Information Security
Federal Guidance Needed to Address Control Issues with Implementing Cloud Computing
Gao ID: GAO-10-513 May 27, 2010
Cloud computing, an emerging form of computing where users have access to scalable, on-demand capabilities that are provided through Internet-based technologies, has the potential to provide information technology services more quickly and at a lower cost, but also to introduce information security risks. Accordingly, GAO was asked to (1) identify the models of cloud computing, (2) identify the information security implications of using cloud computing services in the federal government, and (3) assess federal guidance and efforts to address information security when using cloud computing. To do so, GAO reviewed relevant publications, white papers, and other documentation from federal agencies and industry groups; conducted interviews with representatives from these organizations; and surveyed 24 major federal agencies.
Cloud computing has several service and deployment models. The service models include the provision of infrastructure, computing platforms, and software as a service. The deployment models relate to how the cloud service is provided. They include a private cloud, operated solely for an organization; a community cloud, shared by several organizations; and a public cloud, available to any paying customer. Cloud computing can both increase and decrease the security of information systems in federal agencies. Potential information security benefits include those related to the use of virtualization, such as faster deployment of patches, and from economies of scale, such as potentially reduced costs for disaster recovery. Risks include dependence on the security practices and assurances of a vendor, dependency on the vendor, and concerns related to sharing of computing resources. However, these risks may vary based on the cloud deployment model. Private clouds may have a lower threat exposure than public clouds, but evaluating this risk requires an examination of the specific security controls in place for the cloud's implementation. Federal agencies have begun efforts to address information security issues for cloud computing, but key guidance is lacking and efforts remain incomplete. Although individual agencies have identified security measures needed when using cloud computing, they have not always developed corresponding guidance. For example, only nine agencies reported having approved and documented policies and procedures for writing comprehensive agreements with vendors when using cloud computing. Agencies have also identified challenges in implementing existing federal information security guidance and the need to streamline and automate the process of implementing this guidance. These concerns include having a process to assess vendor compliance with government information security requirements and the division of information security responsibilities between the customer and vendor. Furthermore, while several governmentwide cloud computing security initiatives are under way by organizations such as the Office of Management and Budget (OMB) and the General Services Administration (GSA), little has been completed as a result of these efforts. For example, OMB has not yet finished a cloud computing strategy. GSA has begun a procurement for cloud computing services, but has faced challenges in completing the procurement due in part to information security concerns. In addition, while the Department of Commerce's National Institute of Standards and Technology has begun efforts to address cloud computing information security, it has not yet issued cloud-specific security guidance. Until specific guidance and processes are developed to guide agencies in planning for and establishing information security for cloud computing, they may not have effective information security controls in place for cloud computing programs. GAO is recommending that the Office of Management and Budget, General Services Administration, and the Department of Commerce take several steps to address cloud computing security, including completion of a strategy, consideration of security in a planned procurement of cloud computing services, and issuance of guidance related to cloud computing security. In comments on a draft of this report, these agencies generally concurred with GAO's recommendations and described efforts under way to implement them.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Gregory C. Wilshusen
Team:
Government Accountability Office: Information Technology
Phone:
(202) 512-6244
GAO-10-513, Information Security: Federal Guidance Needed to Address Control Issues with Implementing Cloud Computing
This is the accessible text file for GAO report number GAO-10-513
entitled 'Information Security: Federal Guidance Needed to Address
Control Issues with Implementing Cloud Computing' which was released
on July 1, 2010.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as
part of a longer term project to improve GAO products' accessibility.
Every attempt has been made to maintain the structural and data
integrity of the original printed product. Accessibility features,
such as text descriptions of tables, consecutively numbered footnotes
placed at the end of the file, and the text of agency comment letters,
are provided but may not exactly duplicate the presentation or format
of the printed version. The portable document format (PDF) file is an
exact electronic replica of the printed version. We welcome your
feedback. Please E-mail your comments regarding the contents or
accessibility features of this document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to Congressional Requesters:
United States Government Accountability Office:
GAO:
May 2010:
Information Security:
Federal Guidance Needed to Address Control Issues with Implementing
Cloud Computing:
GAO-10-513:
GAO Highlights:
Highlights of GA0-10-513, a report to congressional requesters:
Why GAO Did This Study:
Cloud computing, an emerging form of computing where users have access
to scalable, on-demand capabilities that are provided through Internet-
based technologies, has the potential to provide information
technology services more quickly and at a lower cost, but also to
introduce information security risks. Accordingly, GAO was asked to
(1) identify the models of cloud computing, (2) identify the
information security implications of using cloud computing services in
the federal government, and (3) assess federal guidance and efforts to
address information security when using cloud computing. To do so, GAO
reviewed relevant publications, white papers, and other documentation
from federal agencies and industry groups; conducted interviews with
representatives from these organizations; and surveyed 24 major
federal agencies.
What GAO Recommends:
GAO is recommending that the Office of Management and Budget, General
Services Administration, and the Department of Commerce take several
steps to address cloud computing security, including completion of a
strategy, consideration of security in a planned procurement of cloud
computing services, and issuance of guidance related to cloud
computing security. In comments on a draft of this report, these
agencies generally concurred with GAO's recommendations and described
efforts under way to implement them.
What GAO Found:
Cloud computing has several service and deployment models. The service
models include the provision of infrastructure, computing platforms,
and software as a service. The deployment models relate to how the
cloud service is provided. They include a private cloud, operated
solely for an organization; a community cloud, shared by several
organizations; and a public cloud, available to any paying customer.
Cloud computing can both increase and decrease the security of
information systems in federal agencies. Potential information
security benefits include those related to the use of virtualization,
such as faster deployment of patches, and from economies of scale,
such as potentially reduced costs for disaster recovery. Risks include
dependence on the security practices and assurances of a vendor,
dependency on the vendor, and concerns related to sharing of computing
resources. However, these risks may vary based on the cloud deployment
model. Private clouds may have a lower threat exposure than public
clouds, but evaluating this risk requires an examination of the
specific security controls in place for the cloud's implementation.
Federal agencies have begun efforts to address information security
issues for cloud computing, but key guidance is lacking and efforts
remain incomplete. Although individual agencies have identified
security measures needed when using cloud computing, they have not
always developed corresponding guidance. For example, only nine
agencies reported having approved and documented policies and
procedures for writing comprehensive agreements with vendors when
using cloud computing. Agencies have also identified challenges in
implementing existing federal information security guidance and the
need to streamline and automate the process of implementing this
guidance. These concerns include having a process to assess vendor
compliance with government information security requirements and the
division of information security responsibilities between the customer
and vendor. Furthermore, while several governmentwide cloud computing
security initiatives are under way by organizations such as the Office
of Management and Budget (OMB) and the General Services Administration
(GSA), little has been completed as a result of these efforts. For
example, OMB has not yet finished a cloud computing strategy. GSA has
begun a procurement for cloud computing services, but has faced
challenges in completing the procurement due in part to information
security concerns. In addition, while the Department of Commerce's
National Institute of Standards and Technology has begun efforts to
address cloud computing information security, it has not yet issued
cloud-specific security guidance. Until specific guidance and
processes are developed to guide agencies in planning for and
establishing information security for cloud computing, they may not
have effective information security controls in place for cloud
computing programs.
View [hyperlink, http://www.gao.gov/products/GA0-10-513] or key
components. For more information, contact Gregory C. Wilshusen (202)
512-6244 or wilshuseng@gao.gov.
[End of section]
Contents:
Letter:
Background:
Cloud Computing Is a Form of Shared Computing with Several Service and
Deployment Models:
Cloud Computing Has Both Positive and Negative Information Security
Implications:
Federal Agencies Have Begun Efforts to Address Information Security
Issues for Cloud Computing, but Specific Guidance Is Lacking and
Efforts Remain Incomplete:
Conclusions:
Recommendations for Executive Action:
Agency Comments and Our Evaluation:
Appendix I: Objectives, Scope, and Methodology:
Appendix II: Cloud Computing Case Studies:
Appendix III: Comments from the Office of Management and Budget:
Appendix IV: Comments from the General Services Administration:
Appendix V: Comments from the Department of Commerce:
Appendix VI: GAO Contact and Staff Acknowledgments:
Tables:
Table 1: NIST Essential Characteristics of Cloud Computing:
Table 2: Potential Benefits of Cloud Computing:
Table 3: Potential Risks of Cloud Computing:
Figures:
Figure 1: Cloud Computing Service Models:
Figure 2: Cloud Computing Deployment Models:
Figure 3: NIST Essential Characteristics:
Figure 4: NASA Nebula Container:
Abbreviations:
CARS: Car Allowance Rebate System:
CIO: chief information officer:
DOD: Department of Defense:
DOT: Department of Transportation:
FIPS: Federal Information Processing Standards:
FISMA: Federal Information Security Management Act:
GSA:General Services Administration:
IT: information technology:
NASA: National Aeronautics and Space Administration:
NIST: National Institute of Standards and Technology:
RACE: Rapid Access Computing Environment:
SAS: Statement on Auditing Standards:
SP: Special Publication:
[End of section]
United States Government Accountability Office:
Washington, DC 20548:
May 27, 2010:
Congressional Requesters:
Cloud computing, an emerging form of delivering computing services,
has been highlighted by the current administration as having the
potential to provide information technology (IT) services both more
quickly and at a lower cost. Although exact definitions vary, cloud
computing can, at a high level, be described as a form of computing
where users have access to scalable, on-demand IT capabilities that
are provided through Internet-based technologies.
Cloud computing has been reported to have several potential benefits
over current systems, including faster deployment of computing
resources, a decreased need to buy hardware or to build data centers,
and more robust collaboration capabilities. However, along with these
benefits are the potential risks that any new form of computing
services can bring, including information security breaches,
infrastructure failure, and loss of data. Several media reports have
described security breaches of cloud infrastructure. Furthermore,
other reports have identified security as the major concern hindering
federal agencies from adopting cloud computing.
Given these concerns, you asked us to (1) identify the models of cloud
computing, (2) identify the information security implications of using
cloud computing services in the federal government, and (3) assess
federal guidance and efforts to address information security when
using cloud computing.
To identify the models of cloud computing, we reviewed publications,
guidance, and other documentation from the National Institute of
Standards and Technology (NIST), industry groups, and private-sector
organizations and then conducted interviews with representatives from
these organizations to identify commonly expressed characteristics of
cloud computing. To identify information security implications of
using cloud computing services in the federal government, we obtained
and reviewed publications and guidance from the preceding sources and
analyzed them to identify positive and negative information security
implications of using cloud computing. We also obtained perceptions of
security implications from federal agencies by developing, pretesting,
and distributing a survey to 24 major federal agencies.[Footnote 1] To
assess federal guidance and efforts to address information security
when using cloud computing, we obtained and analyzed federal
information security guidance relevant to cloud computing, identified
federal agencies that have implemented cloud computing services, and
examined relevant agency security practices related to cloud computing
for consistency with existing federal guidance. Appendix I contains
additional details on the objectives, scope, and methodology of our
review.
