13.07.2015 Views

Download - Cloud Security Alliance

Download - Cloud Security Alliance

Download - Cloud Security Alliance

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CLOUD SECURITY ALLIANCE SecaaS Implementation Guidance, Category 6: Intrusion Management4.2 <strong>Cloud</strong>-Provided IM SecaaS ImplementationAs most of the guidance in the architecture section includes both potential architecture options at each layerwithin the target environment as well as necessary protections provided, this section need only provideguidance for implementation of those capabilities as a cloud-provided service. As indicated in the Introductionto this guide, since the market is immature and there is a lack of significant best practices or commonarchitectures for implementing IM, let alone as a SecaaS, this version of the implementation guide provides onlystructural considerations for IM SecaaS and leaves room for additional guidance in future versions.4.2.1 Intrusion Management InfrastructureIM Infrastructure would include the distributed and/or cloud-based capabilities for management of policies,devices, and resultant data as well as the mechanisms for central collection and reporting and interfaces toevent correlation served by all sources for context aware management and dynamic response. This may be anoverlap or merely an interface to the SIEM service solution.Infrastructure also may include features such as configuration and signature management and shouldincorporate appropriate policy and process for the management of the detection of and response to intrusion asfed by SIEM or manual intervention. It is critical to rectify integration concerns related to data management,policy or signature deployment, and roles and responsibilities for authorizing or approving changes to thesystem. Access to, format of, and data flow from log files and other system-based information are critical tosuccess of centralized management and cloud delivery.4.2.2 Policy ImplementationIM SecaaS solutions need to provide proactive, policy-based monitoring and protection to help organizationssecure their physical and virtual server environments, as well as the business critical applications, databases,directories and file stores whether they reside within cloud-based servers or on systems outside the cloudinfrastructure.<strong>Cloud</strong>-based solutions should provide a protection policy library containing prevention and detection policiesthat can be used and customized to protect critical hosts.A prevention policy is a collection of rules that governs how processes and users access resources. Forexample, prevention policies can contain a list of files and registry keys that no program or user canaccess. Prevention policies can contain a list of UDP and TCP ports that permit and deny traffic.Prevention policies can deny access to startup folders. Prevention policies define the actions to takewhen unacceptable behavior occurs. Prevention policies protect against inappropriate modification ofsystem resources. The policies confine each process on a computer to its normal behavior. Programsthat are identified as critical to system operation are given specific behavior controls; generic behaviorcontrols provide compatibility for other services and applications.A detection policy is a collection of rules that are configured to detect specific events and take action.For example, detection policies can be configured to generate events when files and registry keys are© Copyright 2012, <strong>Cloud</strong> <strong>Security</strong> <strong>Alliance</strong>. All rights reserved. 31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!