreements and Their lack of accountability, the SLA can explicitly state the Negotiability security requirements of the cloud customer, including SLAs are not a new concept for service providers or requirements for service quality and availability, MA, the customers that purchase them. Customers should data confidentiality and privacy, data and software apply the same SLA standards in a CCE that they integrity, incident response, vulnerability management, would in an outsourcing requirement. When entering and problem resolution. the tenuous nature of the cloud, however, customers must be increasingly vigilant in assessing their needs, As providers of a “commodity” service, many public what they are or are not willing to negotiate, and CCE providers tend to standardize their SLAs for all of the price they are willing to pay for guarantees and their customers. SLA standardization can introduce risk assurances. As a customer, the key is to annotate the by failing to address and accommodate the specific organization’s nonnegotiable needs as the baseline security requirements of individual customers. In the price point and proceed from there. At a minimum, absence of an SLA that satisfies all of a customer’s the SLA should include details about asset ownership, requirements, that customer will need to negotiate downtime, customer service, and pricing. Organizations with the provider to tailor the SLA to satisfy the should be familiar with common language used in the organization’s needs; otherwise, the organization will CCE, as well as standard SLA language. Combined, need to find alternative means by which to minimize this language creates an agreement that may differ residual risk. Some of the leading public CCE providers 5
  • 8. from an organization’s understanding of typical SLA information must be made available to substantiate terminology. Larger scale providers typically use more the provider’s claim for compensation. generic language to encompass broader capabilities This point is particularly true in developing an SLA. If and to relieve the organization’s (i.e., the customer’s) the organization’s infrastructure is regularly adjusting responsibility. It is the organization’s responsibility to meet demands, it is essential to be able to verify to ensure the SLA expressly identifies and defines that the infrastructure is reacting the way that was specific issues and desired services. contracted.7 To complicate matters further, CCEs— which are innately self-service and on demand—create Data Ownership and Control a plethora of data to be maintained and filtered. For Organizations should ensure the SLA clearly defines this reason, SLAs with providers should explicitly state who has access to the data and the protections that that real-time auditing or logging (for accountability) are in place. The customer’s data and IT managers will will be performed and resulting reports will be need to understand how the provider’s infrastructure made accessible to customers. A tailored audit can and services are used to provide persistent access provide the customer a clear understanding of where to needed applications and data sets. Continuity is responsibilities lie. important. In a perfect world, a vendor could guarantee access 100 percent of the time, but, in reality, a Compliance Environments guarantee like that is impossible. The customer’s Compliance environments cited by experts as legal department needs to understand the differences important for cloud computing include Statement on between common SLA terms such as “average Auditing Standard (SAS) 70, Payment Card Industry configuration downtime” or “network downtime” versus Data Security Standards (PCI DSS), and the Health “systems downtime.” Organizations should also have Insurance Portability and Accountability Act (HIPAA). a clear definition of who owns the data and should In particular, experts cite the section in SAS 70 on consider self-protecting data options as necessary. Service Organizations issued by the Auditing Standards Board of the American Institute of Certified Public Auditing and Accountability Accountants (AICPA). Basically stated, the vendor Although most cloud providers will record access to the managing the cloud must be able to describe what is system in specified log files, gaining access to audit happening, where the information comes in, what the logs can be a difficult process. In some instances, the vendor does when it gets the information, how it gets cloud provider’s logs may be insufficient for a particular back to the users, the controls over the processing of organization’s needs. To this end, organizations are the data, and, most importantly, what is happening to often forced to run their production applications on the data when it gets to the cloud. an implicit SLA that is usually interpreted as a simple equation of receiving X units of service for N price. Although many public CCE providers have SAS 70 Unfortunately, this implicit SLA does not address the or even PCI compliance, many do not fully address scalability of an organization’s resources based on NIST Special Publication (SP) 800-53, Recommended changes in demand. Auditing becomes another key Security Controls for Federal Information Systems and factor in assessing the organization’s true needs and Organizations. SP 800-53 outlines the security controls being able to meet ever-changing demands in service. expected of federal government organizations. Although Instead of accepting what the CCE provider sends many cloud providers lack a full understanding of the organization at the end of the month as a bill, an recommended security controls, some cloud providers organization should understand that cloud computing trying to pursue the government market are adequately is complex enough that a reasonable set of runtime complying with NIST SP 800-53. When assessing a provider, organizations should consider the following: 7 “Auditing the Cloud,” Rich Wellner, Grid Gurus, 20 October 2008. Accessed 2 July 2009 at http://gridgurus.typepad.com/grid_gurus/2008/10/auditing-the-cl.html 6
