https://www.techtarget.com/searchsecurity/tip/Cloud-risk-management-explained-Just-how-secure-are-you
The following is an excerpt from The Official (ISC)2 Guide to the CCSP CBK, Second Edition, by Adam Gordon, CISSP-ISSAP, ISSMP, SSCP. This section from Domain 3 describes the different categories of threats to consider in cloud risk management.
Because information technology (IT) is typically deployed to serve the interests of the organization, the goals and management practices in that organization are an important source of guidance to cloud risk management. From the perspective of the enterprise, cloud computing represents outsourcing, and it becomes part of the IT supply chain.
Cloud risk management should therefore be linked to corporate governance and enterprise risk management. That means that the same principles should be applied. Corporate governance is a broad area describing the relationship between the shareholders and other stakeholders in the organization versus the senior management of the corporation. These stakeholders need to see that their interests are taken care of and that the management has a structure and a process to ensure that they execute the goals of the organization. This requires, among other things, transparency on costs and risks.
In the end, risks relating to cloud computing should be judged in relation to the corporate goals. It makes sense to develop any IT governance processes in alignment with existing corporate governance processes.
For example, corporate governance pays attention to supply chains, management structure, compliance, financial transparency, and ownership. All these are relevant for any cloud computing consumer provider relationship that is significant to the corporation.
Enterprise risk management is the set of processes and structure to systematically manage all risks to the enterprise. This explicitly covers supply chain risks and third-party risks, the biggest of which is typically the failure of an external provider to deliver the services that are contracted -- an important consideration in cloud risk management.
There are several lists of risks maintained and published by industry organizations. These lists can be a source of valuable insight and information, but in the end, every cloud-consuming or cloud-providing organization remains responsible for its own risk assessment.
Policy and organization risks are related to the choices that the cloud service consumer makes about the CSP. To some extent, they are the natural consequence of outsourcing IT services. Outside the IT industry, these are often called third-party risks. A few of the most noteworthy in the context of cloud risk management are provider lock-in, loss of governance, compliance challenges, and provider exit.
Provider lock-in: This refers to the situation in which the consumer has made significant vendor-specific investments. These can include adaptation to data formats, procedures and feature sets. These investments can lead to high costs of switching between providers.
Loss of governance: This refers to the consumer not being able to implement all required controls. This can lead to the consumer not realizing their required level of security and potential compliance risks.
Compliance risks: Consumers often have significant compliance obligations, such as when handling payment card information, health data, or other personally identifiable information (PII). A specific cloud vendor and solution may not be able to fulfill all those obligations, for example, when the location of stored data is insufficiently under control.
Provider exit: in this situation, the provider is no longer willing or capable of providing the required service. This could be triggered by bankruptcy or a need to restructure the business.
A risk exists if there is the potential failure to meet any requirement that can be expressed in technical terms, such as performance, operability, integration, and protection. Generally speaking, CSPs have a larger technology scale than cloud customers and traditional IT departments. This has three effects on cloud risk management, the net result of which depends on the actual situation:
Virtualization risks include but are not limited to the following:
Cloud-specific risks include but are not limited to the following:
Cloud computing brings additional attack vectors that need to be considered in addition to new technical and governance risks.
Therefore, with respect to cloud risk management, the following are some of the main new attack vectors:
CCSP® is a registered mark of (ISC)².
12 Jun 2018