We conducted this performance audit from September 2009 through May
2010 in accordance with generally accepted government auditing
standards. Those standards require that we plan and perform the audit
to obtain sufficient, appropriate evidence to provide a reasonable
basis for our findings and conclusions based on our audit objectives.
We believe that the evidence obtained provides a reasonable basis for
our findings and conclusions based on our audit objectives.
Background:
Cloud computing is an emerging form of computing that relies on
Internet-based services and resources to provide computing services to
customers, while freeing them from the burden and costs of maintaining
the underlying infrastructure. Examples of cloud computing include Web-
based e-mail applications and common business applications that are
accessed online through a browser, instead of through a local
computer. The President's budget has identified the adoption of cloud
computing in the federal government as a way to more efficiently use
the billions of dollars spent annually on IT.[Footnote 2] As part of
the 2011 budget, the administration plans to deploy cloud computing in
a series of pilot projects across the government. According to the
President's budget, these pilots could potentially lead to significant
savings in federal IT spending. However, along with the potential
benefits of using cloud computing come the potential risks and
challenges of adopting a new model for delivering IT services.
Federal Systems and Infrastructure Are at Risk from Cyber Threats:
We have previously reported that cyber threats to federal information
systems and cyber-based critical infrastructures are evolving and
growing.[Footnote 3] Without proper safeguards, computer systems are
vulnerable to individuals and groups with malicious intentions who can
intrude and use their access to obtain and manipulate sensitive
information, commit fraud, disrupt operations, or launch attacks
against other computer systems and networks. The threat is substantial
and increasing for many reasons, including the ease with which
intruders can obtain and use hacking tools and technologies.
Our previous reports and those by agency inspectors general describe
serious and widespread information security control deficiencies that
continue to place federal assets at risk of inadvertent or deliberate
misuse, mission-critical information at risk of unauthorized
modification or destruction, sensitive information at risk of
inappropriate disclosure, and critical operations at risk of
disruption. Accordingly, we have designated information security as a
governmentwide high-risk area since 1997,[Footnote 4] a designation
that remains in force today.[Footnote 5]
Further, the growing interconnectivity among information systems, the
Internet, and other infrastructure presents increasing opportunities
for attacks. For example, in 2009, several media reports described
incidents that affected cloud service providers such as Amazon and
Google. According to these reports, in December 2009, Amazon's Elastic
Compute Cloud experienced two attacks on its cloud infrastructure.
Google reported that in December 2009, an attack was made on e-mail
accounts that it provided, which resulted in the inadvertent release
of sensitive information. Adoption of cloud computing will require
federal agencies to implement new protocols and technologies and
interconnect diverse networks and systems while mitigating and
responding to threats.
Policies, Procedures, and Required Controls Have Been Established to
Protect Federal Information and Information Systems:
Federal laws and guidance specify requirements for protecting federal
systems and data. This includes systems used or operated by a
contractor or other organization on behalf of a federal agency, which
would include cloud computing. Recognizing the importance of securing
federal systems and data, Congress enacted the Federal Information
Security Management Act of 2002 (FISMA) to strengthen the security of
federal information and information systems within federal agencies.
FISMA requires each agency to develop, document, and implement an
agencywide information security program to provide security for the
information and information systems that support operations and assets
of the agency, including those provided or managed by another agency,
contractor, or other source. Specifically, FISMA requires that
information security programs include, among other things, the
following:
* risk-based policies and procedures that cost-effectively reduce
information security risks to an acceptable level and ensure that
information security is addressed throughout the life cycle of each
information system;
* periodic testing and evaluation of the effectiveness of information
security policies, procedures, and practices that include testing of
management, operational, and technical controls for every system
identified in the agency's required inventory of major information
systems;
* a process for planning, implementing, evaluating, and documenting
remedial actions to address any deficiencies in the information
security policies, procedures, and practices of the agency;
* procedures for detecting, reporting, and responding to security
incidents; and;
* plans and procedures to ensure continuity of operations for
information systems that support the operations and assets of the
agency.
FISMA assigns certain responsibilities to the Office of Management and
Budget (OMB) and other responsibilities to NIST. FISMA states that the
Director of OMB shall oversee agency information security policies and
practices, including:
* developing and overseeing the implementation of policies,
principles, standards, and guidelines on information security;
* requiring agencies to identify and provide information security
protections commensurate with the risk and magnitude of harm resulting
from the unauthorized access, use, disclosure, disruption, or
destruction of information collected or maintained by or on behalf of
an agency, or information or information systems used or operated by
an agency, or by a contractor or other organization on behalf of an
agency;
* overseeing agency compliance with FISMA to enforce accountability;
and;
* reviewing, at least annually, and approving or disapproving agency
information security programs.
Each year, OMB provides instructions to federal agencies regarding
FISMA reporting. In this guidance, for example, OMB has stated that
agencies are permitted to utilize private sector data services,
provided that appropriate security controls are implemented and, more
generally, that agencies ensure that their information security
programs apply to all organizations that possess or use federal
information, including contractors.
Under FISMA, NIST is tasked with developing, for systems other than
national security systems, standards and guidelines that must include,
at a minimum, (1) standards to be used by all agencies to categorize
all of their information and information systems based on the
objectives of providing appropriate levels of information security,
according to a range of risk levels; (2) guidelines recommending the
types of information and information systems to be included in each
category; and (3) minimum information security requirements for
information and information systems in each category.
Specifically, NIST has developed a risk management framework of
standards and guidelines for agencies to follow in developing
information security programs.
* NIST Special Publication (SP) 800-37, Revision 1, Guide for Applying
the Risk Management Framework to Federal Information Systems: A
Security Life Cycle Approach.[Footnote 6];
* Federal Information Processing Standard (FIPS) 199, Standards for
Security Categorization of Federal Information and Information
Systems.[Footnote 7];
* FIPS 200, Minimum Security[Footnote 8];
* NIST SP 800-53, Recommended Security Controls for Federal
Information Systems and Organizations.[Footnote 9]
NIST SP 800-37 provides agencies with guidance for applying a risk
management framework to federal information systems to include
security categorization, security control selection and
implementation, security control assessment, information system
authorization, and security control monitoring. This framework
includes the preparation of a security assessment report and
authorization package.[Footnote 10]
FIPS 199 provides agencies with criteria to identify and categorize
all of their information and information systems based on the
objectives of providing appropriate levels of information security
according to a range of risk levels.
FIPS 200 requires a baseline of minimum information security controls
for protecting the confidentiality, integrity, and availability of
federal information systems and the information processed, stored, and
transmitted by those systems. FIPS 200 directs agencies to implement
these baseline control recommendations as follows:
* Access control: limit information system access to authorized users
and to the types of transactions and functions that authorized users
are permitted to exercise.
* Certification, accreditation, and security assessments: periodically
assess security controls, develop and implement plans of action
designed to correct deficiencies and reduce or eliminate
vulnerabilities, authorize operation of systems and any associated
system connections, and monitor system security controls on an ongoing
basis.
* Risk assessment: periodically assess the risk to operations, assets,
and individuals, resulting from the operation of systems and the
associated processing, storage, or transmission of information.
In applying the provisions of FIPS 200, agencies first categorize
their information and systems as required by FIPS 199, and then
typically select an appropriate set of security controls from NIST SP
800-53 to satisfy their minimum security requirements. This helps to
ensure that appropriate security requirements and security controls
are applied to all federal information and information systems
including cloud computing.
Selected Organizations Have Established Information Security Guidance
for Cloud Computing:
As stated previously in this report, federal laws, such as FISMA, and
guidance such as that issued by NIST, specify requirements for
protecting federal systems and data. Other organizations have
developed security models and guidance that specifically apply to
cloud computing services. These groups include the Cloud Security
Alliance and the European Network and Information Security Agency.
The Cloud Security Alliance is a nonprofit organization formed to
promote the use of leading practices for providing security assurance
when using cloud computing. In December 2009, the alliance issued
Security Guidance for Critical Areas of Focus in Cloud Computing,
v2.1.[Footnote 11]
The guidance provides recommendations in 13 cloud computing domains:
* Architectural framework: provides a conceptual framework focusing on
cloud computing.
* Governance and enterprise risk management: ability of an
organization to govern and measure enterprise risks.
* Legal and electronic discovery: potential legal issues including
protection requirements for information and computer systems.
* Compliance and audit: proving compliance when using cloud computing
during an audit.
* Information life cycle management: managing data that is placed in
the cloud and determining responsibility for data confidentiality,
integrity, and availability.
* Portability and interoperability: the ability to move data and
services from one provider to another or bring it back in-house.
* Traditional security, business continuity, and disaster recovery:
identifying where cloud computing may assist in lowering security
risks, while potentially increasing it in other areas.
* Data center operations: common data center characteristics that
could be detrimental to ongoing services, and those that are
fundamental to long-term stability.
* Incident response, notification, and remediation: addresses
complexities that cloud computing brings to an incident handling
program and forensics for both the provider and customer.
* Application security: securing application software that is either
running on or being developed in the cloud.
* Encryption and key management: identifying proper encryption usage
and scalable key management.
* Identity and access management: focuses on issues encountered when
extending an organization's identity into the cloud.
* Virtualization: risks associated with items such as multitenancy, or
the sharing of computing resources by different organizations.
For each domain, the guidance documents areas of concern for cloud
computing.
The European Network and Information Security Agency is an
organization established by the European Union that specializes in
information security. In November 2009, the agency issued Cloud
Computing: Benefits, Risks, and Recommendations for Information
Security,[Footnote 12] which provides a set of information
requirements and includes questions that a customer can ask a cloud
computing service provider in order to evaluate the service provider's
information security practices. The requirements address:
* Personnel security: policies and procedures when hiring IT
administrators or others with system access.
* Supply chain assurance: defining and detailing services outsourced
or subcontracted, inquiring about the measures taken to ensure third-
party service levels are met and maintained, and confirmation that
security policy and controls are applied to third party providers.
* Operational security: ensuring a provider employs appropriate
controls to mitigate unauthorized disclosure of information in
addition to defined agreements.
* Identity and access management: controls that apply to both the
cloud providers and the customer, including access control,
authorization, frameworks, identity provisioning, management of
personal data, key management, encryption, authentication, and
credential compromise or theft.
* Asset management: ensuring cloud providers maintain an inventory of
the assets under their control.
* Data and services portability: clarifying the risks related to
becoming dependent on one vendor.
* Business continuity management: maintaining a documented method to
determine the impact of a disruption and the relevant response and
restoration process.
