Machine Translated by Google Machine Translated by Google Machine Translated by Google Machine Translated by Google Machine Translated by Google Machine Translated by Google Appendix to General Circular Letter No. 2 of 2021 Guide line Information Security Management Through Cloud Computing ( Cloud Computing Public services OFFICE OF THE CHIEF SECURITY OFFICER MALAYSIA GOVERNMENT ) In Machine Translated by Google CONTENTS Acronyms AND DEFINITIONS ............................................................... ........................................iv 1. INTRODUCTION ............................................... .................................................. ..1 2. PURPOSE ............................................................... ................................................................. ............1 3. IMPLEMENTATION OF CLOUD COMPUTING IN THE PUBLIC SERVICE ......................................... .................................................. ............................ 2 4. CLASSIFICATION OF INFORMATION OR DATA ............................................ .............. 3 4.1 Official Secrets ............................................... ............................................... 3 4.2 Official ................................................ .................................................. ......... 4 4.3 Open Data.......................................................... ...............................4 5. BASIC FEATURES AND MODELS OF CLOUD COMPUTING SERVICES ....................................... .................................................. .............................. 5 5.1. Basic Features of Cloud Computing ............................................ .......... 5 5.2. Cloud Computing Services Model ........................................... 6 6. DETERMINATION OF CLOUD COMPUTING IMPLEMENTATION MODEL FOR PUBLIC SERVICE ........................................ ................................................. 8 6.1 Private Cloud ..............................................................................................8 6.2 Public Cloud..............................................................................................10 6.3 Hybrid Cloud.............................................................................................10 7. SAFETY RISKS TO BE CONSIDERED .................... 11 7.1 Data Sovereignty................................................................. ............11 7.2 Risks From Changes In Jurisdiction ............................................ 12 7.3 Forensics / Data Seizure .......................................... ...............................13 7.4 Dependencies ................................................ ....................................... 14 7.5 MultiTenancy ...... .................................................. ................................... 14 7.6 Threats From Internal Sources CSP ............................................ ......... 15 7.7 Vendor Lock-in .........................................................................................16 7.8 Privacy.......................................................... ................................................................. ......16 8. GOVERNANCE .............................................. .................................................. .17 8.1 Risk Management ............................................... .................................... 17 9. OFFICIAL CONFIDENTIAL INFORMATION MANAGEMENT COMPLIANCE ........................ 18 9.1 Classification of Information ............................................... ................................. 18 9.2 Jurisdiction ............................................... ........................................... 19 9.3 Consumer Control . .................................................. ................................ 20 Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ ii Machine Translated by Google 9.4 Legal Advisory Services ............................................ ............... 20 10. CONTRACT MANAGEMENT AND SECURITY TERMS ........................... 20 10.1 Due Diligence............................................................................................20 10.2 Service Level Agreement (SLA) ..............................................................21 10.3 Hak Milik Data (Data Ownership).............................................................21 10.4 Privacy.......................................................... ................................................................. ......21 10.5 Audit ..........................................................................................................22 10.6 Compensation ............................................. ........................ 22 10.7 Liabilities ................................................ .................................................. ..... 23 10.8 Right to Reach Element............................................... ................................23 10.9 Exit Process ........................................... ...... 23 11. THE IMPORTANCE OF PROTECTING INFORMATION IN THE ICT ENVIRONMENT 24 12. METHODS OF DATA AND INFORMATION PROTECTION ................................... 24 12.1 Encryption ................................................................ ................................................................. ...25 12.2 Isolation ................................................ ............................................. 26 12.3 Access Management and Identities ................................................. .............. 26 12.4 Security Software and Applications ............................................. ........... 28 12.5 Safety Level Assessment .............................................. ................... 28 12.6 Data Sanitation............................................................... ..............................................29 12.7 Data / Information Leakage ............................................. ........................... 30 13. PHYSICAL SECURITY CONTROL OF ICT DATA CENTERS AND INFRASTRUCTURE ........................................ .................................................. ................................ 31 13.1 Safety Assessment ............................................... .............................. 31 13.2 Security Certification ............................................... ............................. 32 13.3 Classified Areas ............................................... .............................. 32 13.4 Security Screening ................ .................................................. ............. 32 13.5 Official Secret Security Validation ............................................. ......... 32 13.6 Support ................................................ .................................................. 33 13.7 Notifications ................................................................ ................................................................. .33 14. INCIDENT MANAGEMENT .............................................. ................................... 33 15. SERVICE CONTINUITY MANAGEMENT ................................. 34 16. DATA AVAILABILITY AND BACKUP ............................................ ... 34 17. CONCLUSION............................................................... ................................................................. .35 18. REFERENCES ............................................... .................................................. ....... 