<section title="23.1. Public Cloud Security Concepts"><subsection title="Objective"><paragraph
    title="23.1.1."


><![CDATA[<p>Agencies understand key concepts and implement controls related to securing their use of public cloud services.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="23.1.2."


><![CDATA[<p class="NormS23C1">This section covers information about the key security concepts and architecture patterns related to public cloud services.</p>]]></paragraph>
<paragraph
    title="23.1.3."


><![CDATA[<p class="NormS23C1">Cloud technologies require a different approach to the delivery of ICT services, and this extends to the way information security controls are implemented for cloud services.</p>]]></paragraph>
<paragraph
    title="23.1.4."


><![CDATA[<p class="NormS23C1">Public cloud security builds on the application of Zero Trust concepts and principles.  Zero Trust is the recommended approach to ICT system security, especially when using public cloud services.</p>]]></paragraph>
<paragraph
    title="23.1.5."


><![CDATA[<p class="NormS23C2">Reference to other chapters and sections in this document is essential.&nbsp; In particular:</p><ul>
<li><a title="Using cloud services" href="http://nzism.gcsb.govt.nz/ism-document#Section-12164">Section 2.3 – Using cloud services</a></li>
</ul>]]></paragraph>
</block>
<block title="Mandates, directives and requirements"><paragraph
    title="23.1.6."


><![CDATA[<p class="NormS23C1">In August 2013, the government introduced their approach to cloud computing, establishing a ‘cloud first’ policy and an All-of-Government direction to cloud services development and deployment. This is enabled by the Cabinet Minute [CAB&nbsp;Min&nbsp;(13)&nbsp;37/6B].</p>]]></paragraph>
<paragraph
    title="23.1.7."


><![CDATA[<p class="NormS23C1">Under the ‘cloud first’ policy public service agencies are expected to adopt approved cloud services either when faced with new procurements, or an upcoming contract extension decision.</p>]]></paragraph>
<paragraph
    title="23.1.8."


><![CDATA[<p class="NormS23C1">In July 2016, Cabinet subsequently agreed that agencies can also use public cloud to deliver office productivity services, provided they comply with security guidance issued by the GCDO and the GCSB [CAB-16-MIN-0316].</p>]]></paragraph>
<paragraph
    title="23.1.9."


><![CDATA[<p class="NormS23C1">Agencies are required to identify and manage risks associated with the use of cloud services through the GCDO Cloud Risk Assessment process [CAB Min (13) 37/6B].&nbsp; More information regarding cloud specific risk management can be found at <a title="Digital.gov" rel="noopener noreferrer" href="https://digital.govt.nz/standards-and-guidance/technology-and-architecture/cloud-services/assess-the-risks/" target="_blank">digital.govt.nz</a>.</p>]]></paragraph>
<paragraph
    title="23.1.10."


><![CDATA[<p class="NormS23C1">Agencies are also required to certify and accredit their ICT systems and services, including those delivered through cloud technologies.  Chapter 4 of this manual describes the certification and accreditation processes and these also apply to cloud services.</p>]]></paragraph>
<paragraph
    title="23.1.11."


><![CDATA[<p class="NormS23C1">CAB Min (13) 37/6B directs that no data classified above RESTRICTED may be held in a public cloud.</p>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="23.1.12."


><![CDATA[<p class="NormS23C1">Adopting or using cloud services introduces new approaches to:</p><ul>
<li>Workload descriptions and management.</li>
<li>Procurement and contract management.</li>
<li>Virtualisation and the separation of resources using hyperscale technologies and strict control-plane/data-plane, tenant/tenant and tenant/provider segregation.</li>
<li>Key information security services used to control the information boundary: using identity, directories and authorisation, instead of networks, gateways and firewalls.</li>
<li>The approach to and selection of critical security services such as intrusion detection, key management, encryption, endpoint controls, privileged and user access management and authentication (including MFA).</li>
</ul>]]></paragraph>
</block>
<block title="Public cloud use within other cloud deployment models"><paragraph
    title="23.1.13."


><![CDATA[<p class="NormS23C1">All the standard cloud deployment models described by ISO and NIST could incorporate elements of public cloud, including:</p><ul>
<li>Private cloud, hosted on third party public cloud infrastructure.</li>
<li>Multi cloud, combining elements of different vendors’ public cloud services.</li>
<li>Hybrid cloud, combining elements of private and public cloud services.</li>
</ul>]]></paragraph>
<paragraph
    title="23.1.14."


