Information Security
Governmentwide Guidance Needed to Assist Agencies in Implementing Cloud Computing
Gao ID: GAO-10-855T July 1, 2010
Cloud computing, an emerging form of computing where users have access to scalable, on-demand capabilities that are provided through Internet-based technologies, reportedly has the potential to provide information technology services more quickly and at a lower cost, but also to introduce information security risks. Accordingly, GAO was asked to testify on the benefits and risks of moving federal information technology into the cloud. This testimony summarizes the contents of a separate report that is being released today which describes (1) the models of cloud computing, (2) the information security implications of using cloud computing services in the federal government, and (3) federal guidance and efforts to address information security when using cloud computing. In preparing that report, GAO collected and analyzed information from industry groups, private-sector organizations, and 24 major federal agencies.
Cloud computing has several service and deployment models. The service models include the provision of infrastructure, computing platforms, and software as a service. The deployment models relate to how the cloud service is provided. They include a private cloud, operated solely for an organization; a community cloud, shared by several organizations; a public cloud, available to any paying customer; and a hybrid cloud, a composite of deployment models. Cloud computing can both increase and decrease the security of information systems in federal agencies. Potential information security benefits include those related to the use of virtualization and automation, broad network access, potential economies of scale, and use of self-service technologies. In addition to benefits, the use of cloud computing can create numerous information security risks for federal agencies. Specifically, 22 of 24 major federal agencies reported that they are either concerned or very concerned about the potential information security risks associated with cloud computing. Risks include dependence on the security practices and assurances of a vendor, and the sharing of computing resources. However, these risks may vary based on the cloud deployment model. Private clouds may have a lower threat exposure than public clouds, but evaluating this risk requires an examination of the specific security controls in place for the cloud's implementation. Federal agencies have begun efforts to address information security issues for cloud computing, but key guidance is lacking and efforts remain incomplete. Although individual agencies have identified security measures needed when using cloud computing, they have not always developed corresponding guidance. Agencies have also identified challenges in assessing vendor compliance with government information security requirements and clarifying the division of information security responsibilities between the customer and vendor. Furthermore, while several governmentwide cloud computing security initiatives are under way by organizations such as the Office of Management and Budget and the General Services Administration, significant work needs to be completed. For example, the Office of Management and Budget has not yet finished a cloud computing strategy, or defined how information security issues will be addressed in this strategy. The General Services Administration has begun a procurement for expanding cloud computing services, but has not yet developed specific plans for establishing a shared information security assessment and authorization process. In addition, while the National Institute of Standards and Technology has begun efforts to address cloud computing information security, it has not yet issued cloud-specific security guidance. Until specific guidance and processes are developed to guide the agencies in planning for and establishing information security for cloud computing, they may not have effective information security controls in place for cloud computing programs. In the report being released today, GAO recommended that the Office of Management and Budget, the General Services Administration, and the Department of Commerce take steps to address cloud computing security, including completion of a strategy, consideration of security in a planned procurement of cloud computing services, and issuance of guidance related to cloud computing security. These agencies generally agreed with GAO's recommendations.
GAO-10-855T, Information Security: Governmentwide Guidance Needed to Assist Agencies in Implementing Cloud Computing
This is the accessible text file for GAO report number GAO-10-855T
entitled 'Information Security: Governmentwide Guidance Needed to
Assist Agencies in Implementing Cloud Computing' which was released on
July 1, 2010.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as
part of a longer term project to improve GAO products' accessibility.