  • 9. Is the provider familiar with federal requirements? Are Conclusion the security controls the CCE provider is responsible Public CCEs are a potentially viable option for for compliant? How does the CCE provider display government organizations as an alternative evidence of compliance? How is compliance to government ownership and operation of IT maintained? infrastructure and systems. However, government agencies must recognize that many security-related Quality of Service and Quality of Protection Concerns issues surround such a move. Before a government Public cloud service SLAs must account for at least organization migrates some or all of its data to two vendors: (1) the cloud service provider and (2) a public CCE, it must have a clear grasp of cloud the communications vendor that provides the circuit technology and emerging government policies, as well by which the customer accesses the cloud service. as a comprehensive transition methodology, such This dual-provider scenario adds complexity to not as Booz Allen’s C3F. Moreover, it must realize that only the SLA language but also the ability to hold public CCE providers may not meet federal standards vendors accountable (and legally liable) for failures. for security controls and may not be able to provide In addition, organizations must acknowledge that all government organizations the requisite security service providers will experience downtime at some measures. Government acquirers of public CCEs need point because of situations beyond their control, to be fully aware of the security risks associated with including natural disasters and interruptions in the the different public cloud service operating models public infrastructure. Most service providers offer an (e.g., IaaS, PaaS, SaaS), as well as how the use of a assurance of 99.5-percent uptime. Even with expected particular model will affect the organization’s ability to legalese, a provider can make a reasonable attempt to maintain its mission. guarantee an acceptable level of service. As a cloud technology expert with deep knowledge With that in mind, the real question becomes the of related government standards, Booz Allen can following: What happens when service is interrupted?8 help clients navigate the new and complex cloud Some providers have established mechanisms to assist environment. Booz Allen addresses the challenges organizations in assessing the quality of service (QoS) of the public cloud with an objective understanding they are receiving and to inform organizations of any of the security issues the cloud presents. To fully potential downtime or service disruptions. Although address all facets of a potential move to the cloud, these mechanisms do not mitigate the actual loss of Booz Allen offers the C3F to address the need for time or data, they can be used to prepare preventative government organizations to have a trusted, unbiased and contingency measures after an SLA has been advisor on their side as they determine whether to established. The bottom line in addressing sustainment take this next step in computing. Through the C3F, issues is an organization’s ownership of risk. Using Booz Allen’s consultants assist organizations with available resources to monitor the health of a provider’s mission assessment, potential solution evaluation, service capabilities (as available) is one viable option; requirements development, vendor selection, and, however, if an organization is clear in its expectations ultimately, acquisition. Booz Allen can also help early on and develops appropriate SLA language, it will organizations ensure their provider SLAs and MOAs are enjoy greater business continuity assurance. comprehensive and will protect them in any situation. With appropriate security-aware acquisition practices, government customers of public cloud services can decrease their security risks by moving to the cloud. 8 “What to look for in a cloud computing SLA,” Frank Ohlhorst, SearchCIO, 16 June 2009. Accessed 9 July 2009 at http://searchcio.techtarget.com.au/articles/33073-What-to-look- for-in-a-cloud-computing-SLA 7
  • 10. About the Authors Karen Mercedes Goertzel, CISSP, is an Associate in Theodore Winograd, CISSP, is an Associate in Booz Booz Allen Hamilton’s McLean office and currently Allen Hamilton’s McLean office. He specializes in leads the firm’s security research service. She is a information and software assurance, concentrating on subject matter expert in software security and safety service-oriented architecture and, more recently, cloud assurance, cyber security, information assurance, and computing technologies. software system survivability. Kristy Mosteller is an Associate in Booz Allen Holly Lynne M. Schmidt, SSCP, CSSLP, is an Hamilton’s One Dulles office. She specializes in Associate in Booz Allen Hamilton’s McLean office. system security engineering development and delivery, She specializes in application security; system/ concentrating on security management, information software assurance; and security policy, law, and technology, and operations risk analysis. regulation. She has performed research, analysis, and development of reports, guidance, and policy for various government clients. Contact Information: Karen Mercedes Goertzel, Holly Lynne M. Schmidt, Theodore Winograd, Kristy Mosteller CISSP SSCP, CSSLP CISSP Associate Associate Associate Associate goertzel_karen@bah.com schmidt_holly_lynne@bah.com author@bah.com author@bah.com 703/698-7454 703/377-5547 703/377-5544 703/984-7085 8
  • 11. About Booz Allen Booz Allen Hamilton has been at the forefront of technology, systems engineering, and program strategy and technology consulting for 95 years. Every management, Booz Allen is committed to delivering day, government agencies, institutions, corporations, results that endure. and not-for-profit organizations rely on the firm’s With more than 22,000 people and $4.5 billion in expertise and objectivity, and on the combined annual revenue, Booz Allen is continually recognized for capabilities and dedication of our exceptional people its quality work and corporate culture. In 2009, for the to find solutions and seize opportunities. We combine fifth consecutive year, Fortune magazine named Booz a consultant’s unique problem-solving orientation with Allen one of “The 100 Best Companies to Work For,” deep technical knowledge and strong execution to help and Working Mother magazine has ranked the firm clients achieve success in their most critical missions. among its “100 Best Companies for Working Mothers” Providing a broad range of services in strategy, annually since 1999. operations, organization and change, information To learn more about the firm and to download digital versions of this article and other Booz Allen Hamilton publications, visit www.boozallen.com. 9
  • 12. Principal Offices ALABAMA KANSAS OHIO Huntsville Leavenworth Dayton CALIFORNIA MARYLAND PENNSYLVANIA Los Angeles Aberdeen Philadelphia San Diego Annapolis Junction San Francisco Lexington Park SOUTH CAROLINA COLORADO Linthicum Charleston Colorado Springs Rockville TEXAS Denver MICHIGAN Houston FLORIDA Troy San Antonio Pensacola Sarasota NEBRASKA VIRGINIA Tampa Omaha Arlington Chantilly GEORGIA NEW JERSEY Falls Church Atlanta Eatontown Herndon HAWAII McLean Honolulu NEW YORK Norfolk Rome Stafford ILLINOIS O’Fallon WASHINGTON, DC The most complete, recent list of offices and their and addresses and telephone numbers can be found on www.boozallen.com by clicking the “Offices” link under “About Booz Allen.” www.boozallen.com ©2009 Booz Allen Hamilton Inc. 08.111.09