><![CDATA[<p class="NormS23C1">The focus of this chapter is on security concerns related to the use of public cloud technologies irrespective of the cloud service’s primary deployment model.  This is to avoid these concerns being considered out of scope due to inconsistencies in definitions being applied.</p>]]></paragraph>
</block>
<block title="Characteristics of public cloud"><paragraph
    title="23.1.15."


><![CDATA[<p class="NormS23C1">There is not a single accepted definition of exactly what constitutes public cloud.  Typically public cloud refers to cloud services that are generally available for anyone to use and are accessed through the internet.</p>]]></paragraph>
<paragraph
    title="23.1.16."


><![CDATA[<p class="NormS23C1">For the avoidance of doubt, information in this chapter relates to public cloud services where:</p><ul>
<li>The infrastructure used to deliver the public cloud services is not owned by the agency (i.e., server hardware, network devices).</li>
<li>The cloud infrastructure is shared between many customers (‘multi-tenanted’) and is accessible from the internet.</li>
<li>Service provisioning is automated and customer managed.</li>
<li>There is strict isolation between customer instances, and between customer instances and the service provider’s management plane.</li>
<li>Customer data is isolated and controls are in place that strictly manage access by the service provider.</li>
<li>There is a defined shared responsibility matrix for ensuring the services meet customer security requirements.  It should be noted that regardless of the model, agencies will retain ultimate accountability for the security of their information.</li>
<li>There is limited flexibility in how the services are configured, and in at least some aspects there may be no flexibility to customise the service.</li>
</ul>]]></paragraph>
</block>
<block title="Responsibility for security in public cloud is necessarily shared"><paragraph
    title="23.1.17."


><![CDATA[<p class="NormS23C1">Agencies share responsibility for the security of their public cloud environments with their cloud service providers.</p>]]></paragraph>
<paragraph
    title="23.1.18."


><![CDATA[<p class="NormS23C1">Due to differences in how cloud providers operate, there is no single model that can fully describe the boundary between agency security responsibilities and those of the cloud service provider.  Cloud service provider responsibilities may even vary between their different service offerings.</p>]]></paragraph>
<paragraph
    title="23.1.19."


><![CDATA[<p class="NormS23C1">The following is an example of how responsibilities for security in a cloud service could be shared, although every service is different:&nbsp;</p>
<p class="NormS23C1"><img class="leftAlone" title="" src="assets/NZISM/PCS-Section-1-Diagram-1-Shared-Responsibility2.png" alt="" width="600" height="240"></p>]]></paragraph>
<paragraph
    title="23.1.20."


><![CDATA[<p class="NormS23C1">It is essential that agencies understand where the cloud service provider’s responsibilities end and their own begin for each cloud service they consume, so there is no gap left unaddressed.</p>]]></paragraph>
<paragraph
    title="23.1.21."


><![CDATA[<p class="NormS23C1">Agency security processes, such as certification and accreditation or incident response, must be revised to ensure compatibility with their cloud service provider’s responsibilities.</p>]]></paragraph>
</block>
<block title="Risks and benefits associated with public cloud services"><paragraph
    title="23.1.22."


><![CDATA[<p class="NormS23C1">Public cloud services can provide agencies with significant security benefits when adopted in a controlled and well understood manner, including:</p><ul>
<li>Pervasive identity and authorisation model.</li>
<li>Consistent, software-orchestrated environments running immutable workloads.</li>
<li>Automated response to security incidents or misconfigurations.</li>
<li>Fine-grained access control.</li>
<li>Scalable logging, monitoring and audit.</li>
<li>Improved levels of baseline security.</li>
<li>Enhanced visibility of security state.</li>
</ul>]]></paragraph>
<paragraph
    title="23.1.23."


><![CDATA[<p class="NormS23C1">The use of public cloud services introduces additional specific risks that require careful control selection to manage.</p>]]></paragraph>
<paragraph
    title="23.1.24."


