<section title="23.5. Logging and Alerting in Public Cloud"><subsection title="Objective"><paragraph
    title="23.5.1."


><![CDATA[<p class="NormS23C5">Security-related events are recorded from across an agency’s public cloud platforms and are able to be analysed for timely notification of potential threats or incidents.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="23.5.2."


><![CDATA[<p class="NormS23C5">This section describes the requirements for capturing security-related information from public cloud services by examining electronic logs for indications that unauthorised security-related activities have been attempted or performed.</p>]]></paragraph>
<paragraph
    title="23.5.3."


><![CDATA[<p class="NormS23C5">&nbsp;Reference to other chapters and sections in this document is essential.&nbsp; In particular:</p><ul>
<li><a title="Detecting information security incidents" href="http://nzism.gcsb.govt.nz/ism-document#Section-13098">Section 7.1 – Detecting information security incidents</a></li>
<li><a title="Event logging and auditing" href="http://nzism.gcsb.govt.nz/ism-document#Section-15629">Section 16.6 – Event logging and auditing</a></li>
</ul>]]></paragraph>
</block>
<block title="Logging"><paragraph
    title="23.5.4."


><![CDATA[<p class="NormS23C5">Appropriate ongoing logging is vital for detecting threat actor activity occurring within agency public cloud environments.</p>]]></paragraph>
<paragraph
    title="23.5.5."


><![CDATA[<p class="NormS23C5">Public cloud introduces particular aspects of logging that agencies must consider, including:</p><ul>
<li>Responsibility for logging and detecting anomalies is shared between the agency and its cloud service provider.</li>
<li>Cloud services may introduce differences in what information is able to be logged, where it can be logged, and in what format the log messages are constructed.  It may not be possible for the consuming agency to customise logging parameters.</li>
<li>Key security components used by cloud services may be sourced from multiple providers (e.g., identity federation or SaaS integration). Effective log monitoring and incident investigation requires these logs to be accessible and be able to be correlated with each other.</li>
<li>Some components of the environment where logs are traditionally collected may not be available in cloud environments (e.g., network traffic or boundary devices), or the information may need to be collected in different ways.</li>
<li>Only a subset of log information may be able to be exported from a cloud environment due to technical or cost implications.</li>
</ul>]]></paragraph>
<paragraph
    title="23.5.6."


><![CDATA[<p class="NormS23C5">Agencies running across multiple clouds or running a hybrid of public cloud and on premise infrastructure must also balance the advantages of platform-specific capabilities against the need for centralised visibility. Centralised visibility does not necessarily require centralised log aggregation, but agencies must be able to track and correlate activity across all the log sources available to them.</p>]]></paragraph>
</block>
<block title="Alerting"><paragraph
    title="23.5.7."


><![CDATA[<p>While logging is vital for detecting threat actor activity occurring across agency public cloud systems, in isolation it does not provide a detection capability and must be paired with appropriate analysis and alerting tools.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="23.5.8."


><![CDATA[<p class="NormS23C5">Further references can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>CSA Security Guidance for Critical Areas of Focus in Cloud Computing</td>
<td>CSA</td>
<td><a rel="noopener noreferrer" href="https://cloudsecurityalliance.org/research/guidance/" target="_blank">CSA Security Guidance for Cloud Computing | CSA (cloudsecurityalliance.org)</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR References"><paragraph
    title="23.5.9."


><![CDATA[<p class="NormS23C5">Relevant PSR requirements can be found at:</p><table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>PSR mandatory requirements</strong></td>
<td>
<p class="NormS5C1">GOV2 - Take a risk-based approach</p>
<p class="NormS5C1">GOV5 - Manage risks when working with others</p>
<p class="NormS5C1">GOV6 - Manage security incidents</p>
<p class="NormS5C1">INFOSEC1 - Understand what you need to protect</p>
<p class="NormS5C1">INFOSEC2 - Design your information security</p>
<p class="NormS5C1">INFOSEC3 - Validate your security measures</p>
INFOSEC4 - Keep your security up to date</td>
<td><a href="https://www.protectivesecurity.govt.nz/governance/mandatory-requirements/">Mandatory requirements | Protective Security Requirements</a></td>
</tr>
<tr>
<td><strong>PSR protocol for information security</strong></td>
<td>Management protocol for information security</td>
<td><a href="https://www.protectivesecurity.govt.nz/information-security/management-protocol-2/">Management protocol for information security | Protective Security Requirements</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Logging public cloud events"><paragraph
    title="23.5.10.R.01."

    tags="Cloud Computing,Governance,Public cloud security,Event Logging"


><![CDATA[<p class="NormS17C2"><span>Logging capabilities and shared responsibility models for log collection, storage, and retention differ between public cloud providers. The division of responsibility may also vary across different deployment models and the individual services within a cloud platform.</span></p>]]></paragraph>
<paragraph
    title="23.5.10.C.01."

    tags="Cloud Computing,Governance,Public cloud security,Event Logging"


    classification="All Classifications"
    compliance="Must"
    cid="7494"
><![CDATA[<p>Agencies MUST understand the range of logging capabilities provided by their cloud service providers and determine whether they are sufficient for agency needs.</p>]]></paragraph>
</block>
<block title="Logging requirements"><paragraph
    title="23.5.11.R.01."

    tags="Cloud Computing,Governance,Public cloud security,Event Logging"


><![CDATA[<p class="NormS17C2"><span>It may not be possible, or desirable, to centralise all public cloud log information into a single protected repository. However it is vital that log information is still collected and maintained to meet legislative, regulatory and incident response requirements (see <a title="Logging requirements" href="http://nzism.gcsb.govt.nz/ism-document#Block-15648">16.6.8 - Logging requirements</a>).</span></p>]]></paragraph>
<paragraph
    title="23.5.11.C.01."

    tags="Cloud Computing,Governance,Public cloud security,Assurance,Event Logging"


    classification="All Classifications"
    compliance="Must"
    cid="7496"
><![CDATA[<p>Agencies MUST ensure that logs associated with public cloud services are collected, protected, and that their integrity can be confirmed in accordance with the agency’s documented logging requirements.</p>]]></paragraph>
</block>
<block title="Detecting information security incidents in public cloud "><paragraph
    title="23.5.12.R.01."

    tags="Cloud Computing,Governance,Public cloud security,Event Logging,Information Security Incidents"


><![CDATA[<p class="NormS17C2"><span>Specialised tools and procedures may be required to detect security incidents that occur within public cloud environments (<a title="Preventing and detecting information security incidents" href="http://nzism.gcsb.govt.nz/ism-document#Block-13111">See 7.1.7 - Preventing and detecting information security incidents</a>).</span></p>]]></paragraph>
<paragraph
    title="23.5.12.C.01."

    tags="Cloud Computing,Governance,Public cloud security,Event Logging,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="7498"
><![CDATA[<p>Agencies MUST ensure that cloud service provider logs are incorporated into overall enterprise logging and alerting systems or procedures in a timely manner to detect information security incidents.</p>]]></paragraph>
<paragraph
    title="23.5.12.C.02."

    tags="Cloud Computing,Governance,Public cloud security,Event Logging,Information Security Incidents"


    classification="All Classifications"
    compliance="Should"
    cid="7499"
><![CDATA[<p>Agencies SHOULD ensure that tools and procedures used to detect potential information security incidents account for the public cloud services being consumed by the agency.</p>]]></paragraph>
</block>
</subsection>
</section>