* Physical security: ensuring the vendor provides adequate physical
security for the customers' data.
* Environmental controls: policies and procedures to ensure
environmental issues such as fires, floods, and power failures do not
cause an interruption of service.
* Legal requirements: compliance with regulatory frameworks.
In addition, the agency's Information Assurance Framework[Footnote 13]
states the need for a clear definition and understanding of security-
relevant roles and responsibilities between the customer and the
provider.
Cloud Computing Is a Form of Shared Computing with Several Service and
Deployment Models:
According to NIST, cloud computing is a means "for enabling
convenient, on-demand network access to a shared pool of configurable
computing resources that can be rapidly provisioned and released with
minimal management effort or service provider interaction."[Footnote
14] This definition has been generally adopted throughout the federal
government. Cloud computing is a form of delivering IT services that
takes advantage of several broad evolutionary trends in IT, including
the use of virtualization;[Footnote 15] the decreased cost and
increased speed of networked communications, such as the Internet; and
overall increases in computing power. As such, any definition of cloud
computing will be somewhat broad and subject to interpretation. While
several other organizations have developed definitions of cloud
computing, many of the elements of these definitions are encompassed
in the NIST definition.
Cloud computing is further defined by its service and deployment
models. There are three service models: infrastructure as a service,
platform as a service, and software as a service (see figure 1).
* Infrastructure as a service provides various infrastructure
components such as hardware, storage, and other fundamental computing
resources.
* Platform as a service provides a service that runs over an
underlying infrastructure. A platform vendor offers a ready-to-use
platform, such as an operating system like Microsoft Windows or Linux,
which runs on vendor-provided infrastructure. Customers can build
applications on a platform using application development frameworks,
middleware capabilities, and functions such as databases.
* Software as a service runs on an underlying platform and
infrastructure managed by the vendor and provides a self-contained
operating environment used to deliver a complete application such as
Web-based email and related management capabilities.
Figure 1: Cloud Computing Service Models:
[Refer to PDF for image: illustration]
Infrastructure as a service:
The consumer has the capability to provision processing, storage,
networks, and other fundamental computing resources where the consumer
is able to deploy and run his or her own software, which can include
operating systems and applications. The consumer does not manage or
control the underlying infrastructure but controls and configures
operating systems, storage, deployed applications, and possibly,
selected networking components (e.g., host firewalls).
Platform as a service:
Consumers deploy consumer-created or acquired applications created
using programming languages and tools supported by the provider. The
consumer does not manage or control the underlying infrastructure, but
controls and configures the deployed applications and platform.
Software as a service:
Consumer uses the provider‘s applications that are accessible from
various client devices through an interface such as a Web browser
(e.g., Web-based e-mail). The consumer does not manage or control the
underlying infrastructure or the individual application capabilities.
Source: GAO analysis of NIST data.
[End of figure]
In addition to the service models that describe what can be provided,
NIST and other entities describe four deployment models that relate to
how the cloud service is provided. These four cloud models are
private, community, public, and hybrid (see fig. 2). In a private
cloud, the service is set up specifically for one organization,
although there may be multiple customers within that organization, and
the cloud may exist on or off the premises. In a community cloud, the
service is set up for related organizations that have similar
requirements. A public cloud is available to any paying customer and
is owned and operated by the service provider. A hybrid cloud is a
composite of the deployment models.
Figure 2: Cloud Computing Deployment Models:
[Refer to PDF for image: illustration]
Private cloud is operated solely for an organization and the cloud may
be on or off the premises.
Community cloud is shared by several organizations and supports a
specific community of customers that have similar information
technology requirements.
Public cloud has an infrastructure that is made available to the
general public or large industry group.
Hybrid cloud has an infrastructure that is composed of two or more
clouds that remain unique entities but are bound together by
standardized or proprietary technology.
Source: GAO analysis of NIST data.
[End of figure]
According to NIST, cloud computing includes each of the
characteristics listed in table 1 and in figure 3.
Table 1: NIST Essential Characteristics of Cloud Computing:
Essential characteristic: On-demand self service;
Description: Consumer can unilaterally provision computing
capabilities as needed automatically, without interaction with the
service's provider.
Essential characteristic: Broad network access;
Description: Capabilities are available over the network and accessed
through standard mechanisms such as desktop computers, laptops, mobile
phones, and personal digital assistants.
Essential characteristic: Resource pooling;
Description: Provider's computing resources are pooled to serve
multiple consumers using a multitenant model, with different physical
and virtual resources dynamically assigned and reassigned according to
consumer demand.
Essential characteristic: Rapid elasticity;
Description: Capabilities can be rapidly and elastically provisioned,
in some cases automatically, to quickly scale out (increase) and
rapidly released to quickly scale back in (decrease).
Essential characteristic: Measured service;
Description: Cloud systems automatically control and optimize resource
use by leveraging a metering (measured use) capability at some level
of abstraction appropriate to the type of service.
Source: GAO analysis of NIST data.
[End of table]
Figure 3: NIST Essential Characteristics:
[Refer to PDF for image: illustration]
On-demand self service:
Broad network access:
Internet:
Measured service:
Pooled resources:
Rapid elasticity:
Applications;
Processing/platforms;
Storage.
Source: GAO.
[End of figure]
While NIST states that all five of its essential characteristics
should be present for an application to be considered cloud computing,
other federal officials and experts stated that an application that
has some but not all of these characteristics could still be
considered cloud computing.
Cloud Computing Has Both Positive and Negative Information Security
Implications:
Cloud computing can both increase and decrease the security of
information systems. Potential information security benefits include
those related to the use of virtualization, such as faster deployment
of patches, and from economies of scale, such as potentially reduced
costs for disaster recovery. Risks include those related to dependence
on the security assurances of a vendor; dependence on the vendor; and
concerns related to multitenancy, or sharing computing resources among
different organizations. However, these risks may vary based on the
cloud deployment model.
Cloud Computing Can Provide Potential Information Security Benefits:
The use of cloud computing has the potential to provide several
benefits related to information security. These benefits are related
to the attributes of cloud computing”specifically, its use of
virtualization and automation, broad network access, potential
economies of scale, and use of self-service technologies.
The use of virtualization and automation in cloud computing can
expedite the implementation of secure configurations for virtual
machine images. Department of Defense (DOD) officials responsible for
one cloud computing program stated that virtualization allows a cloud
computing provider to rapidly replicate secure configurations for
cloud-based virtual servers, rather than manually applying secure
configurations to physical servers, which could be required in a
traditional environment that has not employed virtualization
techniques. Private sector representatives also stated that
virtualization can allow faster deployment of secure server
configurations, security upgrades, and patches for security
vulnerabilities than a traditional computing infrastructure can.
Other advantages relate to cloud computing's broad network access and
use of Internet-based technologies. For example, several agencies
stated that cloud computing provided a reduced need to carry data in
removable media because of the ability to access the data through the
Internet, regardless of location. NIST officials stated that shifting
public data to a public cloud using the Internet that is separate from
the agency's internal network is a means of network segmentation that
may reduce exposure of sensitive data on the agency's internal network.
Additional advantages relate to the potential economies of scale and
distributed nature of cloud computing. For example, in response to our
survey, 22 of the 24 agencies identified low-cost disaster recovery
and data storage as a potential benefit. Specifically, cloud computing
may provide a cheaper way to store backup copies of information.
Agencies also stated that a cloud provider may have more resources to
devote to security than the agency may have available. The large-scale
and mitigation techniques that cloud providers offer may also reduce
vulnerability to denial of service attacks. Department of
Transportation (DOT) officials responsible for a cloud computing
program noted that the program's Web site, which used a cloud
computing service provider, was better able to withstand a denial of
service attack because of the use of the cloud provider. The National
Aeronautics and Space Administration (NASA) officials responsible for
another cloud computing program stated that it may require less effort
for cloud computing customers to ensure effective information security
if information security controls were already implemented by the
provider. Customers could also be freed from the responsibility of
maintaining a physical infrastructure, as well as resolving
management, operational, and technical issues related to the
underlying cloud platform, although the customers would still be
responsible for ensuring these issues are addressed and that data are
adequately protected.
The self-service aspect of cloud computing may also provide benefits.
For example, 20 out of the 24 agencies identified the ability to apply
security controls on demand as a potential benefit. A private sector
representative stated that cloud computing provided the ability for
more flexible and granular control of security. For example, features
such as encryption and monitoring could be individually applied as
needed. Table 2 lists the potential benefits of cloud computing
grouped by cloud computing attribute.
Table 2: Potential Benefits of Cloud Computing:
Attribute: Virtualization and automation;
Potential benefit: Rapid replication of securely configured servers,
security upgrades, and patches.
Attribute: Broad network access;
Potential benefit: Reduced need to carry data in removable media
Ability to shift data needed by public away from internal agency
network.
Attribute: Economies of scale and distributed;
Potential benefit: Low-cost disaster recovery and storage
infrastructure Resistance to denial of service attack.
Attribute: On-demand self-service;
Potential benefit: Apply security controls on demand Individually
apply features such as encryption and monitoring.
Source: GAO analysis of agency and private sector data.
[End of table]
Cloud Computing Can Create Information Security Risks:
In addition to benefits, the use of cloud computing can create
numerous information security risks for federal agencies. Twenty-two
of the 24 agencies reported that they are either concerned or very
concerned about the potential information security risks associated
with cloud computing. These concerns include risks related to being
dependent on a vendor's security assurances and the vendor, and risks
related to the use of multitenancy.
Several cloud computing information security risks relate to the
ability to rely on a vendor's security assurances and practices.
Specifically, several agencies stated concerns about:
* the possibility of ineffective or noncompliant service provider
security controls”which could lead to vulnerabilities affecting the
confidentiality, integrity, and availability of agency information;
* the potential loss of governance and physical control over agency
data and information”that is, in using cloud computing services, the
agency cedes control to the provider for the performance of certain
security controls and practices;
* the insecure or ineffective deletion of agency data by cloud
providers once services have been provided and are complete; and;
* potentially inadequate background security investigations for
service provider employees”which could lead to an increased risk of
wrongful activities by malicious insiders.
Of particular concern is dependency on a vendor. All 24 agencies
specifically noted concern about the possibility of loss of data if a
cloud computing provider terminated its services. For example, the
provider and the customer may not have agreed on terms to transfer or
duplicate the data. The European Network and Information Security
Agency also identified dependency on a vendor as a high risk, noting
the lack of tools, procedures, or standard data formats to ensure
data, application, and service portability. The agency stated that
this can make it difficult for the customer to migrate from one
provider to another or to migrate data and services back to an in-
house IT environment. One member of GAO's Executive Council on
Information Management and Technology[Footnote 16] stated that if an
agency chooses to implement cloud computing, at some point in the
future the vendor may want to raise the cost for use of the cloud. The
agency may then have no alternative to paying the cost because it
lacks the technical ability to bring the service back in-house.