36 Guidelines for Information Security Management through Cloud Computing ) Computing) In Public Serviceÿ iii Machine Translated by Google ACRONYMS AND DEFINITIONS TERMS CSP ACRONYMS AND DEFINITIONS Cloud / Cloud computing service providers Services Provider Refers to where a business, industry body or Government determines that data is Data Residency stored at a geographical physical location of their choice, for a number of reasons such as regulatory requirements and policy compliance. HTTP HyperText Transfer Protocol IPSec Internet Protocol Security A Ministry, Government Department, Statutory Body, Local Government and other Department agencies to which Act 88 applies. MFA Multi Factor Authentication PDA Various mobile devices that function as personal information managers / Personal Digital Assistants PII Personally Identifiable Information Information Official documents, official information and official materials that if disclosed without permission would endanger national security, cause substantial damage Secret to Malaysia's interests and dignity or provide substantial benefits to a foreign power should be classified as "Secret". Official documents, official information and official materials which if disclosed Secret Big without permission will cause substantial damage to Malaysia, should be classified as "Big secret" Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ iv Machine Translated by Google SFTP Snapshot Secure File Transfer Protocol Method for copying memory and disk of running server Official documents, official information and official materials which if disclosed without permission although not endangering national security but detrimental to the interests or dignity of Malaysia or the activities of the Government or Difficult individuals or will cause embarrassment or inconvenience to the administration or will benefit a foreign power shall be classified as “Confidential ”. SSL Secure Sockets Layer Official documents, official information and official materials other than those Limited classified as “Top Secret”, “Secret” or “Confidential” but also required to be given a level of security protection shall be classified as “Restricted”. TLS Transport Layer Security VPN Virtual Private Network The process of creating/creating a representation of something based on software, or virtual such as virtual applications, servers, storage and networks. In cloud computing, it is an important technology that allows Virtualization information systems to be obtained (abstract) from the underlying hardware by using a hypervisor , which is software that allows the server host to run multiple operating systems (multiple guest operating systems) at one time. Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ v Machine Translated by Google INFORMATION SECURITY MANAGEMENT GUIDELINES THROUGH CLOUD COMPUTING IN PUBLIC SERVICES 1. INTRODUCTION Cloud Computing is a model enables network access to a collection of computing resources (examples: networks, servers, storage, applications and services) easily and fast through interaction arrangements and minimal management effort with service providers. A cloud computing service flexible and elastic (according to the needs and demands of users) is seen able to offer cost savings while increasing efficiency ICT services. However, the use of such services in carrying out the general affairs and functional affairs of a Department presents new challenges compared to conventional approaches. Such challenges include security, management change, mutual interoperability and legal aspects that need to be taken into account before it is adopted and implemented. Information security and Government data handled in cloud computing especially involving official Government secrets shall be managed and controlled by preferably to prevent leakage of Government information. 2. PURPOSE Guidelines for the Management of Information Security Through Computing Cloud Computing in Public Service aims to: i. As a reference to the Department on security management protection in relation to official matters and official secrets of the Government in cloud computing environment; Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 1 Machine Translated by Google ii. Assist the Department in understanding the management of official secrets within cloud computing in accordance with legal provisions current as under the Official Secrets Act 1972 [Act 88] and Directives Security (Revisions and Amendments 2017); and iii. Describe appropriate and effective mitigation control measures based on the treatment of risks that have been identified above ICT assets transferred or used in the service cloud computing. 3. IMPLEMENTATION OF IN -SERVICE CLOUD COMPUTING AWAM Cloud computing is a reference to a paradigm or model computing that allows network access to assemblies flexible and elastic computing resources by way of sharing shared resources, either physically or virtually with capabilities supply on a self -service basis or management by a third party according to user requests. Official secret management in in -service cloud computing the public shall comply with paragraph 139, Safety Instructions (Revised) and Amendment 2017) as follows: The use of cloud computing (cloud computing) such as information sharing, data processing etc. for the purpose official secrets are not allowed at all except cloud computing developed and authorized by the Government and subject to to directions issued by the Government from time to time during. Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 2 Machine Translated by Google Basically the meaning of cloud computing is developed and allowed by the Government is a cloud computing service which is owned, managed or operated by the Government itself based on the principles, assessments and requirements of cybersecurity comprehensively and strategically involving technology, people and processes. It aims to make such cloud computing services meet security objectives, business direction as well as regulatory and legal requirements law in force. 4. CLASSIFICATION OF INFORMATION OR DATA Official Secrets Act 1972 [Act 88] and Security Instructions (Revision and Amendment 2017) essentially states some pre-defined rules in in the process of classifying information based on value, impact and sensitivity. To provide an initial understanding, between information categories and levels classification of information often managed by the Department below public services are as follows: 4.1 Official Secrets Official Secret has the meaning as given to the definition of “secret official ”under the Official Secrets Act 1972 [Act 88] i.e. “ any document that specified in the Schedule and any related information and materials with it and include any official documents, information and other materials as can be classified as “Top Secret”, “Secret”, “Confidential” or “Restricted”, as the case may be, by a Minister, Menteri Besar or Chief Minister of a State or any officer public appointed under section 2B ”. Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 3 Machine Translated by Google 4.2 Official Official is in relation to the public service. Official information created, used, accepted or officially issued by any Government Department while conducting official business. It is too is a public record subject to the rules of the Archives Country. Here are some examples of official government information: i. Financial; ii. Medicine; iii. Health; iv. Academic; v. Taxation; we. are you coming. viii. Agreement/Contract; Study Data; and Personally Identifiable Information (PII). Official Information as above can also be an official secret if the initiator (data owner) makes a risk interpretation that corresponds to one the level of security of the official secret in question. Release and ownership of official things without permission from the originator also becomes one such offenses as are subject to laws and regulations current rules. For example section 203A, Penal Code. 4.3 Open Data Open Data is official information that has been screened and authentication at the beginner level of data for free use, sharing as well reused by the public, Government agencies and private organizations for various purposes. The department must comply with the circular regarding data open which is in effect. Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 4 Machine Translated by Google 5. BASIC FEATURES AND MODELS OF COMPUTING SERVICES CLOUD 5.1. Basic Features of Cloud Computing 5.1.1. On Demand Self -Service Users can perform all requirements setting processes desired cloud computing, e.g. storage, networking, applications without human intervention from service providers. 5.1.2. Broad Network Access Services provided in the network available from various locations and through various devices for example desktops, laptops, PDAs, smartphones and so on. 5.1.3. Resource Pooling Computing resources are assembled to provide services to multiple users using a multi-tenant model with physical and virtual resources are allocated dynamically according to user requests. Examples of sources include storage, processing, memory and broadband networks. 5.1.4. Rapid Elasticity The ability to scale services is increased or decreased dynamics as needed. 5.1.5. Measured Service The system is capable of measuring (metering) the value of services (costs and ICT resources) provided to appropriate users by service type (example: storage, bandwidth or volume Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 5 Machine Translated by Google active user account). Measurement of service-level agreement (SLA) offered by cloud service providers (CSPs) must be consistent with core service requirements and stakeholder consent Department. 5.2. Cloud Computing Services Model 5.2.1. Software -as-a-ServiceSaaS) a) A service model that allows the Department to using the app and infrastructure facilities cloud computing developed or provided by service providers. The application can be accessed by the device users through various channels (web browsers, web-based email). Departments are only allowed to make basic configurations against applications while computing infrastructure facilities such as network, server, operating system, storage and configuration applications are managed by service providers; b) The main objective of this service model is to reduce operating costs, procurement of hardware and software, costs application maintenance or infrastructure maintenance costs cloud computing; and c) Provision of security for applications and infrastructure cloud computing is entirely below service provider responsibilities. 5.2.2. Platform -as-a-Services- PaaS) a) A service model that provides a platform to Department to develop an application or software, tested and deployed in a computing environment Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 6 Machine Translated by Google clouds. Application or software development life cycle using specific equipment and programming methods (example: programming language, libraries) that have been provided by the service provider; b) The main objective of this service model is to reduce costs operations, simplify the process of purchasing, placing and management of hardware components and software platforms, including any requirements in program development and databases; and c) The security provisions for this service model are in under the responsibility of the service provider and the Department. 5.2.3. Infrastructure as a Service (Infrastructure-as-a Services - IaaS) a) A service model that provides basic resources computing such as storage, networking, virtual servers to support the operation of the Department's applications or software. Model this service only allows the Department to manage and control the operating system (OS), storage, applications and specific network components (example: firewall). IaaS is a service provided where the basic infrastructure computing such as servers, operating systems and equipment the network is provided according to the request or requirements of the Department; b) The main objective in the selection of IaaS service model is for cost savings to be incurred by the Department in purchase of computing equipment, rental of location as well maintenance of infrastructure (hardware and software); and Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 7 Machine Translated by Google c) Security provisions other than basic infrastructure computing is under the responsibility of the Department. 6. DETERMINATION OF CLOUD COMPUTING IMPLEMENTATION MODEL FOR PUBLIC SERVICES Determining the cloud computing implementation model to be selected is based on the classification of information that has been made by data owner (data/ business owner) for a Department. Classification this information is evaluated in terms of implications for security, defense, functions and administration of government, interests and dignity country. The determination of the cloud computing implementation model is as follows: 6.1 Private Cloud Cloud infrastructure provided specifically for the use of the Department. It is may be owned, managed and operated by the Department, a third party, or both at once and they exist inside or outside the premises. Third parties here refer to entities that provide services to the Department to manage its cloud computing, as example: • Local CSP - MIMOS, TM, TimesDotCom, MAMPU • Foreign CSP - AWS, Microsoft, Ali Baba, Google This model is suitable for all categories of government information or data. However, for certain information classifications it needs to meet pre-requisites as follows: Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 8 Machine Translated by Google 6.1.1 Official Confidential Information RESTRICTED AND CONFIDENTIAL a) Official confidential information is classified as RESTRICTED and CONFIDENTIAL including its application system can be operated privately cloud if the service is developed and authorized by the party government; b) Official confidential information on matters in the Schedule to Act 88 shall be hosted in the premises of the Department (on-premise) while official confidential information outside the Schedule is allowed on the premises or non-premise of the Department (off-premise); and c) On-premise private cloud services are referenced to cloud computing developed at the Department’s premises itself or through the Public Sector Data Center (PDSA) Government. The department needs to refer to MAMPU for use the services provided by PDSA. PDSA provide data center facilities and ICT infrastructure for common use agencies / departments centrally. For the services offered off -premise, the locality of such cloud computing is in under the legal control and jurisdiction of the Government of Malaysia. SECRETS AND BIG SECRETS a) Management of official confidential information at the level of CONFIDENTIAL and THE BIG SECRET in a cloud computing environment shall first be carefully and carefully evaluated from risk angles, impacts and threats to national security if implemented. Errors in handling information staged official secrets SECRET and BIG SECRET in cloud computing will have huge implications for National security; and Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 9 Machine Translated by Google b) Any proposal for the management of official confidential information in stages SECRETS and BIG SECRETS through cloud computing shall first refer to the Office of the Chief Officer Malaysian Government Security (CGSO) for advisory services and security risk assessment. 