NIST report aims to help U.S. agencies deploy cloud apps

Cloud computing can provide value only if security, management is properly planned, NIST says

Organizations that are deploying public cloud computing applications need to pay close attention to security and management risks, the National Institute of Standards and Technology said in a report released Wednesday.

"With the wide availability of cloud computing services, lack of organizational controls over employees engaging such services arbitrarily can be a source of problems," NIST noted in a document prescribing a set of security and privacy guidelines for cloud computing. "Without proper governance, the organizational computing infrastructure could be transformed into a sprawling, unmanageable mix of insecure services."

The issue is somewhat similar to the problems created when individual employees and small groups set up rogue wireless access points in an enterprise network, the report noted.

NIST prepared the Guidelines on Security and Privacy in Public Cloud Computing in response to a directive from federal CIO Vivek Kundra.

As part of his effort to accelerate the government adoption of cloud computing Kundra asked NIST to develop a set of security standards and guidelines agencies can use when moving applications and data to the cloud.

The goal of the document is not to create fear among federal agencies, said Tim Grance, a computer scientist at NIST and an author of the report. Rather, the guidelines aim to prepare federal IT managers for cloud projects.

"Public cloud computing is a very viable choice" for government agencies, Grance said. "We are not by any means saying 'don't do it.' But you have to be careful. You got to make sure that [cloud computing] is part of a coherent overall strategic process."

NIST's 60-page document, currently open for public comment, provides a detailed analysis of many familiar cloud security and privacy issues.

For instance, the report highlights multiple compliance issues, such as those related to data location, facing cloud adopters.

Often, detailed information about the location of an organization's data is unavailable or not disclosed by the cloud provider, the report noted, making it hard for organizations to determine whether security controls are in place and if legal and regulatory requirements for protecting data are being met.

Similarly, U.S. federal agencies are required to comply with several security and privacy related mandates, the report notes. However, the degree to which cloud providers are willing to accept liability for data under their control remains largely untested, NIST said.

Organizations using public cloud computing systems relinquish direct control over many security aspects, and confer an unprecedented amount of trust in the provider. Moving to the cloud can sometimes exacerbate insider threat issues, raise questions about data ownership and control, and make risk assessment and management harder, NIST said.

The NIST report also highlights the need for organizations to pay attention to the architecture employed by the cloud provider, its support for identity and authentication mechanisms, and the controls it has for securing its servers and the data residing on them.

Such issues should be considered and addressed during the planning stages, not after cloud-based applications and data are deployed, Grance said.

Most large cloud computing providers aim to deliver cloud services at commodity prices by taking advantage of economies of scale, Grance said. Consequently, cloud providers typically aren't aware of the security and privacy requirements of individual organizations.

Sometimes, organizations may find that service agreements are not adequate for their needs. In such situations, organizations should negotiate agreements with their cloud providers in much the same way they would with an outsourcing agreement. But such negotiated agreements could make cloud computing less cost-effective, Grance added.

Many cloud services are becoming commoditized because providers are able to take advantage of massive economies of scale, Grance said. "If they have to do a lot of customization, then you are cutting into the commodity tradeoff," he said.

As a result, agencies that are planning on adopting cloud computing need to carefully consider the business case first, Grance said.

In some situations, organizations may find the need to implement compensating controls when adopting public cloud computing. Or they may benefit from moving to a private cloud.

"People like to think of this as an all or nothing [situation]" Grance said. The reality is that there is a "whole bunch of activities that you could put in a public cloud and it would be a perfectly reasonable thing to do," he said. "But you need to be careful of what you put in there."

Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan , or subscribe to Jaikumar's RSS feed . His e-mail address is jvijayan@computerworld.com .

Read more about security in Computerworld's Security Topic Center.

Tags Government use of ITsecurityIT in Governmentinternetcloud computinggovernment

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jaikumar Vijayan

Computerworld (US)

Comments

Comments are now closed.

Most Popular Reviews

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest News Articles

Resources

Best Deals on GoodGearGuide

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?