Multitenancy and use of shared resources can also increase risk.
Twenty-three out of the 24 agencies identified multitenancy as a
potential information security risk because one customer could
intentionally or unintentionally gain access to another customer's
data, causing a release of sensitive information.
Additional concerns relate to exchanging authentication information on
users and responding to security incidents. For example, NASA
officials responsible for a cloud computing program stated that
identity management and user authentication are a concern because
customers and a provider may need to establish a means to securely
exchange and rely on authentication and authorization information for
system users. In addition, responding to security incidents may be
more difficult in a shared environment because there could be
confusion over who performs the specific tasks”the customer or the
provider. The Nuclear Regulatory Commission emphasized the importance
of a clear delineation of responsibilities as they relate to incident
response management, whereby the cloud computing service provider has
the responsibility to report the security incident to the agency and
the agency is responsible for reporting the incident to the
appropriate government entity.
Another concern is the increased volume of data transmitted across
agency and public networks. This could lead to an increased risk of
the data being intercepted in transit and then disclosed.
NIST also stated that cloud computing security is dependent on the
security of a user's Internet browser, and that vulnerabilities in the
browser can create vulnerabilities for the cloud computing service.
Although there are numerous potential information security risks
related to cloud computing, these risks vary based on the particular
deployment model. For example, NIST states that private clouds may
have a lower threat exposure than community clouds, which may have a
lower threat exposure than public clouds. Officials from another
agency stated that they are considering implementing a private cloud
behind their agency's firewall because of the moderate-to-high impact
classification of sensitive data they were considering placing into
this system.[Footnote 17] Several agency officials and industry
representatives stated that initial use of public clouds may be
focused on low-impact information. However, several industry
representatives also stated that making general statements based on
cloud deployment models may be misleading and that an agency would
need to examine the specific security controls of the vendor they were
evaluating. Table 3 lists the potential risks of cloud computing.
Table 3: Potential Risks of Cloud Computing:
Risk: Reliance on vendor's security assurances and practices;
Explanation: An agency is dependent on a provider's ability to ensure
effective security. A provider may have security weaknesses such as
ineffective or noncompliant security controls. For example, a provider
may not maintain adequate physical control over agency data and
information or may have inadequate background investigations for
provider employees.
Risk: Dependence on a vendor;
Explanation: If the agency and provider do not agree on a means to
transfer or duplicate data, data may be lost if a provider ends its
service. An agency that uses a cloud computing provider may also lose
the technical ability to bring the information system back in-house.
Risk: Insecure or ineffective identity management;
Explanation: Agencies and a cloud provider may need to securely
exchange and rely on sensitive authentication and authorization
information for system users.
Risk: Unclear responsibilities for incident response;
Explanation: There may be confusion over roles and responsibilities
between agency and provider.
Source: GAO analysis of agency and private sector data.
Federal Agencies Have Begun Efforts to Address Information Security
Issues for Cloud Computing, but Specific Guidance Is Lacking and
Efforts Remain Incomplete:
Federal agencies have started to address information security when
using cloud computing; however, they have not always developed
corresponding guidance. Furthermore, agencies that have implemented
cloud computing efforts have faced challenges in implementing existing
federal information security guidance and identified the need to
streamline and automate the process of implementing this guidance.
While several governmentwide cloud computing security activities are
under way by organizations such as OMB and the General Services
Administration (GSA), significant work remains to be completed. In
addition, NIST has begun certain efforts related to cloud computing
information security, but its existing guidance is not specific to
cloud computing issues, and it has only begun plans to issue cloud-
specific security guidance.
Agencies Have Taken Steps to Address Information Security Issues for
Cloud Computing, but Have Not Always Developed Corresponding Policies
or Procedures and Face Challenges in Implementing Existing Guidance
and Processes:
About half of the 24 agencies we asked reported using some form of
cloud computing for obtaining either infrastructure, platform, or
software services. These agencies identified measures they are taking
or plan to take when using cloud computing. Specifically, 23 of the 24
agencies reported that they currently write or plan to write and
enforce comprehensive service-level agreements to include information
security control requirements and currently use or plan to use
appropriate encryption when using cloud computing. Further, 22 of the
24 agencies responded that they currently limit or plan to limit the
type of information placed in a cloud, while 21 of the 24 agencies
currently limit or are planning to limit the type of cloud deployment
model used. Appendix II includes descriptions of three case studies of
cloud computing implementations in the federal government, including
steps taken to address information security.
However, these actions have not always been accompanied by the
development of related policies or procedures. Of the 23 agencies that
reported writing and enforcing or planning to write and enforce
comprehensive service-level agreements when using cloud computing, 9
agencies have approved and documented policies and procedures for
doing so. Fifteen agencies have documented policies and procedures for
the use of encryption. Just four agencies responded that they have
documented policies and procedures limiting the type of information
placed in a cloud and two agencies responded that they have documented
policies and procedures limiting the type of cloud deployment model
used. The lack of approved and documented policies and procedures to
ensure effective information security when using cloud computing could
place sensitive information in a cloud environment at risk.
Agencies Have Concerns About Ensuring Vendor Implementation of
Information Security Requirements:
Most agencies identified challenges and concerns in implementing
existing information security laws and guidance. For example, 20 of
the 24 agencies identified concerns about service provider compliance
with and implementation of government information security
requirements. Agencies also expressed concerns about limitations on
their ability to conduct independent audits and assessments of
security controls of cloud computing service providers.
Several industry representatives agreed that compliance and oversight
issues are a concern. However, the representatives also stated that
requiring each individual agency that uses a service provider to
conduct its own assessment of controls and audits and complete a
separate assessment and authorization process would be burdensome and
remove the cost advantages offered by cloud computing. In response,
representatives raised the idea of having a single government entity
or other independent entity conduct security oversight and audits for
cloud computing service providers. The process could be similar to the
Statement on Auditing Standards (SAS) 70 audit process often used as
part of financial audits.[Footnote 18] A SAS 70 report is issued by an
independent auditor for a service provider that processes financial
data on behalf of others; it discusses the effectiveness of the
service provider's internal controls over the processing of
transactions that may be relevant to the financial reporting of
customers. Management of the customer organization and its auditor may
use this report to assess the internal control policies and procedures
at the service provider as part of the overall evaluation of the
internal control at the customer organization. Some cloud computing
service providers have obtained a SAS 70 audit for use and review by
its customers. In discussing the use of SAS 70 reports to meet
information security requirements, OMB Memorandum M-09-29[Footnote 19]
states that it is the agency's responsibility to ensure that:
* the scope of the SAS 70 audit is sufficient and fully addresses the
specific contractor system requiring FISMA review, and
* the audit encompasses all controls and requirements of law, OMB
policy, and NIST guidance.
There are attestation standards, similar to those in SAS 70, that
could be used to provide an assessment of controls at a service
provider that relates to the effective implementation of security and
compliance with specified requirements of laws and guidance. However,
the scope of an audit based on a standard such as SAS 70 is defined by
the service provider and could exclude key controls essential to
effectively protecting agency information. Therefore, if an
attestation report on security effectiveness and compliance with laws
and guidance is used, it is critical that the scope of the controls
addressed by the attestation report is sufficient to meet agency
requirements.
Agencies also stated that having a cloud service provider that had
been precertified as being in compliance with government information
security requirements through some type of governmentwide approval
process would make it easier for them to consider using cloud
computing. For example, DOT officials implementing the Car Allowance
Rebate System program stated that having a cloud service provider that
was precertified to process federal financial transactions may have
made implementation of the payment processing system for the program
easier. Until such precertified providers are in place, the adoption
of cloud computing may be limited.
Processes, Documentation, and Division of Roles and Responsibilities
for Cloud Computing Create Challenges:
In their efforts to ensure information security in cloud computing,
agencies have had to re-examine and, at times, change related
processes, documentation, and roles and responsibilities. For example,
DOD officials implementing a cloud computing program identified the
need to improve related DOD business processes, including those
related to security. The existing DOD process required for risk
assessment and assessment and authorization for information systems
created challenges because of its focus on stand-alone systems and
multiple levels of organizational review. In response, the program
office worked with a contractor to re-engineer the process and reduce
the time needed to complete information security requirements for new
systems. NASA officials also noted the increased complexity of
information security-related document maintenance in a shared owner
environment and took steps to address this issue.
Other agency concerns related to the division of information security
responsibilities between customer and vendor. For example, both DOD
and NASA officials responsible for cloud computing implementations at
their agencies stated that a clear division of security roles and
responsibilities in cloud computing was important. For example, NASA
officials divided responsibility for the security controls in NIST SP
800-53 Revision 3 for low-impact systems into customer and provider
controls and found that the customer had primary responsibility for 47
of the 112 total controls. Similarly, DOD officials also divided
responsibilities for the corresponding DOD information assurance
controls between customers and service providers. Both sets of agency
officials commented on the challenges in analyzing and maintaining
such a division of responsibilities but noted that clear assignment of
responsibilities was important for effective information security.
Several Governmentwide Cloud Computing Information Security
Initiatives Have Been Started, but Key Guidance and Efforts Have Not
Been Completed:
To address cloud computing security issues, the executive branch has
begun several initiatives. However, these initiatives have not yet
been completed. For example, OMB stated that it began a federal cloud
computing initiative in February 2009; however, it does not yet have
an overarching strategy or an implementation plan. According to OMB
officials, the initiative includes an online cloud computing
storefront managed by GSA and will likely contain three pilot cloud
computing projects, each with a lead agency: (1) a voucher payment
portal led by the Department of the Treasury; (2) a tool for citizen
interaction to support open government led by GSA; and (3) a citizen
services dashboard led by GSA. However, as of March 2010, a date had
not been set for the release of the strategy or for any of the pilots.
In addition, OMB has not yet defined how information security issues,
such as a shared assessment and authorization process, will be
addressed in this strategy.
Federal agencies have stated that additional guidance on cloud
computing security would be helpful. Addressing information security
issues as part of this strategy would provide additional direction to
agencies looking to use cloud computing services. Until this strategy
has been completed, agencies will lack clear direction in how to
ensure information security while implementing cloud computing
services.
GSA Has Established Program Office and Cloud Computing Storefront, but
Key Procurement Has Been Delayed in Part Due to Information Security
Concerns:
GSA has established a Cloud Computing Program Management Office that
manages several cloud computing activities within GSA and provides
administrative support for cloud computing efforts by the federal
Chief Information Officers (CIO) Council. Specifically, the program
office manages a storefront, www.apps.gov, established by GSA to
provide a central location for federal agencies to purchase several
software as a service cloud computing applications, including:
* business applications, such as data analysis, human resources, and
financial management software, and tools for tracking and monitoring
various types of activities;
* office productivity applications, which include standard word
processing and spreadsheet applications, and also applications used
for brainstorming, collaboration, document management, and project
management; and;
* social media applications that are focused on making it easier to
create and distribute content and that enable people to communicate
easily and share information.