6.1.2 Official Information Official information including its application system can be operated at private cloud developed and/or authorized by the government either on-premise or off-premise. 6.2 Public Cloud Cloud computing infrastructure provided for public use. It may be owned, managed and operated by an entity businesses, academics or government agencies that exist on the premises service provider (Cloud Services Provider, CSP). Use of this model is suitable for use for open data and non -official information sensitive. 6.3 Hybrid Cloud Cloud computing infrastructure consisting of two or more a combination of cloud computing models (private or public) that creating a new entity that is bound to each other through an agreed agreement or cooperation. This model is allowed for official information. It is also allowed for official confidential information for level RESTRICTED and CONFIDENTIAL only taking into account the second locality the two cloud computing are under legal control and the jurisdiction of the Government of Malaysia. Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 10 Machine Translated by Google In -Service Cloud Computing Implementation Matrix Table The public according to the classification of information can refer to APPENDIX 1. 7. SAFETY RISKS TO BE CONSIDERED Cloud computing is a medium to facilitate delivery more effective and economical public services. However, it is have negative impacts and implications if implemented without adhere to the security aspects of information protection. Besides, deliver the availability and safety of data, applications and infrastructure ICT to third parties can invite and increase risk safety. Government departments wishing to implement cloud computing should give consideration to several factors when making a selection CSP as follows: 7.1 Data Sovereignty 7.1.1 Use of external cloud computing services Malaysia in handling Government information can endanger data security and sovereignty country. Data stored, processed and transferred through such services may be subject to legal provisions the laws of the country concerned as well as being out of control and scope the powers of the Government of Malaysia; 7.1.2 This includes for any registered supplier and has its Headquarters abroad conducts its business operations in Malaysia. Other necessary factors taken into account if the CSP uses external sources or relying on third parties to deliver its services Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 11 Machine Translated by Google to customer. Therefore, the Department shall identify the source of origin of the service such cloud computing by understanding flows and data residency to ensure that no other foreign power can access to information and strategic data of the country without the knowledge and truth; and 7.1.3 Data sovereignty should refer to requirements laws or regulations imposed on the data based on the region or country in which it is physically located. Data sovereignty should be a key requirement in deployment cloud computing by the Department by identifying things following: i. Governance and data stakeholders in the Department; ii. Data security; iii. Geographical position and physical placement of data; iv. Rules, procedures and legislation; v. Security risks; vi. Data classification; vii. Data property rights; and viii. Data flow. For the handling of official Government secrets, the Department must be given permission to determine where data is stored and processed. 7.2 Risks From Changes In Jurisdiction 7.2.1 The Department shall understand the legal requirements, rights contractual and overlapping jurisdictions in relation to place storage and processing of data logically or physically. Data Departments may be kept in some provinces that have Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 12 Machine Translated by Google different jurisdictions, some of them in high -risk countries; and 7.2.2 For example, a CSP data center that is located and operates within countries that practice autocracy, have no governance good law or disrespectful state international agreements that could result in such a data center in access and the occurrence of unauthorized release of data and ICT systems by the original owner. 7.3 Forensics / Data Seizure 7.3.1 Law Enforcement Agency, LEA) has the authority to access communications and information for enforcement and investigation purposes (seizure data) if there is a violation of the law. In certain cases, the law the law also authorizes foreign enforcement agencies (international law enforcement) to access information either within or outside the country; 7.3.2 Bit-by-bit imaging or copies of data for forensic purposes in cloud computing environments are usually difficult to implemented. The service provider is bound by the policy security so as not to let its hardware and software accessed by users primarily in multi-tenant environments where customers may have access to resources in between each other; and 7.3.3 In addition, data structures in virtualization technology are also difficult forensic process and analysis was carried out. In certain configurations, data may not be obtainable at all and the investigation may fail carried out effectively. Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 13 Machine Translated by Google 7.4 Dependencies 7.4.1 Third parties may be involved in a process or services provided to users. Dependence the CSP to such third party may cause risk unknown and perceived safety; and 7.4.2 These services also depend on supply chain management (supply chain management) which needs to be seen holistically for ensure rules, policies and good practices in security applied by all parties involved. 7.5 Multi-Tenancy 7.5.1 In a particular cloud computing implementation model it allows users to be made up of multiple entities (multi tenancy) sharing the same ICT resources (resource pooling); 7.5.2 This element makes cloud computing services into options to the Department to reduce operating and procurement costs ICT assets compared to the usual model; 7.5.3 Risks related to multi-tenancy that the Department needs to be aware of the habit is through virtualization or data infrastructure commingling; 7.5.4 In a virtualization environment, malicious code attacks can occur if there is a security vulnerability in the hypervisor and resulting in the Department's information being accessed by other parties. As for example, cyber attacks can be carried out through ‘guest-to-host’ or ‘guest-to-guest’ by those who already have access to the service; 7.5.5 The Department may take snapshots at certain times for the purpose of backup copy and redundancy more easily through Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 14 Machine Translated by Google virtualization technology . However, if the copy (actual copy) not properly protected, the information stored in the machine virtual (virtual machine's local drives) may be accessible by parties another. This also includes all stored data and encryption keys in the memory in question; 7.5.6 In the IaaS and PaaS service models, customers are not implement good practices in management and control security can affect the security level of the CSP to a degree the most risky (the lowest common denominator problem). As for example, customers who do not make operating system consolidation and its application may result in the occurrence of such a situation if not appropriate controls are performed to isolate the network and each customer's virtual machine; and 7.5.7 Meanwhile, in -service self -service demand cloud computing makes it easy for users to register to subscribe to the service through the Cloud Management Portal (CMP) provided by the CSP. However this facility can be manipulated by irresponsible parties to register and use the service and subsequently perform illegal and harmful activities to other users. 