><![CDATA[<p class="NormS23C1">The following examples highlight key areas of public cloud-specific risks that need to be understood and managed:</p><ul>
<li>Traditional barriers limiting the movement of agency data across legal jurisdictions can be significantly reduced through the use of cloud services.</li>
<li>Cloud service provider self-service tools can be subject to manipulation impacting agency infrastructure.</li>
<li>Agency systems delivered using cloud services are typically accessible from the internet, including management interfaces, unless controls are put in place.</li>
<li>Agency data is stored on shared platforms, in multiple locations, with agencies ultimately being accountable for ensuring information is secured.</li>
<li>Cloud environments present large, high value targets, where single exploits can impact large numbers of customers.</li>
<li>Cloud services are easier to consume without needing to involve common governance processes, such as change control, increasing the risk of using shadow services without adequate information security controls in place.</li>
<li>On-demand services, coupled with rapid-elasticity, can lead to inappropriate use of agency cloud environments.  Agencies are responsible for tracking billing and usage metrics and ensuring appropriate controls are in place to manage fiscal constraints.</li>
</ul>]]></paragraph>
<paragraph
    title="23.1.25."


><![CDATA[<p class="NormS23C1">The GCDO Cloud Risk Assessment process is intended to help agencies understand these, and other, risks associated with the use of public cloud.</p><p class="NormS23C1"> </p>]]></paragraph>
</block>
<block title="Public cloud impacts on security control selection"><paragraph
    title="23.1.26."


><![CDATA[<p class="NormS23C1">Depending on whether responsibility for implementing security controls rests on the cloud service provider or the agency, enterprise security controls or standards may not be possible to implement uniformly in public cloud services, for example:</p><ol style="list-style-type: lower-alpha;">
<li>Agents used to manage configuration or collect system telemetry may not be able to be deployed across public cloud services.</li>
<li>Log messages may not be able to be centrally collected, or log information tailored to agency requirements, from public cloud services.</li>
<li>Network information, such as packet captures, may not be feasible to collect.</li>
<li>Traditional security devices, such as firewalls and proxy servers, may not be able to be deployed.</li>
</ol>]]></paragraph>
</block>
<block title="Security boundaries in cloud"><paragraph
    title="23.1.27."


><![CDATA[<p class="NormS23C1">Security boundaries exist to identify where differing security requirements and policies need to be applied to information and infrastructure assets operated in support of agency outcomes.&nbsp; Well defined security boundaries are a key construct in support of:</p><ul>
<li>Protecting environments by providing control enforcement points to manage information flows between internal systems and externally to the environment.</li>
<li>Providing containment points where the impact of incidents can be limited in scope, which also aids in recovery.</li>
</ul>]]></paragraph>
<paragraph
    title="23.1.28."


><![CDATA[<p class="NormS23C1">Well defined security boundaries can ensure that information is accessible for authorised users and that restrictions do not limit those users’ access to information to which they are entitled.</p>]]></paragraph>
<paragraph
    title="23.1.29."


><![CDATA[<p class="NormS23C1">There are three key constructs used to describe security policy boundaries in the NZISM.&nbsp; These are <em>classification</em>, <em>security domain</em> and <em>trust zone</em>. &nbsp;Information and systems are subject to the combined requirements described in these policies.&nbsp;</p>
<p class="NormS23C1"><img class="leftAlone" title="" src="assets/NZISM/PCS-Section-1-Diagram-2-Security-boundaries-1.png" alt="" width="600" height="316"></p>]]></paragraph>
<paragraph
    title="23.1.30."


><![CDATA[<p class="NormS23C1">In public cloud, the <em>classified system</em> refers to the highest level of classified information that can be stored, or processed, by systems in the agency’s cloud environment.  The highest level of classified information the classified system can store or process is based on the lower of:</p><ul>
<li>The highest classification the system is accredited to operate at, AND</li>
<li>The lowest clearance level authorised users of the system hold.</li>
</ul><p class="NormS17C1">The highest classification of information a <em>classified system</em> in public cloud can be accredited to operate with is RESTRICTED.</p>]]></paragraph>
<paragraph
    title="23.1.31."


><![CDATA[<p class="NormS23C1">Minimum security requirements based on classification are described in the Protective Security Requirements and the NZISM.</p>]]></paragraph>
<paragraph
    title="23.1.32."


