{"id":478,"date":"2018-11-19T16:45:04","date_gmt":"2018-11-19T16:45:04","guid":{"rendered":"http:\/\/blogs.kent.ac.uk\/unseenit\/?p=478"},"modified":"2018-11-19T16:45:04","modified_gmt":"2018-11-19T16:45:04","slug":"cyber-essentials-and-cloud-computing","status":"publish","type":"post","link":"https:\/\/blogs.kent.ac.uk\/unseenit\/cyber-essentials-and-cloud-computing\/","title":{"rendered":"Cyber Essentials and Cloud Computing"},"content":{"rendered":"<p class=\"lead\">Cloud services are readily available, but not all of them can be in scope for Cyber Essentials. Here\u2019s a (very) brief explanation of why &#8211; and why that matters: <\/p>\n<p>Cyber Essentials (CE) is a \u201cGovernment-backed, industry-supported scheme to help organisations protect themselves against common online threats.\u201d[1]<br \/>\nIt provides independent verification that an organisation applies and manages a basic set of security controls. Gaining CE for our own internal infrastructure is therefore straightforward.\u00a0When it comes to Cloud services however, it\u2019s not quite so simple.<\/p>\n<p>The 3 main types of Cloud are:<\/p>\n<ul>\n<li>Saas &#8211; Software as a Service<\/li>\n<li>Paas &#8211; Platform as a Service<\/li>\n<li>Iaas &#8211; Infrastructure as a Service<\/li>\n<\/ul>\n<p>Other flavours are available, but for the purposes of this article we will concentrate on the above.<\/p>\n<p><strong>SaaS<\/strong> is packaged software that you connect to, and looks the same for every single customer. You don&#8217;t get to control updates, or when upgrades happen. You get some level of customization (e.g. branding), but the entire stack is taken care of by a third party.<br \/>\n<strong>PaaS<\/strong> is the next layer down the cloud stack, offering platforms upon which apps and services can be built. Very few, if any, business people will interact with a PaaS, as it is primarily geared toward developers and operations professionals.<br \/>\n<strong>IaaS<\/strong> is the lowest level in the stack. This is where pre-configured hardware is provided via a virtualised interface or hypervisor. There is no high level infrastructure software provided such as an operating system, this must be provided by the buyer and embedded with their own virtual applications.<\/p>\n<p>&#8220;How does this relate to Cyber Essentials?&#8221; I hear you ask. CE is based on the organisation (i.e. Kent) applying and managing the 5 control sets required to meet the standard \u2013 and only with IaaS can we do that, and provide the required assurance.<br \/>\nHowever, with PaaS and SaaS we do not manage the controls (the service provider does) so therefore they fall out of scope. This does not mean that we cannot use the technologies, but we must exercise caution over what we place in the different types of cloud.<\/p>\n<p>And so we come to the Million Dollar Question\u00a0&#8211; &#8220;Does it really matter?&#8221;. Well, actually it does. Any contract \/ grant \/ data sharing agreement etc. that specifies Cyber Essentials as a requirement must have all data storage and processing carried out in the environment certified by CE. That means for Kent anything within our own infrastructure, or any IaaS cloud that we may include in scope in the future.<br \/>\nIf we put that data into a PaaS or SaaS cloud, we are in breach of contract and may be penalised accordingly.<br \/>\nWith the growing trend towards Cloud services, and particularly PaaS and SaaS, Cyber Essentials will undoubtedly evolve to include these within scope. Until then we need to be careful about what we place into the different types of cloud.<\/p>\n<p>[1] <a href=\"https:\/\/www.gov.uk\/government\/publications\/cyber-essentials-scheme-overview\" target=\"_blank\" rel=\"noopener\">https:\/\/www.gov.uk\/government\/publications\/cyber-essentials-scheme-overview<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud services are readily available, but not all of them can be in scope for Cyber Essentials. Here\u2019s a (very) brief explanation of why &#8211; &hellip; <a href=\"https:\/\/blogs.kent.ac.uk\/unseenit\/cyber-essentials-and-cloud-computing\/\">Read&nbsp;more<\/a><\/p>\n","protected":false},"author":56413,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[17613,197215,197218],"_links":{"self":[{"href":"https:\/\/blogs.kent.ac.uk\/unseenit\/wp-json\/wp\/v2\/posts\/478"}],"collection":[{"href":"https:\/\/blogs.kent.ac.uk\/unseenit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.kent.ac.uk\/unseenit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unseenit\/wp-json\/wp\/v2\/users\/56413"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unseenit\/wp-json\/wp\/v2\/comments?post=478"}],"version-history":[{"count":11,"href":"https:\/\/blogs.kent.ac.uk\/unseenit\/wp-json\/wp\/v2\/posts\/478\/revisions"}],"predecessor-version":[{"id":489,"href":"https:\/\/blogs.kent.ac.uk\/unseenit\/wp-json\/wp\/v2\/posts\/478\/revisions\/489"}],"wp:attachment":[{"href":"https:\/\/blogs.kent.ac.uk\/unseenit\/wp-json\/wp\/v2\/media?parent=478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unseenit\/wp-json\/wp\/v2\/categories?post=478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/unseenit\/wp-json\/wp\/v2\/tags?post=478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}