Cloud Security Policies

It is becoming increasingly common for organizations to move their data to the cloud. Cloud storage provides a great deal of convenience, and from a disaster recovery perspective, is extremely resilient. However, cloud storage is not without some security risks. Before we discuss cloud security policies, some basics on how clouds function will be necessary.

The term cloud computing was popularized when Amazon.com released Elastic Compute Cloud in 2006. Cloud computing uses servers distributed geographically. In some cases, the servers are in other countries. In February 2010, Microsoft released the Microsoft Azure cloud service. Amazon and Apple also provide cloud services for the general public. There are four general types of clouds:

Clouds are essentially virtualization taken to a new level. You have probably used a virtual machine on a computer—perhaps VMWare Workstation or Oracle Virtual Box. All virtual systems are one of two types:

There are several categorizations of virtual systems, and these are often the ways in which people interact with cloud services:

Today there are many permutations of these, such as:

New acronyms are being generated quite regularly; however, they are all focused on the same concept: An underlying IT service is not being installed locally. It is instead virtualized, often via a cloud, and accessed in that manner.

There are some guidelines for cloud security. You don’t have to start from nothing. ISO 27017 is guidance for cloud security. It does apply the guidance of ISO 27002 to the cloud, but then adds seven new controls.

ISO 27018 is closely related to ISO 27017. ISO 27018 defines privacy requirements in a cloud environment, particularly how the customer and cloud provider must protect personally identifiable information (PII). Regardless of which cloud service an organization uses (IaaS, PaaS, etc.), it is important that security policies are in place for handling cloud security.