Every attempt has been made to maintain the structural and data
integrity of the original printed product. Accessibility features,
such as text descriptions of tables, consecutively numbered footnotes
placed at the end of the file, and the text of agency comment letters,
are provided but may not exactly duplicate the presentation or format
of the printed version. The portable document format (PDF) file is an
exact electronic replica of the printed version. We welcome your
feedback. Please E-mail your comments regarding the contents or
accessibility features of this document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Testimony:
Before the Committee on Oversight and Government Reform and Its
Subcommittee on Government Management, Organization, and Procurement,
House of Representatives:
United States Government Accountability Office:
GAO:
For Release on Delivery:
Expected at 10:00 a.m. EDT:
Thursday, July 1, 2010:
Information Security:
Governmentwide Guidance Needed to Assist Agencies in Implementing
Cloud Computing:
Statement of Gregory C. Wilshusen:
Director, Information Security Issues:
GAO-10-855T:
GAO Highlights:
Highlights of GAO-10-855T, a testimony before the Committee on
Oversight and Government Reform and its Subcommittee on Government
Management, Organization, and Procurement, House of Representatives.
Why GAO Did This Study:
Cloud computing, an emerging form of computing where users have access
to scalable, on-demand capabilities that are provided through Internet-
based technologies, reportedly has the potential to provide
information technology services more quickly and at a lower cost, but
also to introduce information security risks. Accordingly, GAO was
asked to testify on the benefits and risks of moving federal
information technology into the cloud. This testimony summarizes the
contents of a separate report that is being released today which
describes (1) the models of cloud computing, (2) the information
security implications of using cloud computing services in the federal
government, and (3) federal guidance and efforts to address
information security when using cloud computing. In preparing that
report, GAO collected and analyzed information from industry groups,
private-sector organizations, and 24 major federal agencies.
What GAO Found:
Cloud computing has several service and deployment models. The service
models include the provision of infrastructure, computing platforms,
and software as a service. The deployment models relate to how the
cloud service is provided. They include a private cloud, operated
solely for an organization; a community cloud, shared by several
organizations; a public cloud, available to any paying customer; and a
hybrid cloud, a composite of deployment models.
Cloud computing can both increase and decrease the security of
information systems in federal agencies. Potential information
security benefits include those related to the use of virtualization
and automation, broad network access, potential economies of scale,
and use of self-service technologies. In addition to benefits, the use
of cloud computing can create numerous information security risks for
federal agencies. Specifically, 22 of 24 major federal agencies
reported that they are either concerned or very concerned about the
potential information security risks associated with cloud computing.
Risks include dependence on the security practices and assurances of a
vendor, and the sharing of computing resources. However, these risks
may vary based on the cloud deployment model. Private clouds may have
a lower threat exposure than public clouds, but evaluating this risk
requires an examination of the specific security controls in place for
the cloud‘s implementation.
Federal agencies have begun efforts to address information security
issues for cloud computing, but key guidance is lacking and efforts
remain incomplete. Although individual agencies have identified
security measures needed when using cloud computing, they have not
always developed corresponding guidance. Agencies have also identified
challenges in assessing vendor compliance with government information
security requirements and clarifying the division of information
security responsibilities between the customer and vendor.
Furthermore, while several governmentwide cloud computing security
initiatives are under way by organizations such as the Office of
Management and Budget and the General Services Administration,
significant work needs to be completed. For example, the Office of
Management and Budget has not yet finished a cloud computing strategy,
or defined how information security issues will be addressed in this
strategy. The General Services Administration has begun a procurement
for expanding cloud computing services, but has not yet developed
specific plans for establishing a shared information security
assessment and authorization process. In addition, while the National
Institute of Standards and Technology has begun efforts to address
cloud computing information security, it has not yet issued cloud-
specific security guidance. Until specific guidance and processes are
developed to guide the agencies in planning for and establishing
information security for cloud computing, they may not have effective
information security controls in place for cloud computing programs.
What GAO Recommends:
In the report being released today, GAO recommended that the Office of
Management and Budget, the General Services Administration, and the
Department of Commerce take steps to address cloud computing security,
including completion of a strategy, consideration of security in a
planned procurement of cloud computing services, and issuance of
guidance related to cloud computing security. These agencies generally
agreed with GAO‘s recommendations.