><![CDATA[<p class="NormS23C1">A <em>security domain</em> in public cloud can be categorised as a group of <em>trust zones</em> operating under a common set of security requirements and policies.  These security requirements and policies are formed through a combination of:</p><ul>
<li>Minimum security control requirements from the PSR and NZISM, determined by the classification.</li>
<li>Security control requirements to manage the unique threat environment presented by the use of the public cloud services.</li>
<li>Additional security control requirements to manage specific risks identified through risk assessments.</li>
</ul>]]></paragraph>
<paragraph
    title="23.1.33."


><![CDATA[<p class="NormS23C1">Examples of the unique threat environment related to the use of public cloud services include:</p><ul>
<li>Access to the underlying infrastructure by the public cloud service provider systems and staff.</li>
<li>Differing relative importance of security controls, such as identity, and the addition of different types of privileged access such as for managing service subscriptions and billing (including terminating services) that can have immediate effect.</li>
<li>Geographic locations where the public cloud services are being delivered from.</li>
<li>Security controls being defined and implemented by the public cloud service provider.</li>
<li>The ease of extending access to third parties, including third party applications, through in-built federation and directory integration services in public cloud.</li>
<li>The ease of shifting data between services and geographic locations in public cloud environments compared to on-premise systems.</li>
<li>The control and visibility of the security state of the underlying infrastructure platforms, including the physical hosting environment.</li>
</ul>]]></paragraph>
<paragraph
    title="23.1.34."


><![CDATA[<p class="NormS23C1">Defining <em>trust zones</em> provides a mechanism to differentiate security controls used to manage access to information and services within an agency’s public cloud environment.</p>]]></paragraph>
<paragraph
    title="23.1.35."


><![CDATA[<p>In the public cloud environment, <em>trust zones</em> represent combinations of public cloud services (made up of user, system and data objects) that are authorised to interact with each other and are protected by a common set of security capabilities. &nbsp;The security controls associated with these security capabilities are applied at policy enforcement points:</p>
<p><img class="leftAlone" title="" src="assets/NZISM/PCS-Section-1-Diagram-3-Security-Boundaries-3.png" alt="" width="600" height="305"></p>]]></paragraph>
<paragraph
    title="23.1.36."


><![CDATA[<p class="NormS23C1">Traditional policy enforcement point implementations based on location-based network perimeter security controls can be difficult to successfully replicate in public cloud environments. </p>]]></paragraph>
<paragraph
    title="23.1.37."


><![CDATA[<p>In public cloud, access control policy enforcement points are tied to authorised combinations of user, system, and data object identities.</p>]]></paragraph>
</block>
<block title="Security boundaries between cloud providers and customers"><paragraph
    title="23.1.38."


><![CDATA[<p class="NormS23C1">A significant difference between public cloud and traditional computing is the additional set of administration services used by the cloud service provider to manage the overall cloud platform.</p>]]></paragraph>
<paragraph
    title="23.1.39."


><![CDATA[<p class="NormS23C1">Some of these administration services are exposed to tenants to facilitate tenancy management, such as maintaining customer contact and billing details or creating and deleting top level tenant resources.  In some circumstances, third parties can be provided access to perform these actions on behalf of tenants.</p>]]></paragraph>
<paragraph
    title="23.1.40."


><![CDATA[<p class="NormS23C1">Due to the significant impact from a compromise, access to these services and the associated privileged identities requires a high degree of trust in those responsible.&nbsp; Ensuring separation of duties (i.e., multi-user authorisation, see section <a href="http://nzism.gcsb.govt.nz/ism-document#Paragraph-15709">16.7.19</a>) in this area is highly recommended. <strong><br></strong></p>
<p class="NormS23C1"><img class="leftAlone" title="" src="assets/NZISM/PCS-Section-1-Diagram-4-Security-Boundaries-4.png" alt="" width="600" height="370"></p>]]></paragraph>
</block>
<block title="Virtualisation and multi-tenant security in public cloud"><paragraph
    title="23.1.41."


><![CDATA[<p class="NormS23C1">Within a public cloud environment adequately architected, designed, and implemented virtualisation technologies can be used to provide isolation between tenants and separation between security domains.</p>]]></paragraph>
<paragraph
    title="23.1.42."