GSA plans to expand the storefront by also providing infrastructure as
a service cloud computing offerings such as storage, virtual machines,
and Web hosting. To this end, GSA began a procurement process by
issuing a request for quotations in July 2009. The request asked for
quotations to provide the government with required documentation on
vendors' offerings of cloud storage services, virtual machines, or
cloud Web hosting. These services would be available through the
www.apps.gov storefront. The procurement closed in September 2009,
with nine vendors submitting quotations.
However, addressing information security issues has been a significant
challenge in the procurement. GSA officials stated that as they were
analyzing the submitted quotations, one issue they were attempting to
resolve was establishing a process for federal agencies to work with
GSA to complete the information security assessment and authorization
process when using these services. In early March 2010, GSA canceled
the request and announced plans to begin a new request process, in
part due to concerns and challenges in addressing information
security. Specifically, the new request will ask for services that
meet the level of security for both low- and moderate-impact systems
as defined in PIPS 199 and NIST SP 800-53. The canceled request
required only low-level security. GSA stated that providing cloud
computing services that meet both low-and moderate-impact information
security controls would allow a broader range of services and
customers. GSA officials also stated that they need to work with
vendors after a new procurement has been completed to develop a shared
assessment and authorization process, but have not yet developed
specific plans to do so.
Adding moderate-impact controls to the request may increase demand for
the infrastructure services when the procurement is completed;
however, establishing both an assessment and authorization process for
customers of these services and a clear division of security
responsibilities will help ensure that these services, when purchased
and effectively implemented, protect sensitive federal information.
Federal CIO Council Has Established Cloud Computing Executive Steering
Committee but Has Not Finalized Key Process or Guidance:
The CIO Council established the Cloud Computing Executive Steering
Committee to promote the use of cloud computing in the federal
government. The GSA Cloud Computing Program Management Office provides
technical and administrative support for the committee. The committee
consists of an overall advisory council and these four subgroups:
* The communications subgroup provides information on the status of
cloud computing in the federal government and is planning an
information portal for the www.apps.gov storefront.
* The operational excellence subgroup examines cloud computing
implementations at federal agencies, assists agencies in evaluating
potential applications for cloud computing, and identifies possible
improvements to the storefront.
* The standards subgroup is helping develop standards related to
interoperability and portability of cloud computing services.
* The security subgroup is addressing several issues related to
information security and cloud computing.
The security subgroup has begun developing recommendations for a
streamlined assessment and authorization process through the Federal
Risk and Authorization Management Program. This process would address
authorizing operation of a system, including the development and
implementation of risk assessments and security controls. For example,
according to GSA, the program is to provide joint authorizations and
continuous monitoring services for all federal agencies with an
initial focus on cloud computing. The process would rely on several
key steps of the process being performed by a governmentwide
organization, while the final authorization to operate a system would
still be made by a designated official at the agency purchasing the
service. According to a summary provided by GSA, the goals for this
process include providing better security and privacy, clearer
communication of security requirements for government and industry,
improved efficiency and broad acceptance for agencies, and compliance
with existing federal information security guidance and legislation.
Officials involved in the process have noted the need to clearly
delineate security control responsibilities between providers and
customers. The group is currently working with its members to define
interagency security requirements for cloud systems and services and
related information security controls from both the moderate and low
baselines specified in NIST SP 800-53 Revision 3.
According to GSA, a draft of the new assessment and authorization
process has been approved by the Cloud Computing Executive Steering
Committee. However, a deadline for completing development and
implementation of this process had not been established. A particular
concern of the committee is the requirement for agency CIOs to certify
the adequacy of information security controls for systems that they do
not own or operate. GSA officials involved in this effort stated that
it may be up to OMB to clearly establish that agencies will be able to
rely on the shared process.
In addition to the Executive Steering Committee and its subgroups,
another component of the CIO Council is working on information
security issues related to cloud computing. The group, which is part
of the CIO Council's Information Security and Identity Management
Committee, is currently developing a white paper on guidelines for the
secure use of cloud computing for federal departments and agencies,
according to a co-chair of this group. The paper is intended to
provide agencies with guidelines, use cases, and scenarios to help
program managers make risk-based decisions when selecting cloud
deployment and service models.
Federal agencies responding to our information request, officials of
the cloud computing case studies described in appendix II, and private
sector representatives have all identified concerns with how to
properly and efficiently complete activities related to the assessment
and authorization process, including control selection and testing,
when using cloud computing. Until a clear, comprehensive, and
efficient process has been established, adoption of cloud computing in
the federal government may be limited, and cloud computing programs
that are implemented may not have appropriate information security
controls in place.
NIST Is Coordinating Activities with CIO Council but Has Not
Established Cloud-Specific Guidance:
NIST is responsible for establishing information security guidance for
federal agencies to support FISMA. Cloud computing is an emerging
model for IT, and NIST has not yet established guidance specific to
cloud computing. However, according to its officials, the institute
has begun several other activities related to cloud computing. For
example, it has developed a definition of cloud computing and is
participating in the activities of the CIO Council subgroups.
The NIST official leading the institute's cloud computing activities
stated that existing NIST requirements apply to cloud computing and
can be tailored to the information security issues specific to cloud
computing. However, as previously discussed in this report, both
federal and private sector officials have made clear that existing
guidance is not sufficient. At the conclusion of our review, NIST
officials stated that the institute is planning to issue guidance on
cloud computing and virtualization but had not yet finalized the
topics that it would cover and had not determined a date for issuing
this guidance.
Our analysis also indicates areas where existing NIST guidance does
not clearly address information security issues specifically related
to cloud computing. While NIST SP 800-53 covers general security areas
important to cloud computing to some extent, the guidance lacks
specificity in key security areas. For example, NIST guidance does not
directly address key cloud computing security issues such as
portability and interoperability, data center operations, and
virtualization. Both public and private sector officials identified
interoperability issues and concerns about virtualization as
challenges agencies face when making decisions on whether to implement
cloud computing. At the end of our review, NIST officials stated that
SP 800-53 was not intended to be specific to a particular type of
computing, such as cloud computing, but agreed that areas such as
portability and interoperability were important in implementing cloud
computing and they were considering including them in future NIST
publications.
Furthermore, federal agencies stated that establishing a clear
delineation of security control responsibilities between providers and
customers is a challenge, but existing NIST guidance does not fully
address these issues or establish a process for doing so Existing NIST
guidance addresses the establishment of interconnection security
agreements between different organizations; however, the guidance is
not specific to issues related to cloud computing. For example, NIST
guidance does not address the division of information security
responsibilities when several organizations are involved in cloud
computing or possible variations in these roles and responsibilities
due to the use of different cloud deployment and service models. Until
federal guidance addresses information security issues specific to
cloud computing and provides information on how to divide
responsibilities between providers and customers, agencies may not be
able to effectively ensure the security of their systems when using
cloud computing.
Conclusions:
About half of the 24 agencies are using various models of cloud
computing, and many others are interested in using it; however,
implementation of this emerging technology presents both information
security benefits and risks. Agencies have taken steps to address
cloud computing security but have not always developed corresponding
guidance. The use of attestation standards and precertification of
cloud service providers may provide a way for agencies to ensure
information security when using cloud computing service providers.
However, OMB has not yet developed a strategy that addresses the
information security issues related to cloud computing, and guidance
from individual agencies and NIST to ensure information security is
insufficient. While the federal CIO Council is developing a shared
assessment and authorization process, which could help foster adoption
of cloud computing, this process remains incomplete, and GSA has yet
to complete its procurement of cloud computing infrastructure as a
service offerings for its storefront, in part due to security
concerns. Until federal guidance and processes that specifically
address information security for cloud computing are developed,
agencies may be hesitant to implement cloud computing, and those
programs that have been implemented may not have effective information
security controls in place.
Recommendations for Executive Action:
To assist federal agencies in identifying uses for cloud computing and
information security measures to use in implementing cloud computing,
we recommend that the Director of OMB take the following three actions:
* Establish milestones for completing a strategy for implementing the
federal cloud computing initiative.
* Ensure the strategy addresses the information security challenges
associated with cloud computing, such as needed agency-specific
guidance, the appropriate use of attestation standards for control
assessments of cloud computing service providers, division of
information security responsibilities between customer and provider,
the shared assessment and authorization process, and the possibility
for precertification of cloud computing service providers.
* Direct the CIO Council Cloud Computing Executive Steering Committee
to develop a plan, including milestones, for completing a
governmentwide security assessment and authorization process for cloud
services.
To assist federal agencies in selecting and acquiring precertified
cloud computing products and services, we recommend that the
Administrator of GSA, as part of the procurement for infrastructure as
a service cloud computing technologies, ensure that full consideration
is given to the information security challenges of cloud computing,
including a need for a shared assessment and authorization process.
To assist federal agencies in implementing appropriate information
security controls when using cloud computing, we recommend that the
Secretary of Commerce direct the Administrator of NIST to issue cloud
computing information security guidance to federal agencies to more
fully address key cloud computing domain areas that are lacking in SP
800-53, such as virtualization, data center operations, and
portability and interoperability, and include a process for defining
roles and responsibilities of cloud computing service providers and
customers.
Agency Comments and Our Evaluation:
In providing comments on a draft of this report, OMB, GSA, and the
Department of Commerce, stated that they generally concurred with the
contents and recommendations of the report. The agencies' comments and
our responses are summarized below:
* In written comments on a draft of this report, the Federal Chief
Information Officer stated that OMB agreed with our recommendations.
He described efforts under way for developing a cloud computing
strategy, stating that OMB intends to develop such a strategy over the
next 6 months. In addition, he stated that OMB agrees that the
strategy must address the security challenges associated with
implementing cloud computing and has established a group to study,
propose, and implement a solution for governmentwide assessment and
authorization. The Office of Management and Budget's comments are
reprinted in appendix BT.
* In written comments on a draft of this report, the Administrator of
GSA stated that GSA agreed in part with our findings and
recommendation to complete the procurement for infrastructure as a
service cloud computing technologies and ensure that it includes full
consideration of the information security challenges of cloud
computing. The Administrator stated that GSA will reissue the
procurement request in May 2010. She also provided additional
information on the Federal Risk and Authorization Management Program,
which we have incorporated in the report as appropriate. In subsequent
discussions with GSA, we revised our recommendation to clarify its
intent, and agency officials stated that GSA had reissued the request
on May 12, 2010, and fully agreed with our recommendation. GSA's
comments are reprinted in appendix IV.