View [hyperlink, http://www.gao.gov/products/GAO-10-855T] or key
components. For more information, contact Gregory Wilshusen at (202)
512-6244 or wilshuseng@gao.gov.
[End of section]
Chairman Towns, Chairwoman Watson, and Members of the Committee and
Subcommittee:
Thank you for the opportunity to participate in today's hearing on
federal guidance and efforts to address information security when
using cloud computing. My statement today is based on our report
titled Information Security: Federal Guidance Needed to Address
Control Issues with Implementing Cloud Computing (GAO-10-513), which
provides a fuller discussion of our results and is being released at
this hearing.[Footnote 1]
Cloud computing is an emerging form of computing that relies on
Internet-based services and resources to provide computing services to
customers. Examples of cloud computing include Web-based e-mail
applications and common business applications that are accessed online
through a browser, instead of through a local computer. The current
administration has highlighted cloud computing as having the potential
to provide information technology (IT) services more quickly and at a
lower cost than traditional methods.
We have previously reported that cyber threats to federal information
systems and cyber-based critical infrastructures are evolving and
growing.[Footnote 2] Without proper safeguards, computer systems are
vulnerable to individuals and groups with malicious intentions who can
intrude and use their access to obtain and manipulate sensitive
information, commit fraud, disrupt operations, or launch attacks
against other computer systems and networks. Further, the increasing
interconnectivity among information systems, the Internet, and other
infrastructure presents increasing opportunities for attacks. For
example, in 2009, several media reports described incidents that
affected cloud service providers such as Amazon and Google.
Given the potential risks, you requested that we examine the security
implications of cloud computing. In response to your request, our
report and my statement provide (1) a description of the models of
cloud computing, (2) a description of the information security
implications of using cloud computing services in the federal
government, and (3) an assessment of federal guidance and efforts to
address information security when using cloud computing. In conducting
the work for our report, we collected and analyzed information from
industry groups, private-sector organizations, the National Institute
of Standards and Technology (NIST), and 24 major federal agencies.
[Footnote 3] Our work for the report was performed in accordance with
generally accepted government auditing standards.
Cloud Computing Is a Form of Shared Computing with Several Service and
Deployment Models:
Cloud computing is a new form of delivering IT services that takes
advantage of several broad evolutionary trends in information
technology, including the use of virtualization.[Footnote 4] According
to NIST, cloud computing is a means "for enabling convenient, on-
demand network access to a shared pool of configurable computing
resources that can be rapidly provisioned and released with minimal
management effort or service provider interaction." NIST also states
that an application should possess five essential characteristics to
be considered cloud computing; on-demand self service, broad network
access, resource pooling, rapid elasticity, and measured service.
Cloud computing offers three service models: infrastructure as a
service, where a vendor offers various infrastructure components;
platform as a service, where a vendor offers a ready-to-use platform
on which customers can build applications; and software as a service,
which provides a self-contained operating environment used to deliver
a complete application such as Web-based e-mail.
In addition, four deployment models for providing cloud services have
been developed: private, community, public, and hybrid cloud. In a
private cloud, the service is set up specifically for one
organization, although there may be multiple customers within that
organization and the cloud may exist on or off the premises. In a
community cloud, the service is set up for related organizations that
have similar requirements. A public cloud is available to any paying
customer and is owned and operated by the service provider. A hybrid
cloud is a composite of the deployment models.
Cloud Computing Has Both Positive and Negative Information Security
Implications:
The adoption of cloud computing has the potential to provide benefits
related to information security. The use of virtualization and
automation in cloud computing can expedite the implementation of
secure configurations for virtual machine images. Other advantages
relate to cloud computing's broad network access and use of Internet-
based technologies. For example, several agencies stated that cloud
computing provides a reduced need to carry data in removable media
because of the ability to access the data through the Internet,
regardless of location. Additional advantages relate to the potential
economies of scale and distributed nature of cloud computing. In
response to our survey, 22 of the 24 major agencies identified low-
cost disaster recovery and data storage as a potential benefit. The
self-service aspect of cloud computing may also provide benefits. For
example, 20 of 24 major agencies identified the ability to apply
security controls on demand as a potential benefit.
