+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

How to Guide for Cloud Processing and Outsourcing - 2023 Edition

  • PDF Icon

    Report

  • 107 Pages
  • April 2023
  • Region: Global
  • Janco Associates, Inc
  • ID: 5530903

Top 10 Cloud Security Vulnerabilities Identified

Cloud processing adds new vulnerabilities to the security and compliance landscape

The need to lower costs, increase efficiency and conserve cash has increased the motivation of companies to turn to Cloud Computing and increased the appeal of alternative delivery models.

Top 10 cloud security vulnerabilities have been identified by Janco Associates from a series of cloud security compliance audits and reviews with CTOs, CIOs and CSOs on cloud security concerns.

2023 Edition Features

  • Added two detailed job descriptions
    • Manager Outsourcing
    • Digital Content Specialist
  • Updated all included job descriptions to the 2023 version
  • Updated all included electronic forms to the 2023 version
  • Updated to meet the latest mandated compliance requirements 
  1. Data breaches - A data breach occurs when any information that is not intended for public release, including personal health information, financial information, personally identifiable information, trade secrets, and intellectual property is exposed. A data breach is not unique to cloud computing, but it is as a top concern for cloud users.
  2. Weak Security - Weak security allows cyber-criminals to act as legitimate users, operators, or developers that can read, modify, and delete data; issue control plans and management functions; spy on data. The root cause of this is insufficient identity, credentials, or access control. An example is leaving a port open that allows access without authentication.
  3. Non-Secure Interfaces & API - Cloud providers typically provide a set of software user interfaces (UIs) or APIs to manage and interact with cloud services. These need to be designed to protect against accidental and malicious attempts to circumvent policy.
  4. OS vulnerabilities - OS vulnerabilities that allow attackers to infiltrate a system to steal data, taking control of the system or disrupt service operations. Vulnerabilities within the components of the operating system put the security of all services and data at significant risk. With multi-tenancy in the cloud, systems from various organizations are placed close to each other and given access to shared memory and resources, creating new attack vectors.
  5. Account hijacking - Cloud services add a new threat to the landscape. If attackers gain access to a user’s credentials, they can eavesdrop on activities and transactions, manipulate data, return falsified information and redirect clients to illegitimate sites. For example when a cyber-attacker gains root-level control of systems via an existing account.
  6. Insider breach as System Administrator - A disgruntled employee who is a system administrator can access potentially sensitive information, and can have increasing levels of access to more critical systems and eventually to data. Enterprises that depend solely on cloud service providers for security are at greater risk.
  7. Parasitic code on the server - Parasitic code on the server infiltrates systems to establish a foothold in the IT infrastructure of target companies, from which they steal data. This type of code pursues its goals stealthily over an extended period of time, often adapting to security measures. Once in place, they can move through data center networks and blend in with normal network traffic to achieve their objectives.
  8. Data Destruction - An accidental deletion by the cloud service provider, or a physical catastrophe such as a fire or earthquake, can lead to the permanent loss of customer data unless the user takes adequate measures to back up data, following best practices in business continuity and disaster recovery.
  9. Denial of service (DoS) - DoS attacks are designed to prevent users of a service from being able to access their data or applications. Attackers can cause a system slowdown and leave all legitimate service users without access to services.
  10. Ransomware - Ransomware is malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid. Ransomware typically spreads through phishing emails or by unknowingly visiting an infected website.

How to Guide for Cloud Process and Outsourcing

How to Guide for Cloud Processing and Outsourcing has as its primary focus provides everything that is needed to select a vendor, enter into an agreement, and manage the relationship.

Table of Contents

How to Guide for Cloud Processing and Outsourcing

  • License for This Document
  • Limitations
  • Cloud and Outsourcing Management Standard
  • Service Level Agreements (SLA)
  • Problem Responsibility  
  • Cloud Processing and Outsourcing Policy Standard  
  • ISO 31000 Compliance - Risk Management  
  • GDPR Data Privacy Mandate
  • Cloud Processing and Outsourcing Approval Standard
  • Steps to implement Software as a Service (SaaS) via the Cloud
  • Cloud Outsource Service Provider Level Agreements and Metrics
  • SLA and Metrics Reporting  
  • Finding and Selecting a Cloud Outsource Vendor
  • Outline for RFP and Negotiation of Contract Terms

Appendix

  • Base Case Development  
  • Sample Service Level Agreement
  • Sample Metrics for Service Level Agreements
  • Business and IT Impact Analysis Questionnaire  
  • ISO - Security Process Audit Checklist
  • Cloud/Outsourcing Security Checklist Looking Ahead
  • Detail Job Descriptions
  • Cloud/Outsourcing Security Checklist Looking Ahead  
  • Detail Job Descriptions  
    • Director Disaster Recovery and Business Continuity 
    • Disaster Recovery Coordinator 
    • Manager of Cloud Applications 
    • Manager Outsourcing
    • Manager WFH Support  
    • Cloud Computing Architect 
    • Digital Brand Manager 
    • Capacity Planning Supervisor 
    • Digital Content Specialist
  • Cloud and Outsourcing Forms
    • Application & File Server inventory 
    • Company Asset Employee Control Log 
    • Non-Disclosure Agreement 
    • Outsourcing Security Compliance Agreement Form 
    • Outsourcing and Cloud Security Compliance Agreement Form 
    • Work From Home Contact Information 
    • Work From Home IT Checklist 
    • Work From Home Work Agreement

What’s new  

Samples

Loading
LOADING...