* In written comments on a draft of this report, the Secretary of
Commerce concurred with our recommendation. He noted that NIST expects
to release a virtualization document for public comment in June 2010
and release a cloud computing document for public comment in September
2010. In addition, the Secretary provided technical comments which we
incorporated in the draft as appropriate. Comments from the Department
of Commerce are reprinted in appendix V.
We provided a draft of this report to the other 22 major federal
agencies to which we did not make recommendations and received
technical comments from 4 agencies. We have incorporated these
comments in the report as appropriate.
As agreed with your offices, unless you publicly announce the contents
of this report earlier, we plan no further distribution until 30 days
from the report date. At that time, we will send copies to interested
congressional committees, the Director of OMB, the Secretary of
Commerce, and the Administrator of GSA. In addition, this report will
be available at no charge on the GAO Web site at [hyperlink,
http://www.gao.gov].
If you or your staffs have any questions about this report, please
contact me at (202) 512-6244 or at wilshuseng@gao.gov. Contact points
for our Offices of Congressional Relations and Public Affairs may be
found on the last page of this report. Key contributors to this report
are listed in appendix VI.
Signed by:
Gregory C. Wilshusen:
Director, Information Security Issues:
List of Congressional Requesters:
The Honorable Joseph I. Lieberman:
Chairman:
The Honorable Susan M. Collins:
Ranking Member:
Committee on Homeland Security and Governmental Affairs:
United States Senate:
The Honorable Tom R. Carper:
Chairman:
Subcommittee on Federal Financial Management, Government Information,
Federal Services, and International Security:
Committee on Homeland Security and Governmental Affairs:
United States Senate:
The Honorable Diane E. Watson:
Chairwoman:
Subcommittee on Government Management, Organization, and Procurement:
Committee on Oversight and Government Reform:
House of Representatives:
[End of section]
Appendix I: Objectives, Scope, and Methodology:
The objectives of our review were to (1) identify the models of cloud
computing; (2) identify the information security implications of using
cloud computing services in the federal government; and (3) assess
federal guidance and efforts to address information security when
using cloud computing.
To identify cloud computing models, we reviewed publications, white
papers, and other documentation from public and private sector
organizations. We then obtained relevant information through
interviews with officials from the National Institute of Standards and
Technology (NIST) and private sector organizations that offer cloud
computing services. We compared cloud computing descriptions and
definitions of cloud computing from these sources to identify
similarities and differences.
To identify the information security implications of using cloud
computing services in the federal government, we reviewed
documentation from the public and private sectors. Our documentation
review focused on identifying the positive and negative information
security implications (risks and benefits) of cloud computing. We
supplemented this review by interviewing representatives of public and
private sector organizations to prioritize these implications and
identify information security challenges associated with federal
agencies working with cloud computing service providers. We
interviewed representatives of several of the 24 major federal
agencies[Footnote 20] and private sector organizations that provide
cloud computing services. In addition, we issued a survey and data
request to the 24 federal agencies. We pretested the survey at three
agencies to ensure that the questions were relevant and easy to
comprehend. For each agency surveyed, we identified the appropriate
point of contact, notified each one of our work, and distributed the
survey along with a data request to each via e-mail in November 2009.
All 24 agencies responded to our survey and data request from December
2009 to February 2010; results are reported as of this date. We
contacted agency officials when necessary for additional information
or clarification of agency responses. We did not verify the accuracy
of the agencies' responses; however, we reviewed supporting
documentation that agencies provided to corroborate information
provided in their responses. We then analyzed the results of the
survey and data request responses to identify:
* the potential information security implications agencies might
consider positive or negative for cloud computing;
* the techniques agencies are using to ensure that effective
information security measures are being implemented when using cloud
computing;
* the extent to which the agency has procured or plans to procure
cloud computing products or services using www.apps.gov; and;
* the concerns agencies faced when working with cloud computing
providers.
Conducting any survey may introduce errors. For example, differences
in how a particular question is interpreted, the sources of
information that are available to respondents, or how the data are
entered or were analyzed can introduce variability into the survey
results. We took steps in the development of the survey instrument,
the data collection, and the data analysis to minimize errors.
To assess federal guidance and efforts to address information security
when using cloud computing, we gathered and analyzed information at
federal entities with specific governmentwide responsibilities,
including the Office of Management and Budget (OMB), General Services
Administration (GSA), NIST, and the federal Chief Information Officers
Council. We further reviewed federal information security guidance to
determine the extent to which the guidance addressed concerns
specifically related to cloud computing and relevant information
security areas. For example, we compared NIST Special Publication 800-
53 Revision 3 to key cloud computing security areas specified by other
IT security organizations such as the Cloud Security Alliance and
European Network and Information Security Agency. We also conducted
case studies on three federal cloud computing programs, the Department
of Defense's (DOD) Rapid Access Computing Environment (RACE) program,
the National Aeronautics and Space Administration's (NASA) Nebula
program, and the Department of Transportation's (DOT) Car Allowance
Rebate System (CARS) program. We selected these agency case studies
based on cloud computing experts' and agency officials' referrals, and
any references in the documentation we reviewed. We also relied on the
survey of the 24 major federal agencies to identify the techniques
federal agencies stated they used to ensure that effective information
security measures are in place when they use cloud computing.
We conducted this performance audit from September 2009 through May
2010 in accordance with generally accepted government auditing
standards. Those standards require that we plan and perform the audit
to obtain sufficient, appropriate evidence to provide a reasonable
basis for our findings and conclusions based on our audit objectives.
We believe that the evidence obtained provides a reasonable basis for
our findings and conclusions based on our audit objectives.
[End of section]
Appendix II: Cloud Computing Case Studies:
The following is a description of three federal cloud computing
programs: the DOD's RACE program; NASA's Nebula program; and
Department of Transportation's CARS program, including lessons learned
related to information security.
DOD's RACE Program Provides Platforms for DOD Systems Development
Efforts:
The RACE program was started by DOD's Defense Information Systems
Agency in October 2008 to provide platform as a service to support DOD
systems development efforts. The goal of the program is to provide the
service through a streamlined process including system provisioning,
development, testing, assessment and authorization, and deployment of
applications to DOD customers within a private cloud. RACE customers
purchase one or many virtual machines[Footnote 21] through a self-
service portal. The RACE program is managed by both government and
contractor personnel within existing DOD data centers and operates
only on DOD's internal network.
According to program officials, users can acquire server capacity
rapidly for short- or long-term use without the need for approval for
a capital acquisition expense. Initial provisioning in RACE takes a
few days, while traditional purchasing can take a month or longer.
RACE currently has about 120 virtual machines in use. Program
officials state that they hope to expand RACE to the classified
environment in the future. Currently, DOD uses three information
system impact levels,[Footnote 22] which are equivalent to low,
moderate, and high, as defined by NIST. RACE is currently certified to
operate at the moderate-impact level, although the current use is for
data at the lowest impact level.
Information Security Controls and Lessons Learned:
DOD officials emphasized the need for a clear division of
responsibilities among its customers and cloud service providers when
implementing cloud computing. For RACE, potential customers must agree
to meet minimum information security requirements before becoming
customers of the RACE program, including resolving any open
vulnerabilities or documenting them in a plan of action and
milestones. The program also has documentation that divides
information security control responsibilities between controls managed
by the RACE program and controls managed by the customer. Using a
matrix containing the appropriate DOD information assurance controls,
RACE officials determined that out of 106 controls, 62 were the
responsibility of the customer, 31 of the service provider, and 13
were not applicable. Of the 106 controls, 37 were classified as
inheritable controls, meaning the customer application inherits
several predefined information assurance controls from RACE.
During the initial stages of RACE implementation, program officials
recognized the need to improve related DOD business processes,
including those related to security. The existing DOD process required
for risk assessment and assessment and authorization for information
systems created challenges because of its focus on stand-alone systems
and multiple levels of organizational review. In response, the program
office worked with a contractor to re-engineer the process to complete
information security requirements for new systems. Program officials
estimate that the total time required to complete the assessment and
authorization process will be reduced from 80 days to 40 days for RACE
customers, but the process is too new to be verified. A subsequent
release is planned to further reduce this time to 7 days. The
officials stated that overall implementation of the RACE program and
other cloud efforts would have been faster if guidance and processes
related to assessment and authorization for cloud computing had
already been in place.
NASA‘s Nebula Pilot Uses Open-Source Technologies to Enhance
Collaboration:
Nebula is a cloud computing pilot under development at NASA's Ames
Research Center in Mountain View, California. It is an infrastructure
as a service implementation for scientific data and Web-based
applications. Platform as a service capability is planned for the
future. According to NASA, Nebula is to provide high-capacity
computing, storage, and network connectivity using a virtualized,
scalable approach to achieve cost and energy savings. Currently,
NASA's Nebula is considered a private cloud and is operated at Ames
Research Center on NASA equipment using both government and contractor
personnel. Nebula is housed in a standard shipping container that is
mounted in place, but could be transported if needed (see fig. 4).
Program officials chose this design as a means to easily replicate the
Nebula equipment as the program expands. The officials state that a
future goal is for Nebula to become a hybrid cloud as a way to
eventually foster collaboration in analysis of NASA-sponsored research
with the academic community and the public. As a result, Nebula relies
on open-source cloud computing technologies so that data can be easily
transferred to other cloud service providers if required.
The officials stated that when NASA data is first generated, its
sensitivity must be evaluated to see if it is appropriate for public
release. Once the decision has been made to share the data, the use of
Nebula makes sharing information easier. The officials also stated
that Nebula will provide other benefits. For example, according to
NASA, researchers who use Nebula will not have to purchase their own
servers, hardware, and computing infrastructure, which can be time-
consuming. Nebula is currently authorized to handle only low-impact
data as defined in FIPS 199; however, officials noted that they may
migrate to a moderate-impact system in the future. Currently, Nebula's
customers include the World Wide Telescope from Ames Research Center
and the Climate Grid led by NASA's Goddard Space Flight Center.
Figure 4: NASA Nebula Container:
[Refer to PDF for image: photograph]
Source: NASA.
[End of figure]
Information Security Controls and Lessons Learned:
NASA officials said that a major challenge in their implementation of
Nebula was determining how to apply federal information security
policies and guidance because current federal guidance does not
clearly address specific controls for a cloud computing environment
like Nebula. Examples included how to track, schedule, and report
compliance with the Federal Information Security Management Act of
2002 when customers are responsible for some controls and the provider
is responsible for others, and how to address security and service-
level agreements. Nebula officials noted challenges in determining
responsibilities and identifying the necessary documentation for
interconnection security agreements[Footnote 23] between customers and
third-party systems used by the customers.