In addition to benefits, the use of cloud computing can create
numerous information security risks for federal agencies. In response
to our survey, 22 of 24 major agencies reported that they are either
concerned or very concerned about the potential information security
risks associated with cloud computing. Several of these risks relate
to being dependent on a vendor's security assurances and practices.
Specifically, several agencies stated concerns about:
* the possibility that ineffective or non-compliant service provider
security controls could lead to vulnerabilities affecting the
confidentiality, integrity, and availability of agency information;
* the potential loss of governance and physical control over agency
data and information when an agency cedes control to the provider for
the performance of certain security controls and practices;
* the insecure or ineffective deletion of agency data by cloud
providers once services have been provided and are complete; and:
* potentially inadequate background security investigations for
service provider employees that could lead to an increased risk of
wrongful activities by malicious insiders.
Multitenancy, or the sharing of computing resources by different
organizations, can also increase risk. Twenty-three of 24 major
agencies identified multitenancy as a potential information security
risk because one customer could intentionally or unintentionally gain
access to another customer's data, causing a release of sensitive
information. Another concern is the increased volume of data
transmitted across agency and public networks. This could lead to an
increased risk of the data being intercepted in transit and then
disclosed.
Although there are numerous potential information security risks
related to cloud computing, these risks may vary based on the
particular deployment model. For example, NIST states that private
clouds may have a lower threat exposure than community clouds, which
may have a lower threat exposure than public clouds. Several industry
representatives stated that an agency would need to examine the
specific security controls of the vendor the agency was evaluating
when considering the use of cloud computing.
Federal Agencies Have Begun Efforts to Address Information Security
Issues for Cloud Computing, but Specific Guidance Is Lacking and
Efforts Remain Incomplete:
Federal agencies have begun to address information security for cloud
computing; however, they have not developed the corresponding
guidance. About half of the 24 major agencies we asked reported using
some form of public or private cloud computing for obtaining
infrastructure, platform, or software services. These agencies
identified measures they are taking or plan to take when using cloud
computing. These actions, however, have not always been accompanied by
development of related policies or procedures to secure their
information and systems.
Most agencies have concerns about ensuring vendor compliance and
implementation of government information security requirements. In
addition, agencies expressed concerns about limitations on their
ability to conduct independent audits and assessments of security
controls of cloud computing service providers. Several industry
representatives agreed that compliance and oversight issues are a
concern and raised the idea of having a single government entity or
other independent entity conduct security oversight and audits of
cloud computing service providers on behalf of federal agencies.
Agencies also stated that having a cloud service provider that had
been precertified as being in compliance with government information
security requirements through some type of governmentwide approval
process would make it easier for them to consider adopting cloud
computing. Other agency concerns related to the division of
information security responsibilities between customer and vendor.
Until these concerns are addressed, the adoption of cloud computing
may be limited.
Several Governmentwide Cloud Computing Information Security
Initiatives Have Been Started, but Key Guidance and Efforts Have Not
Been Completed:
While several governmentwide cloud computing security activities are
under way by organizations such as the Office of Management and Budget
(OMB) and the General Services Administration (GSA), significant work
remains to be completed. For example, OMB stated that it began a
federal cloud computing initiative in February 2009; however, it does
not yet have an overarching strategy or an implementation plan.
According to OMB officials, the initiative includes an online cloud
computing storefront managed by GSA and will likely contain several
pilot cloud computing projects, each with a lead agency. However, as
of March 2010, a date had not been set for the release of the strategy
or for any of the pilots. In addition, OMB has not yet defined how
information security issues, such as a shared assessment and
authorization process, will be addressed in this strategy.
