Cloud Security Principles
The National Cyber Security Centre (NCSC) published 14 cloud security principles in 2016. These principles are designed to give guidance to cloud service providers in order to protect their customers.
Data in transit protection
User data that is transitioning between networks should be protected against any interference.
Asset protection and resilience
User data, and the assets storing or processing it, should be protected against physical tampering, loss, damage, or seizure.
Separation between users
If a user of a service is compromised by malicious software, this should not affect the service or data of another user.
Governance framework
A Security Governance Framework should be followed by the service provider, in order to internally coordinate its management of the service.
Operational security
In order to prevent and detect attacks, the service must be operated securely. Adequate security shouldn’t require complex or expensive processes.
Personnel security
Service provider personnel should be thoroughly screened, followed by in-depth training to reduce the likelihood of accidental or malicious compromise.
Secure development
Services should be designed with security in mind. Secure by Design approaches should be followed
Supply chain security
The service provider should ensure that their supply chain adheres to all of the same security principles
Secure user management
Your service provider should ensure that you have the relevant tools to securely manage the use of their services. Management interfaces prevent unauthorised access to your data, making them a vital part of the security barrier.
Identity and authentication
Access to the service interfaces should only be granted to specific individuals and should all be guarded by adequate authentication measures – two party authentication if possible.
External interface protection
Any external or less trustworthy service interfaces must be identified and defended appropriately.
Secure service administration
If a cloud service is compromised through its administration system, important company data could be stolen or manipulated. It is vital that these services are secure.
Audit information for users
A service provider should supply their customers with the audit records needed to monitor the service and who is able to access your data. This is vital as it gives you the means to identify inappropriate or malicious activity.
Secure use of service
You have a responsibility to ensure the service is used properly, to ensure your data is kept safe and protected