Reflection of Federal Data Protection Standards on Cloud Governance

Olga Dye,Justin Heo,Ebru Celikel Cankaya
DOI: https://doi.org/10.48550/arXiv.2403.07907
2024-02-27
Abstract:As demand for more storage and processing power increases rapidly, cloud services in general are becoming more ubiquitous and popular. This, in turn, is increasing the need for developing highly sophisticated mechanisms and governance to reduce data breach risks in cloud-based infrastructures. Our research focuses on cloud governance by harmoniously combining multiple data security measures with legislative authority. We present legal aspects aimed at the prevention of data breaches, as well as the technical requirements regarding the implementation of data protection mechanisms. Specifically, we discuss primary authority and technical frameworks addressing least privilege in correlation with its application in Amazon Web Services (AWS), one of the major Cloud Service Providers (CSPs) on the market at present.
Computers and Society,Cryptography and Security
What problem does this paper attempt to address?
The main problem that this paper attempts to solve is the risk of data leakage in cloud infrastructures, especially in the context of the accelerated adoption of cloud computing services by federal and state governments. Specifically, the paper focuses on how to reduce the risk of data leakage in the cloud environment by combining legal and technological means to ensure that cloud service providers (CSPs) can effectively protect sensitive data. ### Core Issues of the Paper 1. **Increased Risk of Data Leakage**: - With the rapid growth in the demand for storage and processing capabilities, cloud computing services are becoming more and more popular. This has led to the need for more sophisticated mechanisms and governance to reduce the risk of data leakage in cloud - based infrastructures. 2. **Internal and External Threats**: - The main challenges of data leakage come from external threats (such as state - sponsored advanced persistent threat groups APT) and internal threats (such as malicious employees or the abuse of authorized access rights). In particular, insiders may use their legitimate permissions for malicious activities or cause security incidents due to negligence. 3. **Privilege Abuse Problem**: - According to the 2023 Verizon Data Breach Investigations Report (DBIR), privilege abuse has increased significantly in the past three years and has become one of the main patterns leading to data leakage. These abuse behaviors are usually initiated by insiders, mostly motivated by economic interests. 4. **Combination of Laws, Regulations and Technical Frameworks**: - To address the above problems, the paper proposes the need to combine legal and technological means to develop effective cloud governance strategies. Specifically, the paper discusses the main legal bases and technical frameworks, especially their applications in major cloud service providers such as Amazon Web Services (AWS). ### Solutions The paper proposes the following solutions: - **Least Privilege**: Ensure that users or processes only have the minimum privileges required to complete tasks, thereby reducing potential security risks. - **Attribute - Based Access Control (ABAC)**: Limit resource access through attribute matching, simplify privilege management and improve security. - **Zero - Trust Architecture (ZTA)**: Assume that the network has been breached and require fine - grained access control decisions for each request. - **Compliance and Standards**: Comply with regulations and standards such as the Federal Information Security Management Modernization Act (FISMA) and the Federal Risk and Authorization Management Program (FedRAMP) to ensure that cloud service providers meet the requirements of the government and the industry. Through these measures, the paper aims to provide a comprehensive framework to help cloud service providers and users implement more powerful data protection mechanisms in the cloud environment and reduce the risk of data leakage.