7.6 Threats From Internal Sources CSP 7.6.1 Departments that plan to use the service cloud computing should assess risks if any the possibility of information being stored in the provider’s facility at unauthorized access either by employees, contractors or whichever any other third party (supply chain) ; 7.6.2 The Department is concerned may not have the capacity to measure the level of security next make a confirmation Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 15 Machine Translated by Google the effectiveness of controls and procedures as offered by the parties CSP; and 7.6.3 For example, the level of security assurance varies depending on the physical location of the CSP and its staff. CSP local subject to security conditions that need to be implemented such as imposing security screening on all employees and staff who handle Government strategic information. However this procedure may not be feasible if such cloud computing services are provided from outside country. 7.7 Vendor Lock-in 7.7.1 Vendor lock-in is a situation where the Department have difficulty transferring services or data available to CSP or other parties. It may be due to data formats or CSP infrastructures that are different from each other neither the current CSP party failed to provide that cooperation is supposed; and 7.7.2 The Department needs to ensure that this issue is given attention and action appropriate such as providing a team of experts (Subject Matter Expert, SME) who can provide technical support during the transition process and cloud computing migration is performed. 7.8 Privacy 7.8.1 Privacy refers to the rights of a department or individual acting for the department or himself, to determine the extent to which it will interact with its surroundings. This includes the extent to which it is willing to share information or data between Departments or other entities; Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 16 Machine Translated by Google 7.8.2 Of in rating know certain risk, Departments need to make sure cloud computing proposals don’t involves a breach of data privacy to the Department. Data control can be enhanced through a data -like data anonymization process masking or scrambling data to ensure the actual data is not exposed but can still be analyzed, processed and used by parties CSP according to user needs. The department can first implement proof-of-concept (PoC) to ensure solution technical requirements meet the objectives of its implementation, the Data has gone through the anonymization process can be transferred and on processes in the CSP facility while the original data is sensitive and controlled placed under the care of the Department for matching purposes. 7.8.3 The scope of security includes a cloud computing model managed by a third party on government premises (on-premises) or owned Departments in non -Government premises. 8. GOVERNANCE Governance structures should be identified and established to plan, manage and control policies and functions related to information security in cloud computing management. Governance created shall take into account the following: 8.1 Risk Management 8.1.1 Risk management in cloud computing is among the challenges should be given attention by the Department in view of the large part computing resources are under the control of the CSP and there is a possibility that it may not be accessible by the Department. Risk is necessary evaluated based on technical control, management, operations and the steps taken to minimize risk to an acceptable level; and Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 17 Machine Translated by Google 8.1.2 Risks of using cloud computing involving information official and official secrets of the Government shall be determined and decided by stake holders in positions based on results risk assessments that have been made. The department shall identify protection security risk management governance structure against ICT assets that use computing services cloud. This management is responsible for the following: i. identify vulnerabilities (vulnerability); ii. identify threats (threats); iii. assess risk (risk assessment); iv. determine risk treatment (risk treatment); v. monitor the effectiveness of risk management; and vi. monitor threats associated with residual risk risk) and accepted risk. 9. OFFICIAL CONFIDENTIAL INFORMATION MANAGEMENT COMPLIANCE Compliance with the management of official confidential information in the ICT environment be a prerequisite for any proposed use cloud computing services. 9.1 Classification of Information 9.1.1 For the proposed use of cloud computing, the Department shall refers to the procedures for handling official confidential information as well Office of the Chief Government Security Officer of Malaysia (CGSO) for matters relating to the creation, classification, handling, storage, release and disposal of information; Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 18 Machine Translated by Google 9.1.2 Classification of official secret data, information and records shall implemented in advance and guided by the rules and instructions in force; 9.1.3 Classification of information facilitates management to determine levels protection and control according to the level of security appropriate to meet legal and regulatory requirements related. Among the necessary security control methods considered are such as multiple access controls, mechanisms encryption, data sanitation and the like. All controls such shall be agreed and documented; and 9.1.4 Improper use of security levels in making the determination of information classification gives effect and impact as in lower : i. Under-classification can result in government information managed in cloud computing services no have appropriate and vulnerable security controls to risk; and ii. Over-classification in turn is burdensome to the consumer handling government information, increased costs due excessive control and resulting in selection cloud computing services are done with no appropriate. 9.2 Jurisdiction All official confidential information stored and processed shall are under the control and legal jurisdiction of the Government Malaysia. The CSP must ensure all such official confidential information remain operated in an environment or facility certified by the Government only in accordance with the Safety Instructions (Revision and Amendment 2017), Act 88 and other relevant laws. Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 19 Machine Translated by Google 9.3 Consumer Controls The department shall ensure that access to critical data or official confidential information is restricted to certain users only ) user) who can access the file specifically. Individuals who have access to official confidential information is responsible for their respective actions and subject to rules and provisions safety as stated in the Safety Instructions (Revised) and Amendment 2017). This accountability must be made clear to all users who have access to those cloud computing resources. 9.4 Legal Advisory Services The department shall seek the advice of legal counsel in relation to the ability of foreign legislative power to be granted permission of access to information or applications of the Department especially that managed by a foreign CSP. This is because, foreign CSP parties are also subject to the legislative and administrative powers of the country concerned. 10. CONTRACT MANAGEMENT AND SECURITY TERMS 10.1 Due Diligence 10.1.1 Before any decision to use the service cloud computing is made, the Department shall make an assessment in detail based on requirements, compliance to existing policies and related legal constraints; and 10.1.2 The Department shall ensure that the contents of the contract such as Customer Agreement, Service Level Agreement (SLA) atau Acceptable Use Policy (AUP) is understood before signing up for use any service. Department consider other CSPs in the event of any terms within the contract is misunderstood and dubious. Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 20 can Machine Translated by Google 10.2 Service Level Agreement (SLA) 10.2.1 Usually the SLA contained in the contract explains the level of service agreed through a number of factors (attributes) such as availability, performance or serviceability (serviceability); and 10.2.2 The SLA shall clarify the matrix threshold along with the penalty financial in the event of a service disruption or breach of contract. 10.3 Data Ownership 10.3.1 Procurement specifications provided by the Department shall contains certain clauses regarding the ownership status of the data ) ownership); 10.3.2 Data or information is the sole exclusive property of the Government and should not be considered an asset to the CSP and the Government may take such action as may be necessary. Hal this is to avoid any issues that may arise if the CSP has transferred, gone bankrupt or is subject to action under the law; and 10.3.3 The CSP is not allowed to use the information or data Department for commercial purposes or for other purposes without knowledge and permission of the Government. 10.4 Privacy Ensure that organizational data is not copied, modified, deleted, accessed without the permission of the Department. Misuse of organizational data through cloud computing services not only violate the policy Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 21 Machine Translated by Google the organization may even face legal action is in effect. 10.5 Audit 10.5.1 The Government shall be given the right to conduct an audit on CSP. The department shall review the requirements specified in the CSP Terms of Service ; 10.5.2 In certain cases such audit rights may be vested in a third party who has no interest in service providers with the consent of the Government; 10.5.3 This audit serves as a method to ensure that none any security vulnerabilities and non -compliances occur other than be able to ensure that risk management activities are tested periodically, comprehensive and updated accordingly; and 10.5.4 The audit methodology used should also take into account all information life cycle processes to ensure effectiveness control measures taken, adequate and within good condition as well as functioning all the time. 10.6 Compensation Incidents or security breaches can have implications and catastrophic damage to reputation, image, finances, security and defense. The department shall ensure that the CSP provides protection and indemnification in the event of an incident arising from an offense by the service provider (clause indemnification contained in his customary contract for protect the CSP from being sued by the consumer). Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 22 Machine Translated by Google 10.7 Liabilities The Department shall assess the limits of liability that may exist as a result of service interruptions that occur outside the control of the CSP. That matter including power supply interruptions, service dependencies by law, force majeure or internet access issues from the Internet Service Provider (ISP). 10.8 Right to Reach Element All procurement specifications and commercial contracts shall contain mandatory statements as follows: “CSP should give the right to achieve the elements of the system contains official information and official secret information, parties The government can take action as needed ”. 10.9 Exit Process Clauses relating to decommissioning or termination of the contract shall be clearly stated in the contract service. It includes the responsibilities of the Department and the CSP if the contract is terminated earlier such as failure of CSP to comply SLA or from any other factor. The department must ensure that an exit plan is prepared to ensure the process transition and migration went smoothly without loss, damage or data leakage. The department also has an appropriate time period to make copies of data and related logs such as system logs, logs network, server logs, transaction logs and audit trail until the exit process fully implemented. Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 23 Machine Translated by Google 11. THE IMPORTANCE OF PROTECTING INFORMATION IN THE ICT ENVIRONMENT Protection of information handled in an ICT environment particularly in cloud computing should take into account each the life cycle process of such information as in Figure 1. This includes to equipment components, databases and applications available on the system cloud computing. EXISTENCE STORAGE culling AUDIT TRACK DELIVERY EARNING RELEASE DATA BACKUP Figure 1: Information Life Cycle 12. DATA AND INFORMATION PROTECTION METHODS Data or information security requires technology and control specific to enforcing safety rules and provisions. Things to pay attention to are data migration protection to cloud computing, data protection during transmission and protection of data in logical or physical storage by the provider service. Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 24 Machine Translated by Google 12.1 Encryption 12.1.1 The Department or CSP shall ensure safety features information such as confidentiality, availability and data integrity protected. Confidentiality and integrity of data or information can protected through encryption methods at all levels transactions and data flows; 12.1.2 Ensure that data is always encrypted in all circumstances (data at rest, data in motion, data in use) before being stored in cloud computing to minimize the impact of incidents if such cloud computing services are compromised; 12.1.3 Among the security controls that can be applied in data transmission (data in motion) is like consumption secure communication channels (HTTPS, SFTP, VPN using SSL or IPSec and TLS) where key management, algorithms and key length meets security requirements; 12.1.4 This method of encryption shall also be applied to the use virtualization, multi tenant, data backed storage in particular in PaaS and SaaS services; and 12.1.5 Use of Trusted Cryptographic Products (CCP) is mandatory in matters involving official confidential information in accordance with the National Cryptography Policy. * key management (encryption key management) must comply Information Technology Instructions. Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 25 Machine Translated by Google 12.2 Isolation 12.2.1 Official confidential information shall be stored and processed within dedicated cloud computing infrastructure and placed in a Government -certified facility; 12.2.2 Data streams for official confidential information shall be segregated logical (software/ virtualization-based architectures) or physical (network, storage, database) in each model cloud computing; and 12.2.3 Design and multi-tenancy mechanism provided by CSP shall be evaluated by the Department first to ensure information cannot be accessed by other legitimate users (tenants) which use the same software and resources. 12.3 Access and Identity Management 12.3.1 Access and identity management is a critical function of a Departments that use cloud computing. This section describes information related to verification (authentication), access limit control and task segregation and responsibilities (segregation of duties) for each employee who engage with cloud computing services; 12.3.2 Basic features of cloud computing such as network access broad (broad network access) requires the Department to have a robust identity management cycle to implement. This because, users can access information or computing resources from various locations and equipment feared to have security impacts and risks; and 12.3.3 Therefore, identity management and user access control shall reviewed and prepared to ensure the use of the service Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 26 Machine Translated by Google cloud computing can be achieved safely and easily by users. Among the processes and controls that need to be implemented is covering the following: i. Cloud computing resources can only be accessed by authorized users only; ii. Access will only be granted if the role or function users who need such information or resources; iii. The existing CSP provides Role Based Access Control (RBAC) can help the Department manage computing resources better such as making a determination of who and what what they can do with the resource; iv. User access rights should be reviewed immediately or withdrawn return when a user profile changes; v. The user account must be terminated as soon as the user terminated or no longer granted permission for access to cloud computing; vi. The department shall ensure the use of a password long and safe to confirm service cloud computing; vii. Access to cloud computing services containing official confidential information shall be based on more than one user identification (Multi Factor Authentication); viii. The user authentication function should be separated from such applications for centralized management. It aims to Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 27 Machine Translated by Google simplifies the user and allows for immediate response against threats; and ix. All ICT information systems that use computing the cloud should be able to record and track actions user. 12.4 Security Software and Applications 12.4.1 To ensure that the security applications used are effective, maintained periodically (version updates, policies etc.), reliable and legal to use; and 12.4.2 Applications or cyber security products that may be used including Antivirus, Advanced Threat Protection (ATP), Next Generation Firewall (NGFW), Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Data Leakage Protection (DLP), Web Application Firewall (WAF) and other similar functions. 12.5 Safety Level Assessment The department shall ensure that the desired cyber security products used to comply with the following safety assessments: 12.5.1 Undergo safety testing such as penetration testing periodically (annually); 12.5.2 Undergoing regular product and system configuration audits (annual); 12.5.3 Obtain the EAL2 Common Criteria certification subject to below Common Criteria Recognition Authority (CCRA) recognition or other equivalent certification from a certification body recognized by the Government; and Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 28 Machine Translated by Google 12.5.4 Obtaining Technology Security Assurance (TSA) scheme certification or other equivalent certification from a certification body which is recognized by the Government. In addition, an assessment of the level of security should also be carried out on all elements of cloud computing are based on concepts security-in-depth includes components as follows : Web Interface; i. ii. Authentication/ Authorisation; iii. Network Services; iv. Transport Encryption; v. Crypto System; we. Cloud Interface; Mobile Interface; are you coming. viii. Security Configurability; ix. Software/ Firmware; and x. Physical Security. Any technical compliance assessment such as Security Posture activities Assessment (SPA) shall be conducted by a competent individual and allowed. 12.6 Data Sanitation 12.6.1 Data sanitation is an important element used during the process of disposing of information in a computing system cloud. The main objective of implementing data sanitation is to disposing of information permanently involving several processes and certain methods are used such as overwriting, removal, Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 29 Machine Translated by Google degaussing, physical destruction of media or other methods to protect information leakage; 12.6.2 The Department shall determine the procedure for disposal of information in CSP cloud computing facilities can be done according to safety requirements; 12.6.3 The CSP may clearly present methods of sanitation and control taken when information is to be disposed of. In the situation certain, the CSP may not be able to provide the process and information disposal methods appropriate to the classification information; 12.6.4 The data sanitation process should also be implemented on all backup copy of data (backup, recovery center) especially after decommissioning . Sanitation too should be implemented when the scale of services such as consumption storage space is reduced (scales down); and 12.6.5 Data sanitation process in both storage media and devices electronics shall refer to the Media Sanitation Guidelines Public Sector Electronics. 12.7 Data / Information Leakage 12.7.1 In -depth awareness and knowledge of officers public in handling official secrets can cause data critical Government moved into cloud computing on a regular basis Did not mean to. This leakage control can be made through fixation policies and the use of technological solutions such as Data systems Leakage Protection (DLP) dan Digital Rights Management (DRM); dan Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 30 Machine Translated by Google 12.7.2 If official confidential information has been transferred, the sanitation process corresponding to the classification of the information shall be performed. The CSP cannot be held accountable and has no liability for consumer negligence on the part of the customer. Department it is recommended to make an initial agreement with the CSP so that flexibility is given to storage media that keep official secrets given access for sanitation purposes. 13.DATA CENTER PHYSICAL SECURITY CONTROLS AND INFRASTRUCTURE ICT In cloud computing services, security control to data centers and ICT infrastructure is under the responsibility and CSP control. 13.1 Safety Assessment 13.1.1 The Department shall ensure safety assessment comprehensive is implemented to ensure security controls provided by the service provider in accordance with the standard and regulations in force; 13.1.2 Evaluation covers location selection, design and layout physical data center, network cabling system, cooling system (HVAC), electrical systems, detection and prevention systems fire, safety management system, control system and environmental monitoring; and 13.1.3 Appropriate physical security controls shall also applied to all supporting places, rooms and facilities such cloud computing services. Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 31 Machine Translated by Google 13.2 Security Certification Data Centers that have obtained security certification from the body Government -recognized bodies or international bodies are encouraged and prioritized. 13.3 Classified Areas A CSP or Data Center facility that stores or manages secrets official can mean a classified area and should be given full protection in accordance with paragraph 39, Safety Instructions (Revision and Amendment 2017). To determine the need to declare the area under the Act Prohibited Areas and Prohibited Places 1959 (Act 298) and Act 88, a reference must be made to the Director General of Security Government. 13.4 Security Screening 13.4.1 Community Safety Security community involved in managing and operating cloud computing must undergo a process and pass the Security Screening; and 13.4.2 Certificate of Official Secrets Act 1972 The Safety Community is also required to sign a Certificate Official Secrets Act 1972 in APPENDIX “E” and “F” as the case may be the requirements of the Safety Directive (Revision and Amendment 2017). 13.5 Official Secret Security Validation The Department shall refer to the Office of the Chief Security Officer Government of Malaysia to seek advice on Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 32 Machine Translated by Google evaluation of cloud computing services to be used for official secret purposes. 13.6 Support Identify CSPs that can provide quick feedback if the user encounters any problems on the system. Among the support platforms that can be used are such as phones, emails or websites that have feedback forums such as the frequently asked questions column and others. 13.7 Notifications The CSP shall inform the user of any incidents or security breaches in accordance with established SOPs. 14. INCIDENT MANAGEMENT 14.1 The Department shall ensure the management of information in cloud computing can be monitored through mechanisms appropriate safety monitoring whether graded departmentally or centrally for the purpose of any coordination incidents of possible cyber threats can occur over cloud computing infrastructure. 14.2 The Department should refer to the Cyber Security Policy on the latest incident management established by the respective Departments respectively. 14.3 All incidents need an implication assessment and risk assessment security at the Department level before being reported to the agency responsible for further action. Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 33 Machine Translated by Google 15. SERVICE CONTINUITY MANAGEMENT 15.1 The Department shall ensure that the CSP creates or has service continuity management plan (PKP) to ensure functions and services transferred to cloud computing can be restored in the event of any disruption or failure to cloud computing infrastructure. 15.2 In certain circumstances, the Department is given permission to test and make an on-site assessment at the CSP facility to determine controls and measures to be taken during and after the event disaster. 15.3 The Department can also review and verify PKP documents if the CSP has Business Continuity related certification Management (BCM) from any accredited body. When PKP tested a notification or official notification to the Department shall be made regardless of whether it meets the SLA or neither. 16. DATA AVAILABILITY AND BACKUP 16.1 Departments should not be entirely dependent on providers service in the event of a disruption. A recovery plan disasters should be provided to facilitate the migration process and failover is performed within the appropriate time period. 16.2 The contract shall clearly state the CSP’s obligations to ensure the system or service can be restored within a specified period when a failure occurs at the source cloud computing. Data validation can also be done automatic for checking data integrity at any time Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 34 Machine Translated by Google required. In addition, CSP has related resources and policies with an easy -to -manage online data backup process. 17.CONCLUSION These guidelines are provided as a guide and reference to the Department on the management of official matters and official secrets and interests implement internal protection security control measures cloud computing environment to ensure asset security and Government information is secured at all times. Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 35 Machine Translated by Google 18.REFERENCES 1. Official Secrets Act 1972 [Act 88] 2. National Archives Act 2003 [Act 629] 3. Digital Signature Act 1997 [Act 562] 4. Personal Data Protection Act 2010 [Act 709] 5. Prohibited Areas Prohibited Places Act 1959 [Act 298] 6. Evidence Act 1950 [Act 56] 7. Safety Instructions (Revision and Amendment 2017) 8. Directive 24 - National Cyber Crisis Management Policies and Mechanisms 9. Information Technology Directive 2007 10. Basic Cryptography of the Country 2013 11. Public Sector Cyber Security Framework (RAKKSSA) 12. General Circular Letter No. 2/1987 - Secret Management Rules Official In Accordance With The Provisions Of The Official Secrets Act (Amendment 1987). 13. General Circular Letter No. 4 of 2006 - Operations Management Information and Communication Technology (ICT) Sector Security Incidents Public 14. General Circular Letter No. 3 of 2009 - Evaluation Guidelines Level of Network Security and Public Sector ICT Systems. 15. General Circular No. 1 of 2001 - Incident Reporting Mechanism Information and Communication Technology (ICT) Security 16. General Circular Letter No. 6 of 2005 - Risk Assessment Guidelines Public Sector Information Security 17. General Circular No. 1 of 2015 - Implementation of Sector Open Data Public 18. Other directives in force 19. ISO/IEC 27001:2013 Information Technology – Security Techniques – Information Security Management Systems – Requirements Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 36 Machine Translated by Google 20. ISO/IEC 27017:2015 Information Technology – Security Techniques – Code of Practice for Information Security Controls based on ISO/IEC 27002 for Cloud Services 21. ISO/IEC 22301: 2010 Security and Resilience – Business continuity management system – Requirements 22. NIST Special Publication 800-145 - The NIST Definition of Cloud Computing 23. NIST Special Publication 800-144 - Guidelines on Security and Privacy in Public Cloud Computing 24. NIST Special Publication 800-53, Revision 2 Recommended Security Controls for Federal Information Systems 25. NIST Cloud Computing Reference Architecture (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 500-292 26. Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing 27. OWASP Top 10 Application Vulnerabilities Guidelines for Information Security Management through Cloud Computing ) Computing) In the Public Serviceÿ 37 Machine Translated by Google APPENDIX 1 INFORMATION CLASSIFICATION MATRIX IN THE IMPLEMENTATION OF CLOUD COMPUTING IN THE PUBLIC SERVICE DATA RESIDENCE CLOUD MODELS ALLOWED Classification Information Rating Security (Center Data Department) Private Hybrid Off-Premise (Government Premises) ( including Foreign CSP (developed for MyGovCloud@PDSA) OFFICIAL Country) On-Premise Public Local CSP Open Data Off-Shore (Outside On-Shore (Domestic) Traditional CSP Awards Local CSP / Foreign CSP Government / / / / / / x / / RESTRICTED / x / DIFFICULT / x Isolate Isolate / / / / / / x / / / / / / / x x x x x x x x x x x x x x Controlled Data (Financial, Record Medicine, PII) /* /* x x SECRET OFFICIAL SECRET SECRET BIG * off -schedule information only. 139. Use of cloud computing (cloud computing) such as information sharing, data processing etc. for the purpose of official secrecy is not allowed at all except cloud computing developed and authorized by the Government and subject to instructions issued by the Government from time to time Guidelines for Information Security Management through Cloud Computing in the Public Serviceÿ 38 Machine Translated by Google