IT Security Compliance for Cloud Service Providers

IT Security Compliance for Cloud Service ProvidersCompliance with increasingly stringent regulations for organizations providing outsourced IT services, particularly in regards to data protection, is becoming more difficult. Reputation and client trust are fragile assets, and compliance with industry standards and legal regulations is essential to earn and maintain them. Cloud service providers (CSP) consider compliance a magical term: on one hand it’s critical to their success; on the other hand it’s imposing time-consuming burdens on the business.

A special area of compliance is IT security compliance, which is based on legal provisions and international standards. Geographic borders become blurred, however, in the provision of cloud services, making it impossible to regulate the sector solely based on local regulations. This calls for international IT security standards, such as PCI-DSS, ISO:27001, or SSAE 16/ISAE 3402 (formerly SAS 70). The largest CSPs such as Amazon Web Services and Microsoft Azure strengthen their customers’ trust by meeting these standards.

The standards include a broad range of requirements that require a comprehensive approach to compliance. In each instance, CSPs need to understand and interpret the requirements from their own perspective, then enact a thorough implementation program. This includes meeting certain requirements with specialized software. Privileged access management and centralized log management are areas in which software is typically used to meet compliance requirements, and can lead to significant cost reductions, as well as an increased level of security.

The Current Market Landscape Among Cloud Providers

Which percent of their yearly IT budget is spent on compliance investments? What is their primary motivation to meet regulations? Which are the most important industry regulations they need to meet? Which are the most important control areas when talking about compliance strategy? What type of users’s activities should be primarily monitored in cloud environments? How matured are the Privileged User’s Management strategies at cloud providers?

BalaBit IT Security and KPMG in Hungary jointly conducted an international market survey1 titled “Compliance in the IT Service Provider Sector”. The research involved 120 IT directors of IT and cloud service providers, and was conducted in February.

Figure 1 shows that approximately 60 percent of service providers spend more than 10 percent of their annual IT budget on investments related to IT security compliance. Moreover, almost one out of five spends more than 20 percent of their annual budget on compliance related items, which is well above the industry average.

More than two-thirds of those surveyed use compliance with standards primarily to ensure secure operations. This result is a positive development, as it indicates that most IT cloud service providers regard industry regulations as a framework for developing their companies’ risk management practices.

The vast majority of respondents use compliance for maintaining their reputation and acquiring more customers, which clearly shows that service providers see compliance as crucial to building trust.

Results of the survey also showed that most IT service providers consider compliance with the international standards (for example, ISO 27001 and PCI DSS) important. Naturally, the data protection regulations of the countries where a given service providers’ data centers reside are important. It is, however, essential to note that legal regulations usually build upon the principles of some international standard.

It turns out that (privileged) user access control and log management are critical elements of service providers’ compliance strategies, whereas basic technologies such as antivirus and firewall systems are much less important.

For the majority of respondents (57 percent), monitoring internal and external access to cloud infrastructure is equally important. This can be explained by the fact that access monitoring systems provide strong evidence for service providers in disputes with their customers and can settle differences of opinion quickly and cost-effectively.

It is clear from our research that most service providers employ generic user management and various levels of authorization and authentication systems. However, only 42 percent of respondents monitor and audit privileged users’ activity. Without the right auditing tool, it is impossible to definitively determine “who did what” in a given network, which can lead to disputes over responsibility and costly investigations.

This article originally appeared in the August 2014 issue of Security Today.

Featured

  • New Gas Monkey Garage Venue Uses AI-Enhanced Video Technology

    Gas Monkey Garage, the automotive custom shop and entertainment brand founded by Richard Rawlings of Fast N’ Loud TV fame, has opened a vibrant new restaurant and bar in South Dakota, equipped with advanced, AI-enhanced video tech from IDIS Americas. Read Now

  • Data Driven, Proactive Response

    As cities face rising demands for smarter policing and faster emergency response, Real Time Crime Centers (RTCCs) are emerging as essential hubs for data-driven public safety. In this interview, two experts with deep field experience — Ross Bourgeois of New Orleans and Dean Cunningham of Axis Communications — draw on decades of operational, leadership and technology expertise to share how RTCCs are transforming public safety through innovation, interagency collaboration and a relentless focus on community impact. Read Now

  • Integration Imagination: The Future of Connected Operations

    Security teams that collaborate cross-functionally and apply imagination and creativity to envision and design their ideal integrated ecosystem will have the biggest upside to corporate security and operational benefits. Read Now

  • Smarter Access Starts with Flexibility

    Today’s workplaces are undergoing a rapid evolution, driven by hybrid work models, emerging smart technologies, and flexible work schedules. To keep pace with growing workplace demands, buildings are becoming more dynamic – capable of adapting to how people move, work, and interact in real-time. Read Now

  • Trends Keeping an Eye on Business Decisions

    Today, AI continues to transform the way data is used to make important business decisions. AI and the cloud together are redefining how video surveillance systems are being used to simulate human intelligence by combining data analysis, prediction, and process automation with minimal human intervention. Many organizations are upgrading their surveillance systems to reap the benefits of technologies like AI and cloud applications. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.