><![CDATA[<p class="NormS23C1">Public cloud service providers that are designed to use technology to implement strict isolation between tenant environments, and separate customer management from platform management, are more likely to provide adequately architected security controls to support security domain separation in a virtualised environment.</p>]]></paragraph>
<paragraph
    title="23.1.43."


><![CDATA[<p class="NormS23C1">Examples of adequately architected security controls that support tenant isolation in public cloud services can include:</p><ol style="list-style-type: lower-alpha;">
<li>Zero touch configuration of infrastructure using well defined infrastructure as code pipelines.</li>
<li>Separation of the cloud provider platform’s administrative control interfaces from customer accessible tenant management services.</li>
<li>An inability for cloud provider staff to access customer data except through customer authorised access channels (i.e., the platform does not provide ‘back door’ access to customer data).</li>
</ol>]]></paragraph>
<paragraph
    title="23.1.44."


><![CDATA[<p>At a minimum, a security domain control boundary exists between components where different parties undertake configuration and management responsibilities. <strong><br></strong></p>
<p><img class="leftAlone" title="" src="assets/NZISM/PCS-Section-1-Diagram-5-Virtualisation-Multi-tenancy-2.png" alt="" width="600" height="468"></p>]]></paragraph>
</block>
<block title="Collaboration between agencies in public cloud"><paragraph
    title="23.1.45."


><![CDATA[<p class="NormS23C1">Public cloud services, due to their multi-tenant design and support for integration to multiple identity providers, can provide a convenient platform for collaboration systems between agencies.</p>]]></paragraph>
<paragraph
    title="23.1.46."


><![CDATA[<p class="NormS23C1">It is usually not possible, nor desirable, to implement traditional DMZ or Landing Zone network architectures to facilitate third party access to an agency’s public cloud services where collaboration is the goal.</p>]]></paragraph>
<paragraph
    title="23.1.47."


><![CDATA[<p class="NormS23C1">For public cloud collaboration systems, it is often more practical to grant access to individual third party identities, or to federate (i.e., trust) the third party’s identity service to perform authentication on the collaboration system’s behalf.</p>]]></paragraph>
<paragraph
    title="23.1.48."


><![CDATA[<p class="NormS23C1">When multiple identity systems are used to control access to shared public cloud collaboration systems, the shared system operates to a <em>common policy</em> that covers all of the participating agencies security requirements.</p>]]></paragraph>
<paragraph
    title="23.1.49."


><![CDATA[<p class="NormS23C1">The <em>common policy</em> reflects a different security domain from each of the participating agencies, providing the equivalence of a DMZ environment in public cloud. <strong><br></strong></p>
<p class="NormS23C1"><img class="leftAlone" title="" src="assets/NZISM/PCS-Section-1-Diagram-6-Virtualisation-Multi-tenancy-3.png" alt="" width="600" height="325"></p>]]></paragraph>
<paragraph
    title="23.1.50."


><![CDATA[<p class="NormS23C1">When systems are operating in separate security domains, agencies must follow the guidance regarding <em>Information transfer and release in public cloud </em>described in this chapter of the NZISM.</p>]]></paragraph>
</block>
<block title="Information transfer and release in public cloud"><paragraph
    title="23.1.51."


><![CDATA[<p class="NormS23C1">Information being released from trust zones, destined either internally or externally to the security domain, must always follow the requirements for <a title="Data management" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16835"><em>Data management</em> described in Chapter 20</a> and <a title="Gateway security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16567"><em>Gateway security</em> described in Chapter 19</a> of the NZISM.&nbsp; This includes where data is being backed up or replicated to systems operating in a different trust zone.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="23.1.52."


><![CDATA[<p class="NormS23C1">Further references can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>CAB Min (13) 37/6B</strong></td>
<td>&nbsp;Cloud computing risk and assurance framework (CAB Min (13) 37/6B)</td>
<td>&nbsp;</td>
<td><a title="Cabinet minute (13) 37/6B" rel="noopener noreferrer" href="https://digital.govt.nz/standards-and-guidance/technology-and-architecture/cloud-services/about/cabinet-minutes/" target="_blank">Cabinet minutes for public cloud services | NZ Digital government</a></td>
</tr>
<tr>
<td><strong>CAB-16-MIN-0316</strong></td>
<td>&nbsp;Accelerating the adoption of public cloud services CAB-16-MIN-0316&nbsp;</td>
<td>&nbsp;</td>
<td>&nbsp;</td>
</tr>
<tr>
<td><strong>&nbsp;NIST SP 800-145 (2011)</strong></td>
<td>&nbsp;The NIST definition of cloud computing&nbsp;</td>
<td>&nbsp;NIST</td>
<td><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/detail/sp/800-145/final" target="_blank">SP 800-145, The NIST Definition of Cloud Computing | CSRC</a></td>
</tr>
<tr>
<td><strong>NIST SP 500-293 (2014)</strong></td>
<td>&nbsp;US Government cloud computing technology roadmap</td>
<td>&nbsp;NIST</td>
<td><a rel="noopener noreferrer" href="https://www.nist.gov/publications/us-government-cloud-computing-technology-roadmap-volume-i-high-priority-requirements" target="_blank">US Government Cloud Computing Technology Roadmap Volume I: High-Priority Requirements to Further USG Agency Cloud Computing Adoption; and Volume II: Useful Information for Cloud Adopters | NIST</a></td>
</tr>
<tr>
<td><strong>NIST SP 500-291 (2011)</strong></td>
<td>&nbsp;NIST cloud computing standards roadmap</td>
<td>&nbsp;NIST</td>
<td><a rel="noopener noreferrer" href="https://www.nist.gov/publications/nist-sp-500-291-nist-cloud-computing-standards-roadmap" target="_blank">NIST-SP 500-291, NIST Cloud Computing Standards Roadmap | NIST</a></td>
</tr>
<tr>
<td><strong>NIST SP 800-144 (2011)</strong></td>
<td>&nbsp;Guidelines on security and privacy in public cloud computing&nbsp;</td>
<td>&nbsp;NIST</td>
<td><a rel="noopener noreferrer" href="https://www.nist.gov/publications/guidelines-security-and-privacy-public-cloud-computing" target="_blank">Guidelines on Security and Privacy in Public Cloud Computing | NIST</a></td>
</tr>
<tr>
<td><strong>NIST SP-800-210 (2020)</strong></td>
<td>&nbsp;General access control guidance for cloud systems&nbsp;</td>
<td>&nbsp;NIST</td>
<td><a rel="noopener noreferrer" href="https://www.nist.gov/publications/general-access-control-guidance-cloud-systems" target="_blank">General Access Control Guidance for Cloud Systems | NIST</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 17789:2014</strong></td>
<td>&nbsp;Information technology -- Cloud computing -- Reference architecture&nbsp;</td>
<td>&nbsp;ISO/IEC</td>
<td><a rel="noopener noreferrer" href="https://www.iso.org/standard/60545.html" target="_blank">ISO - ISO/IEC 17789:2014 - Information technology — Cloud computing — Reference architecture</a></td>
</tr>
<tr>
<td><strong>ISO/IEC 27017:2015</strong></td>
<td>&nbsp;Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services</td>
<td>&nbsp;ISO/IEC</td>
<td><a rel="noopener noreferrer" href="https://www.iso.org/standard/43757.html" target="_blank">ISO - ISO/IEC 27017:2015 - Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>&nbsp;CSF Tools</td>
<td>&nbsp;CSF</td>
<td><a rel="noopener noreferrer" href="https://csf.tools/" target="_blank">Welcome to CSF Tools - CSF Tools</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><span>Trusted internet connections</span></td>
<td><span>CISA</span></td>
<td><a rel="noopener noreferrer" href="https://www.cisa.gov/tic" target="_blank">TIC | CISA</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>Cloud security technical reference architecture</td>
<td>CISA</td>
<td><a rel="noopener noreferrer" href="https://www.cisa.gov/cloud-security-technical-reference-architecture" target="_blank">Cloud Security Technical Reference Architecture | CISA</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><span>Cloud Security Alliance</span></td>
<td><span>CISA</span></td>
<td><a rel="noopener noreferrer" href="https://cloudsecurityalliance.org/" target="_blank">Home | CSA (cloudsecurityalliance.org)</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR References"><paragraph
    title="23.1.53."


><![CDATA[<p class="NormS23C2">Relevant PSR requirements can be found at:</p><table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>PSR mandatory requirements</strong></td>
<td>
<p class="NormS5C1">GOV2 - Take a risk-based approach</p>
<p class="NormS5C1">GOV5 - Manage risks when working with others</p>
<p class="NormS5C1">GOV6 - Manage security incidents</p>
<p class="NormS5C1">INFOSEC1 - Understand what you need to protect</p>
<p class="NormS5C1">INFOSEC2 - Design your information security</p>
<p class="NormS5C1">INFOSEC3 - Validate your security measures</p>
INFOSEC4 - Keep your security up to date</td>
<td><a rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/governance/mandatory-requirements/" target="_blank">Mandatory requirements | Protective Security Requirements</a></td>
</tr>
<tr>
<td><strong>PSR protocol for information security</strong></td>
<td>Management protocol for information security</td>
<td><a rel="noopener noreferrer" href="https://protectivesecurity.govt.nz/information-security/management-protocol-2/" target="_blank">Management protocol for information security | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Cloud security boundaries"><paragraph
    title="23.1.54.R.01."

    tags="Cloud Computing,Technical,Public cloud security"


><![CDATA[<p>Security boundaries identify the scope of security policy applicability, and determine where <em>data management</em> controls will apply.&nbsp; Refer to <a title="Data Management" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16835">Chapter 20 – Data Management</a>.</p>]]></paragraph>
<paragraph
    title="23.1.54.C.01."

    tags="Cloud Computing,Technical,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7349"
><![CDATA[<p>Agencies MUST clearly identify and understand where classification, security domain, and trust zone boundaries exist <strong>prior</strong> to implementation or adoption of public cloud services.</p>]]></paragraph>
<paragraph
    title="23.1.54.C.02."

    tags="Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7350"
><![CDATA[<p>Where multiple identity systems under different security policies are used to control access to an agency’s instance of a public cloud service, the instance MUST be considered to be in a separate security domain from services where access control is managed solely by the agency’s identity system.</p>]]></paragraph>
</block>
<block title="Shared responsibility model"><paragraph
    title="23.1.55.R.01."

    tags="Cloud Computing,Technical,Public cloud security"


><![CDATA[<p>The responsibility for the selection, implementation, management, and maintenance of controls in public cloud services is shared between the provider and the consumer.  Precisely where the responsibilities lie depends on the provider and the service and deployment models (refer to NIST SP 800-145) used in the delivery of the specific public cloud service.</p>]]></paragraph>
<paragraph
    title="23.1.55.C.01."

    tags="Cloud Computing,Technical,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7353"
><![CDATA[<p>Agencies MUST clearly identify and understand their cloud service provider’s security responsibilities for each service consumed, and the aspects of security that the agency is responsible for, <strong>prior</strong> to implementation or adoption of the service.</p>]]></paragraph>
<paragraph
    title="23.1.55.C.02."

    tags="Cloud Computing,Technical,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="7354"
><![CDATA[<p>Agencies SHOULD clearly document the aspects of security they and their provider are responsible for.</p>]]></paragraph>
<paragraph
    title="23.1.55.C.03."

    tags="Cloud Computing,Technical,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="7355"
><![CDATA[<p>Agencies SHOULD review existing security processes to ensure compatibility with their cloud service provider’s responsibilities.</p>]]></paragraph>
</block>
<block title="Automation and infrastructure as code"><paragraph
    title="23.1.56.R.01."

    tags="Cloud Computing,Technical,Public cloud security"


><![CDATA[<p>Tools and APIs that generate code used to configure cloud services enable automated deployment and management of resources in a repeatable manner.</p>]]></paragraph>
<paragraph
    title="23.1.56.R.02."

    tags="Cloud Computing,Technical,Public cloud security"


><![CDATA[<p>Infrastructure as code, where resources and their configurations are defined in machine-readable code, can drive automated deployment tools that support software engineering techniques such as version control, continuous integration and deployment, and automated security testing.  In particular, disciplined version control can support the ability to roll back failed changes to the “last known good” configuration as part of agency change control processes.</p>]]></paragraph>
<paragraph
    title="23.1.56.C.01."

    tags="Cloud Computing,Technical,Public cloud security"


    classification="All Classifications"
    compliance="Should"
    cid="7359"
><![CDATA[<p>Agencies SHOULD deploy and manage their cloud infrastructure using automation, version control, and infrastructure as code techniques where these are available.</p>]]></paragraph>
</block>
</subsection>
</section>
