<section title="23.4. Data Protection in Public Cloud"><subsection title="Objective"><paragraph
    title="23.4.1."


><![CDATA[<p class="NormS23C4">Data is protected throughout its lifecycle on public cloud platforms.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="23.4.2."


><![CDATA[<p class="NormS23C4">This section provides information on keeping data in a public cloud environment secure from creation to destruction, whether at rest, in-transit, during processing, or when it is no longer required.</p>]]></paragraph>
<paragraph
    title="23.4.3."


><![CDATA[<p class="NormS23C4">Key considerations for keeping agency data secure in public cloud are that data is stored and processed on systems that:</p><ul>
<li>Are not under direct agency control.</li>
<li>Are designed to be potentially accessible from anywhere.</li>
<li>Can be accessed by multiple end-point devices.</li>
<li>May replicate the data to multiple locations.</li>
</ul>]]></paragraph>
<paragraph
    title="23.4.4."


><![CDATA[<p class="NormS23C4">Where these systems are located outside New Zealand, or a New Zealand-based service is provided by an entity subject to another country’s laws, there may be additional jurisdictional risks to privacy and sovereignty to consider.</p>]]></paragraph>
<paragraph
    title="23.4.5."


><![CDATA[<p class="NormS23C4">Reference to other chapters and sections in this document is essential.&nbsp; In particular:</p><ul>
<li><a title="Business continuity and disaster recovery" href="http://nzism.gcsb.govt.nz/ism-document#Section-13074">Section 6.4 – Business continuity and disaster recovery</a></li>
<li><a title="System Decommissioning" href="http://nzism.gcsb.govt.nz/ism-document#Section-14679">Section 13.1– System decommissioning</a></li>
<li><a title="Cryptography" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 – Cryptography</a></li>
<li><a title="Network security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16188">Chapter 18 – Network security</a></li>
<li><a title="Data management" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16835">Chapter 20 – Data management</a></li>
<li><a title="Distributed working" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-17003">Chapter 21 – Distributed working</a></li>
<li><a title="Governance, Risk Assessment &amp; Assurance" href="http://nzism.gcsb.govt.nz/ism-document#Section-17478">Chapter 23.2 - Public cloud services - Governance, risk assessment and assurance</a></li>
</ul>]]></paragraph>
</block>
<block title="Data accessibility"><paragraph
    title="23.4.6."


><![CDATA[<p class="NormS23C4">Public cloud services are often promoted for their ability to make organisations’ data assets more accessible, both within the organisation and to partners or customers. This benefit also brings risks such as default accessibility from the internet and requires agencies to carefully manage access to data.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="23.4.7."


><![CDATA[<p class="NormS23C4">Further references can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference&nbsp;</strong></td>
<td><strong>Title&nbsp;</strong></td>
<td><strong>Publisher&nbsp;</strong></td>
<td><strong>&nbsp;Source</strong></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>&nbsp;Cloud security technical reference architecture</td>
<td>&nbsp;CISA</td>
<td>&nbsp;<a rel="noopener noreferrer" href="https://www.cisa.gov/cloud-security-technical-reference-architecture" target="_blank">Cloud Security Technical Reference Architecture | CISA</a></td>
</tr>
<tr>
<td><strong>&nbsp;ISO 27001:2013</strong></td>
<td>&nbsp;Information technology — Security techniques — Information security management systems — Requirements</td>
<td>&nbsp;ISO</td>
<td>&nbsp;<a rel="noopener noreferrer" href="https://www.iso.org/standard/54534.html" target="_blank">ISO - ISO/IEC 27001:2013 - Information technology — Security techniques — Information security management systems — Requirements</a></td>
</tr>
<tr>
<td><strong>&nbsp;NIST SP 800-144 (2011)</strong></td>
<td>&nbsp;Guidelines on security and privacy in public cloud computing&nbsp;</td>
<td>&nbsp;NIST</td>
<td>&nbsp;<a rel="noopener noreferrer" href="https://www.nist.gov/publications/guidelines-security-and-privacy-public-cloud-computing" target="_blank">Guidelines on Security and Privacy in Public Cloud Computing | NIST</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR References"><paragraph
    title="23.4.8."