Federal agencies have stated that additional guidance on cloud
computing security would be helpful. Addressing information security
issues as part of this strategy would provide additional direction to
agencies looking to use cloud computing services. Accordingly, we
recommended that OMB establish milestones for completing a strategy
for implementing the cloud computing initiative and ensure the
strategy addresses the information security challenges associated with
cloud computing, such as needed agency-specific guidance, controls
assessment of cloud computing service providers, division of
information security responsibilities between customer and provider, a
shared assessment and authorization process, and the possibility for
precertification of cloud computing service providers. OMB agreed with
our recommendation and noted that it planned to issue a strategy over
the next 6 months that covers activities for the next 5 to 10 years
based on near term lessons learned. OMB also identified several
federal activities planned in the short term to address security
issues in cloud computing.
GSA Has Established Program Office and Cloud Computing Storefront, but
Has Not Yet Developed Plans for a Shared Assessment and Authorization
Process:
GSA has established the Cloud Computing Program Management Office that
manages several cloud computing activities within GSA and provides
administrative support for cloud computing efforts by the Federal
Chief Information Officers (CIO) Council. Specifically, the program
office manages a storefront, [hyperlink, http://www.apps.gov],
established by GSA to provide a central location where federal
customers can purchase software as a service cloud computing
applications. GSA has also initiated a procurement to expand the
storefront by adding infrastructure as a service cloud computing
offerings such as storage, virtual machines, and Web hosting.
Establishing both an assessment and authorization process for
customers of these services and a clear division of security
responsibilities will help ensure that these services, when purchased
and effectively implemented, protect sensitive federal information.
GSA officials stated that they need to work with vendors after a new
procurement has been completed to develop a shared assessment and
authorization process, but have not yet developed specific plans to do
so. Accordingly, we recommended that GSA ensure that full
consideration is given to the information security challenges of cloud
computing, including a need for a shared assessment and authorization
process as part of their procurement for infrastructure as a service
cloud computing technologies. GSA agreed and identified plans for
ensuring issues such as a shared assessment and authorization process
would be addressed.
Federal CIO Council Has Established Cloud Computing Executive Steering
Committee but Has Not Finalized Key Process or Guidance:
The Federal CIO Council established the Cloud Computing Executive
Steering Committee to promote the use of cloud computing in the
federal government. Under this committee, the security subgroup has
developed the Federal Risk and Authorization Management Program, which
is a governmentwide program to provide joint authorizations and
continuous security monitoring services for all federal agencies, with
an initial focus on cloud computing.
The subgroup is currently working with its members to define
interagency security requirements for cloud systems and services and
related information security controls. However, a deadline for
completing development and implementation of a shared assessment and
authorization process has not been established. We recommended that
OMB direct the CIO Council Cloud Computing Executive Steering
Committee to develop a plan, including milestones, for completing a
governmentwide security assessment and authorization process for cloud
services. OMB agreed and identified current activities of the CIO
Council which are intended to address the recommendation.
NIST Is Coordinating Activities with CIO Council but Has Not
Established Cloud-Specific Guidance:
NIST is responsible for establishing information security guidance for
federal agencies to support FISMA; however, it has not yet established
guidance specific to cloud computing or to information security issues
specific to cloud computing, such as portability and interoperability,
and virtualization.
The NIST official leading the institute's cloud computing activities
stated that existing NIST guidance in SP 800-53 and other publications
applies to cloud computing and can be tailored to the information
security issues specific to cloud computing. However, both federal and
private sector officials have made clear that existing guidance is not
sufficient. Accordingly, we recommended that NIST issue cloud
computing guidance to federal agencies to more fully address key cloud
computing domain areas that are lacking in SP 800-53 areas such as
virtualization, and portability and interoperability, and include a
process for defining roles and responsibilities of cloud computing
service providers and customers. NIST officials agreed and stated that
the institute is planning to issue guidance on cloud computing and
virtualization this year.
