Serviceteam IT Security News

Factors affecting user separation include:

  • where the separation controls are implemented – this is heavily influenced by the service model (e.g. IaaS, PaaS, SaaS)
  • who you are sharing the service with – this is dictated by the deployment model (e.g. public, private or community cloud)
  • the level of assurance available in the implementation of separation controls

Note: In an IaaS service you should consider separation provided by compute, storage and networking components. Also, SaaS and PaaS services built upon IaaS may inherit some of the separation properties of the underlying IaaS infrastructure.

For more information on the importance of separation requirements in cloud services, please refer to the Separation Guide.

Goals

You:

  • understand the types of user you share the service or platform with
  • have confidence that the service provides sufficient separation of your data and service from other users of the service
  • have confidence that management of your service is kept separate from other users (covered separately as part of Principle 9

Implementation approaches – Separation of users

Note that combinations of the following approaches can be complementary. When used in combination, they can provide greater confidence in the strength of separation within a service.

Approach

Description

Guidance

Virtualisation technologies (e.g. a hypervisor) provide separation between users

Compute separation is provided by a hypervisor. Network and storage virtualisation techniques are also employed.

Assuming popular and well-designed virtualisation technologies are used, then this is likely to provide stronger separation than other software controls.

Some virtualisation products have been assessed against well-defined security standards, such as the Certified Product Assurance scheme.

Other software provides separation between users

Other software controls, such as operating systems, web servers or other applications, provide separation between users of the service.

In this scenario the attack surface available to a rogue user is much greater. Vulnerabilities or misconfiguration issues could lead to breaches.

In this scenario you should look to gain confidence in the implementation of separation controls. Look for evidence of:

  • regular penetration tests of infrastructure and any relevant web applications
  • security reviews of the design of the service
  • an engineering approach that ensures security is a key consideration in developing the service

Additional notes – Who you are sharing the service with

The degree of confidence you need to establish in the user separation measures employed in a cloud service will depend on your intended use, and the deployment model of the service. 

  • For private cloud services.

Because a single organisation should have a good understanding of all its uses for the cloud environment you may be comfortable with only having quite limited assurance in the separation of the service.

  • For community cloud services.

Where you trust the community, and its members are known to practice a good level of hygiene (perhaps even bound by a code of conduct), evidence that well scoped penetration tests are regularly conducted may give you sufficient confidence in the separation provided. 

  • For public cloud services.

You should consider the strength of separation required, given that other consumers of the service may be actively hostile towards you. If a higher level of confidence is needed, in addition to penetration testing, it may be desirable to gain assurance in the design of the service and the engineering practices of the service provider. 

Additional notes – Penetration testing

A well-scoped penetration test (and implementation of its recommendations) can give confidence that products and security controls tested have been configured in accordance with good practice and that there are no common or publicly known vulnerabilities in the tested components, at the time of the test

A penetration test will not normally assess products or components for previously unknown vulnerabilities.

Ensure that your penetration testers are appropriately qualified. For example, individuals certified under the CHECK, CREST or Tiger schemes.

Independent review of the scope of a penetration test, and review of the mitigations it identified, will give a higher degree of confidence that penetration testing successfully achieved the objectives set out above.

< last principle   next principle >

Source: NCSC

With over 20 years of experience, Serviceteam IT design and deliver sophisticated connectivity, communication, continuity, and cloud services, for organisations that need to stay connected 24/7. We take the time to fully understand your current challenges, and provide a solution that gives you a clear understanding of what you are purchasing and the benefits it will bring you.

To find out how we can help you, call us on 0121 468 0101, use the Contact Us form, or why not drop in and visit us at 49 Frederick Road, Edgbaston, Birmingham, B15 1HN.

We’d love to hear from you!