Additionally, officials noted the need to clearly define the
information security controls for which the cloud provider is
responsible and those for which the customer is responsible. For
example, effective incident response in a cloud environment requires
delineation of customer and provider responsibilities, which is
information that is not currently addressed in federal guidance. NASA
Nebula officials noted that the exact number of controls for which the
customer is responsible varies depending on the cloud computing
service model. In Nebula's current infrastructure as a service
offering, the customer is responsible for 47 of the 112 total controls
in NIST SP 800-53 Revision 3 for low-impact systems. They noted
further that many of the responsibilities under the customer controls
are actually shared between the customer and Nebula, as the service
provider, because the provider will still have responsibility for the
parts of the infrastructure under the provider's control.
DOT‘s CARS Program Made Partial Use of Cloud Computing, but Was
Limited by Security Concerns:
The CARS program used a public cloud for part of its system. CARS was
administered by DOT under the authority of the Consumer Assistance to
Recycle and Save Act of 2009. The program allowed owners of certain
less fuel-efficient vehicles to receive a credit for trading in a
vehicle and purchasing or leasing a new, more fuel-efficient vehicle.
Dealers were reimbursed for this credit by the government. According
to program officials, the program faced a number of challenges,
including having only about 1 month to develop and deploy the system
and an unexpectedly high demand for the program; users of the program
tripled in number within 12 days of the start of the program.
The program, which operated from July 24 to August 24, 2009, had two
major information technology components: a publicly accessible Web
site with content for consumers, dealers, and salvage facilities, and
a payment processing system used by dealers to submit applications to
the program. The Web site was considered a low-impact system under
FIPS 199, but the payment processing system, which contained personal
information, was considered a moderate-impact system.
The public Web site used a cloud computing service provider that
hosted the Web site and provided additional surge capabilities to cope
with spikes in demand for Web content. Effective communication through
the Web site was vital to implementation of the CARS program.
According to department officials, because of the use of a cloud
service provider, the CARS Web site was not affected by the July 4,
2009, cyber attacks.[Footnote 24] Also, using the cloud service
provider for Web content allowed the CARS program information to be
accessible while protecting DOT's primary Web site from being
overwhelmed and potentially disabled by the high demand for
information about the program. The department's agreement with the
cloud service provider allowed it to quickly and easily increase
capacity as needed.
In contrast, the payment-processing system used a more traditional
database and financial management system containing commercial off-the-
shelf software and, according to DOT officials, was not able to cope
with increases in demand for the program. Although the payment
processing system was originally designed to process up to 250,000
transactions over 4 months, the system actually processed
approximately 690,000 transactions in about 1 month. Partly as a
result of the overwhelming interest in the program, the department
encountered several technical issues and capacity-related deficiencies
with the payment system. Specifically, the system had numerous outages
and periods of slow operation, causing frustration among dealers and
disrupting the department's ability to review submissions. Since the
payment processing system did not use cloud computing, expanding the
system's capacity was more challenging.
Information Security Controls and Lessons Learned:
Officials said they briefly considered use of a cloud computing model
for the payment processing system, but were reluctant to do so because
of programmatic constraints to using applications already in use by
the department. They also were concerned about processing personal
information in a cloud environment without the environment having been
precertified to handle the information. The officials acknowledged
that many characteristics of the CARS program would have made the
payment processing system a good candidate for cloud computing. These
included the program's limited time available for deployment, short
duration, and need to cope with sudden peaks in demand. However, the
need to interface with existing department computing infrastructure,
including using expertise from the existing vendor and the lack of an
already developed and deployed cloud that had been certified to handle
personal information made them hesitant to use a cloud computing
solution and led them to instead use a more traditional application.
As it was, the short time available to deploy the system made
completion of information security processes, such as authorization
and accreditation, a challenge.
A program official added that successful implementation of cloud
computing in the federal government will be dependent on several
information security-related factors, including the ability to ensure
continuous monitoring of security controls and the ability to
independently verify the security of cloud computing providers.
[End of section]
Appendix III: Comments from the Office of Management and Budget:
Executive Office Of The President:
Office Of Management And Budget:
Washington, D.C. 20503:
Gregory Wilshusen:
Director:
The Government Accountability Office:
441 G Street, Northwest:
Washington, D.C. 20548:
Dear Mr. Wilshusen:
Thank you for the opportunity to comment on your draft report,
"Information Security: Federal Guidance Needed to Address Control
Issues with Implementing Cloud Computing" (GAO-10-153).
As an initial matter, OMB appreciates GAO's focus on this important
issue, and we agree with GAO on the need for an overarching Federal
cloud computing strategy with milestones. However, cloud computing is
in its early stages. OMB has been deliberate in making sure a unified
cloud strategy does not thwart innovation by prematurely hardwiring
and institutionalizing cloud technologies, standards and security
requirements. Accordingly, OMB, Federal agencies and private industry
are partnering together to observe, test and deploy best practices as
the cloud sector matures. OMB feels it would be appropriate to
develop, over the next six months, a Federal cloud strategy that
covers a planning horizon of five to 10 years and is based on lessons
learned in the near term. Additionally, the strategy and related
milestones may need to evolve over time, as cloud computing
technologies establish market strongholds.
As noted above, we agree that the strategy must address the security
challenges associated with implementing cloud computing. For this
reason the National. Institute of Standards and Technology (NIST), at
the direction of the Federal CIO, is convening a cloud summit on May
201", 2010. The Summit, which will feature a broad array of speakers
from government, industry and academia, will broaden the dialogue on
key cloud issues, including data interoperability, portability and
security standards. Outputs from the Summit will be used to guide the
development of appropriate security controls and inform a future
Federal cloud computing strategic plan.
OMB is committed to the Federal government developing and implementing
secure cloud environments, and we are actively working to make this a
reality. To that end, the Federal CIO has established the Cloud
Computer Security Workgroup (led by NIST) to study, propose and
implement a solution for government-wide security assessment and
authorization. This Workgroup has already established a process for
government-wide assessments and authorizations.
Moreover, agency-specific guidance must address standards and the
appropriate division of roles and responsibilities. The Federal CIO
has also activated a standards workgroup, and OMB is working with NISI
to propose and implement standards for implementing cloud computing
environments in support of government programs and activities.
Agencies recognize the need for agency-specific guidance in this area,
and they are collaborating with OMB to align our cloud computing
initiatives with agency business needs.
Thank you again for the opportunity to comment on the draft report and
to discuss our work on the development and implementation of a secure
cloud computing environment.
Sincerely,
Signed by:
Vivek Kundra:
Federal Chief Information Officer:
[End of section]
Appendix IV: Comments from the General Services Administration:
U.S. General Services Administration:
GSA Administrator:
1800 F Street, NW:
Washington, DC 20405-0002:
Telephone: (202) 501-0800:
Fax: (202) 219-1243:
[hyperlink, http://www.gsa.gov]
May 7, 2010:
The Honorable Gene L. Dodaro:
Acting Comptroller General of the United States:
U.S. Government Accountability Office:
Washington, DC 20548:
Dear Mr. Dodaro:
The U.S. General Services Administration (GSA) appreciates the
opportunity to review and comment on the draft report entitled
"Federal Guidance needed to Address Control Issues with Implementing
Cloud Computing" (GA0-10-513).
We agree in part to the findings and recommendations. Substantive
comments to the findings and recommendations are provided below:
1. The report recommends that "the CIO Council Cloud Computing
Executive Steering Committee develop a plan, including milestones, for
completing a government wide security assessment and authorization
process for cloud services.
The Security Working Group has developed the Federal Risk and
Authorization Management Program (FedRAMP) that addresses this
recommendation. The Security Working Group, as part of GSA's Cloud
Computing Program with members from over 15 agencies, is led by the
National Institute of Standards and Technology (NIST). FedRAMP is a
government-wide program to provide joint authorizations and continuous
security monitoring services for all Federal agencies with an initial
focus on cloud computing. It is a major element in the strategy to
facilitate the use of cloud computing by the Federal Government.
FedRAMP is a central office that performs certification and
authentications, recommends authority to operate, and supports
continuous monitoring of systems in compliance with Federal laws and
regulations. Agencies can leverage the Certification and Authorization
(C&A) and Authority to Operate (ATO) without having to repeat the
process for each system. We expect that FedRAMP will be operational in
May 2010.
As detailed in the GAO Report, agencies have expressed the following
concerns: (a) depending on vendors ability to provide and maintain
adequate security controls; (b) implementing and maintaining adequate
security controls and monitoring; and (c) meeting the requirements of
Federal information security requirements and guidance. Each agency is
responsible to independently select appropriate security controls,
implement and assess security, develop appropriate plans of action,
and conduct ongoing security monitoring.
As background, FedRAMP is a unified government-wide risk management
for enterprise level IT systems. It enables agencies to leverage
authorizations with:
* Unified interagency C&A process;
* Consistent application of Federal security requirements;
* Consolidated risk management; and;
* Increased effectiveness and management cost savings.
FedRAMP has three components:
* Security Requirement Authorities to create governmentwide baseline
security requirements that are interagency developed and approved;
* FedRAMP Office to coordinate authorization packages, manage
authorized system list, and provide continuous monitoring oversight;
and;
* Joint Authorization Board to perform authorizations and on-going
risk determinations that can be leveraged government-wide. Members of
the Board are GSA, DoD, DHS and the sponsoring agency for the system
to be authorized.
Figure 1 presents a concept of operations and high level workflow for
FedRAMP.
Figure 1: FedRAMP Workflow:
[Refer to PDF for image: illustration]
1) Agency X acquires the ZipCloud service from ZipCorp.
2) Agency X offloads risk management work to FedRAMP.
3) FedRAMP accepts the work, reducing duplicative efforts by multiple
agencies.
4) ZipCorp performs risk management work once with FedRAMP for
ZipCloud.
5) Agencies perform agency specific security work as needed.
[End of figure]
FedRAMP will create a unified risk management process that:
* increases security through focus assessments;
* eliminates duplication of effort and associated cost savings;
* enables rapid acquisition by leveraging pre-authorized solutions;
* provides agency vetted transparent security requirements and
authorization packages;
* facilitates multi-agency use of shared systems; and;
* ensures integration with governmentwide security efforts.
FedRAMP allows agencies to leverage authorizations which reduces
agency effort for authorizations and monitoring. With FedRAMP agencies
will only have to review security details, leverage the existing
authorization, and secure agency usage of system. This will greatly
reduce cost, enable rapid acquisition, and reduce effort (diagrams
that illustrate FedRAMP processes are enclosed).
Currently, it is anticipated that FedRAMP will be operational in May
2010.
2. The GAO report recommends that the Administrator of GSA complete
the procurement for pre-certified infrastructure as a service cloud
computing technologies at the low and moderate impact levels and
ensure that it includes full considerations of the information
security challenges of cloud computing, including a need for a shared
assessment and authorization process."