><![CDATA[<p class="NormS23C4">Relevant PSR requirements can be found at:</p><table class="table-grey">
<tbody>
<tr>
<td><strong>Reference </strong></td>
<td><strong>Title </strong></td>
<td><strong>Source </strong></td>
</tr>
<tr>
<td><strong> PSR mandatory requirements</strong></td>
<td> GOV2 - Take a risk-based approach
<p class="NormS5C1">GOV5 - Manage risks when working with others</p>
<p class="NormS5C1">GOV6 - Manage security incidents</p>
<p class="NormS5C1">INFOSEC1 - Understand what you need to protect</p>
<p class="NormS5C1">INFOSEC2 - Design your information security</p>
<p class="NormS5C1">INFOSEC3 - Validate your security measures</p>
INFOSEC4 - Keep your security up to date</td>
<td> <a href="https://www.protectivesecurity.govt.nz/governance/mandatory-requirements/">Mandatory requirements | Protective Security Requirements</a></td>
</tr>
<tr>
<td><strong> PSR protocol for information security</strong></td>
<td> Management protocol for information security</td>
<td> <a href="https://www.protectivesecurity.govt.nz/information-security/management-protocol-2/">Management protocol for information security | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Data protection mechanisms"><paragraph
    title="23.4.9.R.01."

    tags="Cloud Computing,Data Management,Governance,Public cloud security,Assurance"


><![CDATA[<p class="NormS17C2"><span>Agencies remain accountable for the confidentiality, integrity, and availability of their data, even though cloud service providers may define and implement the mechanisms used to protect their data in the cloud environment.</span></p>]]></paragraph>
<paragraph
    title="23.4.9.R.02."

    tags="Cloud Computing,Data Management,Governance,Public cloud security,Assurance"


><![CDATA[<p class="Normal-nonumbering"><span>The mechanisms available for agency control and management of keys in a public cloud environment are often tied to a specific cloud environment and migrating data to a new environment may require decryption and re-encryption.</span></p>]]></paragraph>
<paragraph
    title="23.4.9.C.01."

    tags="Cloud Computing,Data Management,Governance,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="7461"
><![CDATA[<p class="Normal-nonumbering"><span>For each cloud service, agencies MUST ensure that the mechanisms used to protect data meet agency requirements.</span></p>]]></paragraph>
<paragraph
    title="23.4.9.C.02."

    tags="Cloud Computing,Data Management,Governance,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="7462"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies MUST update key management plans to account for differences in public cloud before storing organisational data in a public cloud environment.</span></p>]]></paragraph>
<paragraph
    title="23.4.9.C.03."

    tags="Cloud Computing,Data Management,Governance,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="7463"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies MUST ensure their key management plan includes provision for migrating data from the cloud environment where it was created.</span></p>]]></paragraph>
</block>
<block title="Data accessibility"><paragraph
    title="23.4.10.R.01."

    tags="Cloud Computing,Technical,Access Control,Public cloud security"


><![CDATA[<p>Many public cloud services are designed to make customer data directly accessible through multiple interfaces. These service endpoints may be internet-accessible by default, and will have specific mechanisms that restrict access to authorised parties. Failure to consider these endpoints or to control their default accessibility risks exposure of agency information to unauthorised parties.</p>]]></paragraph>
<paragraph
    title="23.4.10.C.01."

    tags="Cloud Computing,Technical,Access Control,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7466"
><![CDATA[<p>Agencies MUST apply the principle of least privilege and configure service endpoints to restrict access to authorised parties.</p>]]></paragraph>
</block>
<block title="Data location"><paragraph
    title="23.4.11.R.01."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Public cloud security"


><![CDATA[<p>The geographic locations where public cloud data is stored may have security or privacy implications for agencies. These locations may be in jurisdictions with differing laws from New Zealand or be subject to particular environmental risks that agencies have not previously had to consider. While these factors do not of themselves prevent placing agency data in such locations, agencies have a responsibility to fully understand where their data is stored or processed and to manage any resulting risks appropriately.</p>]]></paragraph>
<paragraph
    title="23.4.11.C.01."

    tags="Cloud Computing,Data Management,Governance,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7469"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies MUST identify where data used in conjunction with a public cloud service is stored or processed, including any replicas or backups that may be created.</span></p>]]></paragraph>
<paragraph
    title="23.4.11.C.02."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Risk Assessment,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7470"
><![CDATA[<p>Agency risk assessments of public cloud services MUST include any risks arising from data location. Any actions required to mitigate these risks must be identified and documented prior to implementation or adoption of public cloud services.</p>]]></paragraph>
</block>
<block title="Revise disaster recovery plans to include data in public cloud"><paragraph
    title="23.4.12.R.01."

    tags="Cloud Computing,Data Management,Governance,Business Continuity,Public cloud security"


><![CDATA[<p>As specified in Section 6.4, Business continuity and disaster recovery, agencies must plan for recovery from loss of data to ensure they can continue to operate. Public cloud services can provide alternative mechanisms to back up and restore data from those used on premises.  Recovery processes and plans may need to be updated to account for these differences to avoid agencies finding their ability to recover from data loss is compromised.</p>]]></paragraph>
<paragraph
    title="23.4.12.R.02."

    tags="Cloud Computing,Data Management,Governance,Business Continuity,Public cloud security"


><![CDATA[<p>As well as protecting data stored natively in public cloud services, agencies may choose to back up on-premises data to the cloud or vice versa. The same considerations and opportunities for new approaches apply in all these cases.</p>]]></paragraph>
<paragraph
    title="23.4.12.C.01."

    tags="Cloud Computing,Data Management,Governance,Business Continuity,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7474"
><![CDATA[<p>Agencies MUST update their disaster recovery plans prior to storing or replicating data in public cloud services, to ensure these plans address any cloud-specific aspects of backup and recovery.</p>]]></paragraph>
<paragraph
    title="23.4.12.C.02."

    tags="Cloud Computing,Data Management,Governance,Business Continuity,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7475"
><![CDATA[<p>When planning tests of disaster recovery processes in accordance with <a title="Backup strategy" href="http://nzism.gcsb.govt.nz/ism-document#Block-13088">6.4.6&nbsp;Backup strategy</a>, agencies MUST include tests of any cloud-specific data recovery processes.</p>]]></paragraph>
</block>
<block title="Data retrieval and removal"><paragraph
    title="23.4.13.R.01."

    tags="Cloud Computing,Data Management,Governance,Public cloud security"


><![CDATA[<p class="NormS17C2">It is important to consider what would be involved in leaving or changing the provider of a public cloud service.  Planning for ending the use of a cloud service should be done before commissioning and deployment of data into the cloud.  </p>]]></paragraph>
<paragraph
    title="23.4.13.R.02."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Public cloud security"


><![CDATA[<p>Terminating cloud service contracts can have undesired consequences and risks for an agency if a managed process is not followed, for example:</p><ul>
<li>All or some agency data being retained on the cloud platform by the provider.</li>
<li>Agency data being removed prior to being retrieved by the agency.</li>
<li>Agency data being replicated to other jurisdictions before or after decommissioning.</li>
</ul>]]></paragraph>
<paragraph
    title="23.4.13.C.01."

    tags="Cloud Computing,Data Management,Governance,Risk Management,Public cloud security"


    classification="All Classifications"
    compliance="Must"
    cid="7511"
><![CDATA[<p class="Normal-nonumbering"><span>Agencies MUST have a defined exit strategy for each public cloud service they consume, including a process by which their data can be retrieved and erased from the cloud service as part of contract termination.</span></p>]]></paragraph>
<paragraph
    title="23.4.13.C.02."

    tags="Cloud Computing,Data Management,Governance,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="7512"
><![CDATA[<p>Agencies MUST ensure all data they need to retain is retrieved from the cloud service provider prior to decommissioning.</p>]]></paragraph>
<paragraph
    title="23.4.13.C.03."

    tags="Cloud Computing,Data Management,Governance,Public cloud security,Assurance"


    classification="All Classifications"
    compliance="Must"
    cid="7513"
><![CDATA[<p class="NormS17C2"><span>Agencies MUST have assurance that no agency-owned data is retained on the cloud service being decommissioned.</span></p>]]></paragraph>
</block>
</subsection>
</section>
