Depending upon which country you are in, people have varying rights regarding the data that you hold about them. Typically, an individual can ask to see this data or have this data destroyed and this data must be treated as confidential and not shared with other parties without the express permission of the individual. This situation is the same whether the data is behind a firewall or in the Public Cloud. However, Public Cloud-based data has additional challenges. Regulations vary between countries with stricter privacy controls forced by law in Europe compared to those in the USA.
Note: This document is part of a collection of documents that comprise the Reference Architecture for Private Cloud document set. The Reference Architecture for Private Cloud documentation is a community collaboration project. Please feel free to edit this document to improve its quality. If you would like to be recognized for your work on improving this article, please include your name and any contact information you wish to share at the bottom of this page.
Most Public Cloud systems are international and this brings many benefits. The data can be accessed worldwide with minimal latency, there are remote backup copies of data which would be unaffected by natural disasters at a particular location, and the cloud vendor (Cloud Service Provider or CSP) can keep prices low by using sites in countries with lower costs.
There are risks which come with international storage and these should be assessed and mitigated through SLAs and contracts. There are also regulations that require the disclosure of private data to government agencies. Regulations which require privacy in one country are often contradictory to regulations which require disclosure in another. Geographic considerations mostly affect data storage, but may also affect data processing.
For example, in the United States of America the Federal Rules of Civil Procedure allows for discovery request which would breach both European and Canadian law. To further compound the issue, laws differ regionally. In the United States the Federal Rules of Civil Procedure has been adopted in only 35 states, whilst in Europe you might need to consider federal, national, and European law.
The reason that this is of particular concern to cloud computing is the geographically dispersed nature of Public Cloud storage. Unfortunately, the technology has progressed at a far faster rate than the laws governing it, but Public Cloud vendors often seem unaware or uninterested in current regulations. You should consider:
It is likely that this situation will be resolved in the near future as the Organisation for Economic Co-operation and Development (OECD) Directorate for Science, Technology and Industry is implementing guidelines on the protection of privacy and trans-border flows of personal data.
Industry compliance considerations are typically seen as an area where many cloud migrations flounder. Organizations such as financial and medical institutions typically operate under strict compliance regulations, so these bodies are always particularly aware of any issue that can have a regulatory implication. Typical regulatory requirements can include:
With Public Clouds, the idea of placing data that is subject to any regulatory oversight into this nebulous area called "the cloud" where it will be in the hands of a third party is simply not to be countenanced. And in many ways, this is an entirely understandable position to take. The fact is that it is the data owner who is responsible for meeting the terms of whatever regulation applies to that organization, regardless of any contracts with any third-party organizations.
Conversely, with Private Cloud implementations, there are significant advantages to be realised from this type of environment. One major advantage of implementing a Private Cloud is the possibility that data is no longer stored on the individual computers. With this fundamental shift in storage location should be enough to interest compliance officers that Private Cloud systems can make their lives simpler by centralizing data in one area where it can be tracked and audited more effectively.
There are many areas that have to be considered when seeking to look at migrating to a cloud architecture from a compliance perspective. Compliance factors in cloud-based environments include:
Managing compliance effectively within a cloud environment starts with the contract with your cloud provider. This contract should cover areas such as:
Ultimately, you have to be able to trust your CSP, which in turn requires a degree of transparency from that provider as to their operational processes and environment. This balance between transparency and the opposing requirement for confidentiality is a major challenge. What you need as a customer is the ability to make informed decisions as to the degree of risk that moving to a cloud-based environment entails, while not requiring the cloud service provider to disclose their proprietary systems and processes.
Note: This degree of risk will vary according to the confidentiality of the data that you are processing in the cloud and the level of regulatory oversight to which your organization is exposed.
Like any other large IT project, the core part of moving to a cloud computing environment is assessment and management of the risk associated with this move. In many ways, these risks are broadly the same as with any other outsourcing project, it is just that the nature of the computing environment is less well defined (unlike a data center outsourcing, you may not be able to visit the multiple facilities that are hosting your cloud-based environment) and your relationship with the cloud service provider may primarily be through a web portal, not through face-to-face meetings.
As with any area that involves compliance, it is essential that you have confidence in your cloud services provider. A key factor in establishing that confidence is that should be looking at organizations who can demonstrate that they meet the following standards:
RESOURCES:
Regulatory Compliance: Is it Impossbile in the Cloud?
ACKNOWLEDGEMENTS LIST: If you edit this page and would like acknowledgement of your participation in the v1 version of this document set, please include your name below: [Enter your name here and include any contact information you would like to share] Return to Cloud Computing Security Architecture Return to Reference Architecture for Private Cloud
Thomas W Shinder - MSFT edited Revision 1. Comment: update
Thomas W Shinder - MSFT edited Revision 2. Comment: edit.
Thomas W Shinder - MSFT edited Revision 3. Comment: save
Thomas W Shinder - MSFT edited Revision 4. Comment: added links.
Thomas W Shinder - MSFT edited Revision 5. Comment: added resources section
Thomas W Shinder - MSFT edited Revision 6. Comment: community and links