GSA will reissue the Request for Quote for Infrastructure as a Service
(IaaS) in May 2010. The RFQ will result in a multi-award blanket
purchase agreement (BPA) for IaaS providers. Awardees of this BPA will
be included in FedRAMP. FedRAMP is a government-wide program to
provide joint authorizations and continuous security monitoring
services for all Federal agencies with an initial focus on cloud
computing. Upon successful completion of the FedRAMP process and
approval by the Joint Approval Board, the IaaS services will be
granted an Authority to Operate (ATO) at the moderate impact level as
defined by the Federal Information Security Management Act. An ATO at
the moderate level includes approval of operation at low impact level.
Before reissuing the RFQ, GSA is working to improve the statement of
work and to clarify the bidding instructions. As a result, the RFQ
will better reflect customer requirements and vendors will be able to
more accurately bid their services against requirements.
If you have any additional questions or concerns, please do not
hesitate to contact me. Staff inquiries may be directed to Ms. Katie
Lewin, Director, Cloud Computing Program, Office of Citizen Services
and Communications. She can be reached at (202) 219-0394.
Sincerely,
Signed by:
Martha Johnson:
Administrator:
Enclosure:
cc: Gregory C. Wilshusen:
[End of section]
Appendix V: Comments from the Department of Commerce:
United States Department Of Commerce:
The Secretary of Commerce:
Washington, D.C. 20230:
May 4, 2010:
Mr. Gregory C. Wilshusen:
Director, Information Security Issues:
United States Government Accountability Office:
Washington, DC 20548:
Dear Mr. Wilshusen:
Thank you for the opportunity to comment on the draft report from the
Government Accountability Office (GAO) entitled "Information Security:
Federal Guidance Needed to Address Control Issues with Implementing
Cloud Computing" (GA0-10-513).
We concur with the report's conclusions that Federal agencies should
take several steps to address cloud computing security, including
completing the strategy, considering security in a planned procurement
of cloud computing services, and issuing guidance related to cloud
computing security. The Department of Commerce offers the following
comments regarding the GAO's conclusions:
1. Page 14. The draft states that "Infrastructure as a service is the
foundation of all cloud services." This is not accurate because one
can build cloud services without relying on an "infrastructure as a
service" system. We suggest deleting the sentence.
2. Page 24. The NIST point about browser vulnerability (from page 23)
should be part of table 3.
3. Page 24. Delete and it does not currently have finalized plans or
milestones to issue cloud-specific security guidance" and replace it
with "NIST has two documents in preparation: a guide on virtualization
and a guide on cloud computing. NIST expects the virtualization
document to be released for public comment in June 2010 and the cloud
computing document to be released for public comment in September
2010."
4. Page 32. Replace "stated that existing NIST guidance applies" with
"stated that existing NIST requirements apply."
Note: NIST publication 800-53 is a catalogue of controls that
represent security requirements for information systems. It is
designed to be flexible and adaptable to a variety of computing models
and technologies, including cloud computing. We agree that guidance
specific to cloud computing is needed.
5. Page 33. NIST believes portability and interoperability are not
"security issues," as the text implies in the second paragraph on the
page. We suggest replacing the sentence For example, NIST guidance
does not clearly address key cloud computing security issues such as
portability and interoperability, data center operations, and
virtualization" with "Current NIST guidance does not directly address
key cloud computing issues such as portability and interoperability,
data center operations, and virtualization."
We welcome further communications with GAO regarding its conclusions
and look forward to receiving the final report. Please contact Rachel
Kinney at (301) 975-8707 if you have any questions regarding this
response.
Sincerely,
Signed by:
Gary Locke:
[End of section]
Appendix VI: GAO Contact and Staff Acknowledgments:
GAO Contact:
Gregory C. Wilshusen, (202) 512-6244 or wilshuseng@gao.gov.
Staff Acknowledgments:
In addition to the contact name above, individuals making
contributions to this report included Vijay D'Souza (Assistant
Director), Season Dietrich, Neil Doherty, Nancy Glover, Dana Pon,
Jason Porter, and Shaunyce Wallace.
[End of section]
Footnotes:
[1] The 24 major federal agencies are the Agency for International
Development; the Departments of Agriculture, Commerce, Defense,
Education, Energy, Health and Human Services, Homeland Security,
Housing and Urban Development, the Interior, Justice, Labor, State,
Transportation, the Treasury, and Veterans Affairs; the Environmental
Protection Agency; the General Services Administration; the National
Aeronautics and Space Administration; the National Science Foundation;
the Nuclear Regulatory Commission; the Office of Personnel Management;
the Small Business Administration; and the Social Security
Administration.
[2] For fiscal year 2011, the administration has proposed about $79
billion for IT projects.
[3] GAO, Continued Efforts Are Needed to Protect Information Systems
From Evolving Threats, [hyperlink,
http://www.gao.gov/products/GAO-10-230T] (Washington D.C.: Nov. 17,
2009) and Cyber Threats and Vulnerabilities Place Federal Systems at
Risk, [hyperlink, http://www.gao.gov/products/GAO-09-661T]
(Washington, D.C.: May 5, 2009).
[4] GAO, High-Risk Series: Information Management and Technology,
[hyperlink, http://www.gao.gov/products/GAO/HR-97-9] (Washington,
D.C.: February 1997).
[5] GAO, High-Risk Series: An Update, [hyperlink,
http://www.gao.gov/products/GAO-09-271] (Washington, D.C.: January
2009).
[6] NIST, Guide for Applying the Risk Management Framework to Federal
Information Systems: A Security Life Cycle Approach, SP 800-37
Revision 1 (Gaithersburg, Md., February 2010).
[7] NIST, Standards for Security Categorization of Federal Information
and Information Systems, FIPS Publication 199 (Gaithersburg, Md.,
February 2004).
[8] NIST, Minimum Security Requirements for Federal Information and
Information Systems, FIPS Publication 200 (Gaithersburg, Md., March
2006).
[9] NIST, Recommended Security Controls for Federal Information
Systems and Organizations, SP 800-53 Revision 3 (Gaithersburg, Md.,
August 2009).
[10] NIST, Guide for Applying the Risk Management Framework to Federal
Information Systems, SP 800-37 Revision 1 was formerly MST, Guide for
the Certification and Accreditation of Federal Information Systems, SP
800-37. The assessment and authorization process replaces the process
known as certification and accreditation described in the previous
version of SP 800-37.
[11] Cloud Security Alliance, Security Guidance for Critical Areas of
Focus in Cloud Computing, version 2.1 (December 2009).
[12] The European Network and Information Security Agency, Cloud
Computing: Benefits, Risks and Recommendations for Information
Security (November 2009).
[13] The European Network and Information Security Agency, Cloud
Computing: Information Assurance Framework (November 2009).
[15] NIST began developing its definition of cloud computing in
November 2008, and its most recent version, version 15, was released
in October 2009. See NIST, The NIST Definition of Cloud Computing,
version 15 (Gaithersburg, Md., Oct. 7, 2009).
[15] Virtualization is a technology that allows multiple, software-
based virtual machines, with different operating systems, to run in
isolation, side-by-side, on the same physical machine. Virtual
machines can be stored as files, making it possible to save a virtual
machine and move it from one physical server to another.
Virtualization is often used as part of cloud computing.
[16] The Executive Council on Information Management and Technology
members include experts from the public and private sectors and
representatives of related professional organizations who are widely
recognized in IT and information management areas. Council members
provide expert perspectives to senior GAO executives on performance
goals contained in GAO's strategic plan that guide GAO's work in the
areas of information security, information management, and IT
management.
[17] FIT'S Special Publication 199 defines three levels of potential
impact on organizational operations, assets, or individuals should
there be a breach of security. Low applies when the loss of
confidentiality, integrity, or availability could be expected to have
a limited adverse effect; moderate applies when the loss could be
expected to have a serious adverse effect on operations, assets, or
individuals; and high applies when the loss could be expected to have
a severe or catastrophic adverse effect.
[18] SAS 70 will soon be superseded by two new standards: a new audit
standard for audits of entities that use service providers and a new
attestation standard for reporting on controls at a service provider.
[19] 0MB, FY2009 Reporting Instructions for the Federal Information
Security Management Act and Agency Privacy Management, Memorandum M-09-
29 (Washington, D.C., Aug. 20, 2009).
[20] The 24 agencies are the Agency for International Development; the
Departments of Agriculture, Commerce, Defense, Education, Energy,
Health and Human Services, Homeland Security, Housing and Urban
Development, the Interior, Justice, Labor, State, Transportation, the
Treasury, and Veterans Affairs; the Environmental Protection Agency;
the General Services Administration; the National Aeronautics and
Space Administration; the National Science Foundation; the Nuclear
Regulatory Commission; the Office of Personnel Management; the Small
Business Administration; and the Social Security Administration.
[21] A virtual machine is a software image of a computer that executes
programs in the same manner as a physical computer or server. Multiple
virtual machine images can run on one physical computer.
[22] DOD categorizes system impact levels using Mission Assurance
Category I, II, and III: category I systems are considered high impact
and handle information that is vital to mission success, category II
systems are considered medium impact and handle information that is
important for mission success, and category III systems are considered
low impact and handle information that does not materially affect
mission success.
[23] An interconnection security agreement documents security roles
and responsibilities and technical requirements related to the
connection of two information systems.
[24] In July 2009, press accounts reported that a widespread and
coordinated attack over the course of several days had targeted Web
sites operated by major government agencies, causing disruptions to
the public availability of government information.
[End of section]
GAO's Mission:
The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each
weekday, GAO posts newly released reports, testimony, and
correspondence on its Web site. To have GAO e-mail you a list of newly
posted products every afternoon, go to [hyperlink, http://www.gao.gov]
and select "E-mail Updates."
Order by Phone:
The price of each GAO publication reflects GAO‘s actual cost of
production and distribution and depends on the number of pages in the
publication and whether the publication is printed in color or black and
white. Pricing and ordering information is posted on GAO‘s Web site,
[hyperlink, http://www.gao.gov/ordering.htm].
Place orders by calling (202) 512-6000, toll free (866) 801-7077, or
TDD (202) 512-2537.
Orders may be paid for using American Express, Discover Card,
MasterCard, Visa, check, or money order. Call for additional
information.
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]:
E-mail: fraudnet@gao.gov:
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Ralph Dawn, Managing Director, dawnr@gao.gov:
(202) 512-4400:
U.S. Government Accountability Office:
441 G Street NW, Room 7125:
Washington, D.C. 20548:
Public Affairs:
Chuck Young, Managing Director, youngc1@gao.gov:
(202) 512-4800:
U.S. Government Accountability Office:
441 G Street NW, Room 7149:
Washington, D.C. 20548: