Information technology and cloud services
Information technology services
Information technology services encompass business process services, application processes and infrastructure services. The range of information technology services that can be outsourced is extensive.
The terminology and definitions used in this section for cloud services are consistent with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-145, The NIST Definition of Cloud Computing. This section also applies to cloud services that have a payment model which differs to the NIST pay-per-use measured service characteristic.
Outsourced gateway services
Commercial and government gateway services selected by the Australian Cyber Security Centre (ACSC) will need to undergo regular security assessments to determine their security posture and security risks associated with their use.
Security Control: 0100; Revision: 9; Updated: Mar-20; Applicability: O, P
Commercial and government gateway services selected by the ACSC undergo a joint security assessment by ACSC and Information Security Registered Assessors Program assessors at least every two years.
Using outsourced information technology and cloud services
Outsourcing can be a cost-effective option for providing information technology and cloud services, as well as potentially delivering a superior service; however, it can also affect an organisation’s security risk profile. A security assessment can assist in identifying and managing jurisdictional, governance, privacy and security risks associated with the use of such services. Ultimately, organisations will still need to decide whether a particular outsourced information technology or cloud service represents an acceptable risk and, if appropriate to do so, authorise it for their own use.
Security Control: 1395; Revision: 3; Updated: Mar-20; Applicability: O, P, S, TS
If using an outsourced information technology or cloud service, the service provider provides an appropriate level of protection for any official, sensitive or classified information entrusted to them or their services.
Security Control: 1529; Revision: 0; Updated: Sep-18; Applicability: S, TS
If using outsourced cloud services for highly classified information, public clouds are not used.
Foreign owned service providers and offshore services
Outsourced information technology or cloud services located offshore may be subject to lawful and covert collection, without an organisation’s knowledge. Additionally, use of offshore services introduces jurisdictional risks as foreign countries’ laws could change with little warning. Finally, foreign owned service providers operating in Australia may be subject to a foreign government’s lawful access.
Security Control: 0873; Revision: 6; Updated: Mar-20; Applicability: O, P, S, TS
If using an outsourced information technology or cloud service, a service provider whose systems are located in Australia is used.
Obligations for protecting information are no different when using an outsourced information technology or cloud service than using an in-house service. As such, the contract or service agreement between an organisation and a service provider should address mitigations to security risks. Otherwise, an organisation only has service provider promises that can be hard to verify and may be unenforceable.
Security Control: 0072; Revision: 5; Updated: Sep-18; Applicability: O, P, S, TS
Any security controls associated with the protection of information entrusted to a service provider are documented in contract provisions, a memorandum of understanding or an equivalent formal agreement between parties.
Security Control: 1073; Revision: 3; Updated: Sep-18; Applicability: O, P, S, TS
An organisation’s systems and information are not accessed or administered by a service provider from outside Australian borders unless a contractual arrangement exists between the organisation and the service provider to do so.
Although data ownership resides with an organisation, this can become less clear in some circumstances, such as when legal action is taken and a service provider is asked to provide access to, or data from, their assets. To mitigate the likelihood of data being unavailable or compromised, organisations can explicitly retain ownership of their data through contract provisions.
Security Control: 1451; Revision: 1; Updated: Sep-18; Applicability: O, P, S, TS
When entering into a contractual arrangement for outsourced information technology or cloud services, contractual ownership over an organisation’s data is explicitly retained.
Cyber supply chain risk management
As part of cyber supply chain risk management activities, organisations should consider the security risks that may arise as systems, software and hardware is being designed, built, stored, delivered, installed, operated and maintained. Furthermore, organisations should consider the security risks that a particular supplier may introduce as part of any contracted services.
Security Control: 1452; Revision: 1; Updated: Sep-18; Applicability: O, P, S, TS
A review of suppliers, including their country of origin, is performed before obtaining software, hardware or services to assess the potential increase to an organisation’s security risk profile.
Further information on the definition of cloud computing can be found in NIST SP 800-145, The NIST Definition of Cloud Computing, at https://csrc.nist.gov/publications/detail/sp/800-145/final.
The ACSC’s list of certified gateways is available at https://www.cyber.gov.au/irap/asd-certified-gateways.
The whole-of-government policy on secure cloud computing can be found in the Digital Transformation Agency’s Secure Cloud Strategy publication at https://www.dta.gov.au/our-projects/secure-cloud-strategy.
Further information on outsourced information technology and cloud services can be found in the Attorney-General’s Department’s Protective Security Policy Framework, Security governance for contracted goods and service providers policy, at https://www.protectivesecurity.gov.au/governance/security-governance-for-contracted-service-providers/Pages/default.aspx.
Further information on the ACSC’s Managed Service Provider Partner Program can be found at https://www.cyber.gov.au/programs/msp-partner-program.
Further information on cyber supply chain risk management can be found in the ACSC’s Cyber Supply Chain Risk Management publication at https://www.cyber.gov.au/publications/cyber-supply-chain-risk-management.
Further information on supply chain integrity can be found in NIST SP 800-161, Supply Chain Risk Management Practices for Federal Information Systems and Organizations, at https://csrc.nist.gov/publications/detail/sp/800-161/final.