In summary, the adoption of cloud computing has the potential to
provide benefits to federal agencies; however, it can also create
numerous information security risks. Federal agencies have taken steps
to address cloud computing security, but many have not developed
corresponding guidance. OMB has initiated a federal cloud computing
initiative, but has not yet developed a strategy that addresses the
information security issues related to cloud computing, and guidance
from NIST to ensure information security is insufficient. While the
Federal CIO Council is developing a shared assessment and
authorization process, which could help foster adoption of cloud
computing, this process remains incomplete, and GSA has yet to develop
plans for a shared assessment and authorization process for its
procurement of cloud computing infrastructure as a service offerings.
Until federal guidance and processes that specifically address
information security for cloud computing are developed, agencies may
be hesitant to implement cloud computing, and those programs that have
been implemented may not have effective information security controls
in place.
Chairman Towns, Chairwoman Watson, and Members of the Committee and
Subcommittee, this concludes my prepared statement. I would be pleased
to respond to any questions.
For questions about this statement, please contact Gregory C.
Wilshusen at (202) 512-6244 or wilshuseng@gao.gov. Individuals making
key contributions to this testimony included Season Dietrich, Vijay
D'Souza, Nancy Glover, and Shaunyce Wallace.
[End of section]
Footnotes:
[1] GAO, Information Security: Federal Guidance Needed to Address
Control Issues with Implementing Cloud Computing, [hyperlink,
http://www.gao.gov/products/GAO-10-513] (Washington, D.C. May 27,
2010).
[2] GAO, Continued Efforts Are Needed to Protect Information Systems
From Evolving Threats, [hyperlink,
http://www.gao.gov/products/GAO-10-230T] (Washington D.C.: Nov. 17,
2009) and Cyber Threats and Vulnerabilities Place Federal Systems at
Risk, [hyperlink, http://www.gao.gov/products/GAO-09-661T]
(Washington, D.C.: May 5, 2009).
[3] The 24 major federal agencies are the Agency for International
Development; the Departments of Agriculture, Commerce, Defense,
Education, Energy, Health and Human Services , Homeland Security,
Housing and Urban Development, the Interior, Justice, Labor, State,
Transportation, the Treasury, and Veterans Affairs; the Environmental
Protection Agency; the General Services Administration; the National
Aeronautics and Space Administration; the National Science Foundation;
the Nuclear Regulatory Commission; the Office of Personnel Management;
the Small Business Administration; and the Social Security
Administration.
[4] Virtualization is a technology that allows multiple software-based
virtual machines with different operating systems to run in isolation,
side-by-side on the same physical machine. Virtual machines can be
stored as files, making it possible to save a virtual machine and move
it from one physical server to another.
[End of section]
GAO's Mission:
The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each
weekday, GAO posts newly released reports, testimony, and
correspondence on its Web site. To have GAO e-mail you a list of newly
posted products every afternoon, go to [hyperlink, http://www.gao.gov]
and select "E-mail Updates."
Order by Phone:
The price of each GAO publication reflects GAO‘s actual cost of
production and distribution and depends on the number of pages in the
publication and whether the publication is printed in color or black and
white. Pricing and ordering information is posted on GAO‘s Web site,
[hyperlink, http://www.gao.gov/ordering.htm].
Place orders by calling (202) 512-6000, toll free (866) 801-7077, or
TDD (202) 512-2537.
Orders may be paid for using American Express, Discover Card,
MasterCard, Visa, check, or money order. Call for additional
information.
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]:
E-mail: fraudnet@gao.gov:
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Ralph Dawn, Managing Director, dawnr@gao.gov:
(202) 512-4400:
U.S. Government Accountability Office:
441 G Street NW, Room 7125:
Washington, D.C. 20548:
Public Affairs:
Chuck Young, Managing Director, youngc1@gao.gov:
(202) 512-4800:
U.S. Government Accountability Office:
441 G Street NW, Room 7149:
Washington, D.C. 20548: