13.07.2015 Views

Download - Cloud Security Alliance

Download - Cloud Security Alliance

Download - Cloud Security Alliance

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CLOUD SECURITY ALLIANCE SecaaS Implementation Guidance, Category 6: Intrusion Management1.0 IntroductionThe methods of intrusion detection, prevention and response in physical environments have matured over thelast decade. However, the growth of virtualization and massive multi-tenancy is creating new targets forintrusion due to the complexity of access and difficulty in monitoring all interconnecting points betweensystems, containers, applications, and data sets. This raises many questions about the appropriateinfrastructure, processes, and strategy for enacting detection and response to intrusion in a cloud environment,or even in a traditional environment with intrusion management services delivered via the cloud.As if the difficulty of employing intrusion capabilities in the traditional enterprise were not enough, limitationson visibility, complexity caused by architectural incongruity, and complications such as encryption, data accessand format, and multiple administrative boundaries make for even more difficult choices and reduced ability todeliver the service in a highly virtualized environment, or from a cloud to protect a traditional environment.Because of the limited market maturity and lack of widely accepted best practices, this document providesimplementation guidelines for cloud-based intrusion management service of multiple flavors—in the cloud,through the cloud, or from the cloud—focusing on the basic tenets of service and architecture rather thansolutions. Its intent is to describe the functional areas of any IM SecaaS service, critical elements for effectivedelivery, and options for deployment, along with the minimum standards necessary to integrate those servicessuccessfully within the larger SecaaS model and security architecture framework.While further development of standards are ongoing, these instruction sets and guidelines are designed toensure that the basis for a service are defined sufficiently so that service providers, third-party solutionsproviders, and consumers are clearly in synch when crafting contract and service level language or ordering andexecuting the service.1.1 Intended AudienceThe intended audience is the gamut of IT professionals considering cloud-based security services. However, thebulk of the material contained herein is written with a technical audience in mind—engineers, implementers,operators, technical assessors of planned and implemented offerings, and the technical representatives ofconsumers of the services and functions.1.2 ScopeThis guidance covers the requirements and capabilities, considerations and concerns, and implementationcriteria of cloud-provided Intrusion Detection, Response, and Management services. The material is designed toensure all three potential perspectives are considered and that the standards are translatable to therequirements of each participant in the service. The content is also presented from the context of providing theservice from a cloud, through a cloud, or with cloud enhanced capabilities. This guidance does not specificallyaddress complete architectures, although they must be modeled to some degree in order to provide sufficientbackdrop to describe implementation strategies and functional standards.© Copyright 2012, <strong>Cloud</strong> <strong>Security</strong> <strong>Alliance</strong>. All rights reserved. 8

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!