For this post, I would like to share a checklist of Cloud Security Assessment that will cover multiple areas of environment and business from cloud security best practice.
Each assessment will have a step that needs to be accessed especially those that related to System and Infrastructure. Those step can listed as follows:
- Step 1 Policies and Procedures
- Step 2 Access Management
- Step 3 Networking
- Step 4 Backup and Data Recovery
- Step 5 Security Patches and Update
- Step 6 Logging and Monitoring
- Step 7 Data Encryption
Step for Cloud Security Assessment
Step 1: Policies and Procedures
This step would help the users in terms of securing with a system falls from on both the cloud provider and the client point of view.
Gartner have predicted in a statistic such as follows:
through 2020, at least 95% of cloud security failures will be the customer’s fault
The above quote can be eliminated after the organization and provider have comprehensive policies and procedures been implemented in place.
It will be more secure if the following risk model been implemented in a public’s cloud.
- Agility will support any unanticipated any future needs.
- Availability will need to have service disruptions and data loss control
- Security will cover confidentiality and data control
- The supplier will take care of any changes that happen within the cloud provider business model
- Compliance will focus on regulatory and other legal requirements
STEP 2: ACCESS MANAGEMENT
Securing the cloud environment by managing identity and access management can be consider as an important first step which it will covers on how to identify and authenticate users.
Forrester have also estimated in 2016 that
80% of security breaches involved privileged credentials
For this step, the user will need to determine whether using multi-factor authentication is a must for the organization. Normally, the cloud provider and organization will use a minimum of two forms of authentication before they can grant any access to those are needed.
STEP 3: NETWORKING
Cloud-based environment that used will put much burden for the network security on the cloud provider which lead to the question below:
- Are there gateway security measures against malware injections?
- Are there security measures in place against network-based attacks?
- Is all sensitive material encrypted over less-trusted networks?
STEP 4: BACKUP AND DATA RECOVERY
Natural disaster, hardware failure and malicious action can be a factor to the data can be lost during the backup activity. As a result, a recovery plan will emerge to ensure and protect the data from been devastating data loss.
A good backup and data recovery will provide such as
- Physical Storage locations
- Physical Access to server facilities
- Plan for Natural Disaster.
STEP 5: SECURITY PATCHES AND UPDATES
Security patches and update can be considered as an important phrase and step where the system owner need to keep their system updated with the latest security patches in order to maintain a secure environment.
STEP 6: LOGGING AND MONITORING
When a security breach occurs, it will take a very organization around six(6) months to identified and recovery from the incident. Due to that, it considers as important for any organization to ensure they keep the logging in each server and application including database for future analysis of the incident.
STEP 7: DATA ENCRYPTION
Data encryption will make harder to the hacker even thought they succeed with the data breach where it contain sensitive information that encryption been implemented.