IT Security Compliance for Cloud Service Providers

IT Security Compliance for Cloud Service ProvidersCompliance with increasingly stringent regulations for organizations providing outsourced IT services, particularly in regards to data protection, is becoming more difficult. Reputation and client trust are fragile assets, and compliance with industry standards and legal regulations is essential to earn and maintain them. Cloud service providers (CSP) consider compliance a magical term: on one hand it’s critical to their success; on the other hand it’s imposing time-consuming burdens on the business.

A special area of compliance is IT security compliance, which is based on legal provisions and international standards. Geographic borders become blurred, however, in the provision of cloud services, making it impossible to regulate the sector solely based on local regulations. This calls for international IT security standards, such as PCI-DSS, ISO:27001, or SSAE 16/ISAE 3402 (formerly SAS 70). The largest CSPs such as Amazon Web Services and Microsoft Azure strengthen their customers’ trust by meeting these standards.

The standards include a broad range of requirements that require a comprehensive approach to compliance. In each instance, CSPs need to understand and interpret the requirements from their own perspective, then enact a thorough implementation program. This includes meeting certain requirements with specialized software. Privileged access management and centralized log management are areas in which software is typically used to meet compliance requirements, and can lead to significant cost reductions, as well as an increased level of security.

The Current Market Landscape Among Cloud Providers

Which percent of their yearly IT budget is spent on compliance investments? What is their primary motivation to meet regulations? Which are the most important industry regulations they need to meet? Which are the most important control areas when talking about compliance strategy? What type of users’s activities should be primarily monitored in cloud environments? How matured are the Privileged User’s Management strategies at cloud providers?

BalaBit IT Security and KPMG in Hungary jointly conducted an international market survey1 titled “Compliance in the IT Service Provider Sector”. The research involved 120 IT directors of IT and cloud service providers, and was conducted in February.

Figure 1 shows that approximately 60 percent of service providers spend more than 10 percent of their annual IT budget on investments related to IT security compliance. Moreover, almost one out of five spends more than 20 percent of their annual budget on compliance related items, which is well above the industry average.

More than two-thirds of those surveyed use compliance with standards primarily to ensure secure operations. This result is a positive development, as it indicates that most IT cloud service providers regard industry regulations as a framework for developing their companies’ risk management practices.

The vast majority of respondents use compliance for maintaining their reputation and acquiring more customers, which clearly shows that service providers see compliance as crucial to building trust.

Results of the survey also showed that most IT service providers consider compliance with the international standards (for example, ISO 27001 and PCI DSS) important. Naturally, the data protection regulations of the countries where a given service providers’ data centers reside are important. It is, however, essential to note that legal regulations usually build upon the principles of some international standard.

It turns out that (privileged) user access control and log management are critical elements of service providers’ compliance strategies, whereas basic technologies such as antivirus and firewall systems are much less important.

For the majority of respondents (57 percent), monitoring internal and external access to cloud infrastructure is equally important. This can be explained by the fact that access monitoring systems provide strong evidence for service providers in disputes with their customers and can settle differences of opinion quickly and cost-effectively.

It is clear from our research that most service providers employ generic user management and various levels of authorization and authentication systems. However, only 42 percent of respondents monitor and audit privileged users’ activity. Without the right auditing tool, it is impossible to definitively determine “who did what” in a given network, which can lead to disputes over responsibility and costly investigations.

This article originally appeared in the August 2014 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3