User:Shawndouglas/sandbox/sublevel1

From LIMSWiki
Jump to navigationJump to search

Finally, we address security when using SaaS. Though not exactly the laboratory space, let's take a look at the financial sector to start. Like laboratories, banks are regulated not only to protect their own assets but also the assets of their customers, including customer data. Given the concerns about security in the cloud early in its history, it has taken some time for the financial sector to warm up to moving some of its functions into the cloud.[1] However, since approximately 2016, banks and financial services firms have begun shifting to the cloud in droves.[2] Writing for the World Economic Forum in December 2020, the CEO of Tenemos, Max Chuard, noted[3]:

Cloud and SaaS present an alternative way of running a bank’s IT infrastructure. Core banking and/or the digital front office operates on a public or private cloud rather than on physical infrastructure in the bank’s premises. Banks pay a subscription to access the solutions. Both cloud and SaaS carries lower infrastructure costs, they allow products to be created, delivered and changed faster, and they offer immense resilience, scalability, and security. Cloud-based SaaS platforms are also continuously updated, meaning banks benefit from the latest innovations.

However, the improved security of cloud and SaaS does not preclude challenges. In the case of financial services firms, finding a balance between client-side encryption to protect financial data and its tendency to constrain overall performance and functionality is a real challenge.[4] And that same challenge exists for other regulated (and less regulated) organizations turning to SaaS cloud solutions.

When moving to a SaaS-based approach to running critical systems, the shared responsibility paradigm says that both CSP and customer should be managing SaaS security. Are access and audit rights in the SaaS implementation as strong as they should be? How is data managed and processed in relation to location requirements? How are risks mitigated if the vendor goes out of business or changes its operational focus? What contingency plans are in place should the organization need to migrate to a new vendor or bring applications back in-house? What assessments and audits have been made of the CSP's security?[1] (These and other questions are addressed further in Chapter 5.)

In 2018, Moody's Analytics pointed out "seven pillars of SaaS security wisdom." While they were looking at these pillars from the perspective of banks and financing, they are equally applicable to any regulated organization moving to SaaS cloud solutions, including laboratories. Those SaaS security pillars are[1]:

1. Access management: Carefully control user access uniformly across the SaaS platform, using strong, vetted business rules (addressing user roles, data requirements, allowed system, allowed workflows, etc.) that have been documented, disseminated, and learned.
2. Network control: Decide what network mechanisms to employ in order to meet security goals, including jump servers, network access control lists, etc. if more granular access control is required.
3. Perimeter network control: Decide whether a simple firewall or set of firewalls is sufficient. Additional perimeter protections include intrusion detection and prevention systems.
4. Virtual machine management: Recognize that while costly, keeping virtual machines up-to-date is vital. Whether this is your responsibility or the CSP's, staying on top of patches and updates better ensures protection from the latest threats.
5. Data protection: Determine if the data encryption is sufficient for your regulatory needs to protect personally identifiable information. Best practices and standards should be guiding the endeavor to protect both data in transit and data at rest.
6. Data governance and incident management: Decide how data governance policies dictate your SaaS services. Data governance determines who has the authority to manage and control data assets and how authorized individuals are able to use those data assets.[5] Not only does this also guide the first pillar, access management, but it also clarifies responsibilities for data management and security. This includes stating who's responsible for incident management and how the organization will go about monitoring, tracking, reporting, and learning from security incidents.
7. Scalability and reliability: Determine how scalable the underlying cloud infrastructure will be to run your SaaS applications. Is it horizontal or vertical scaling? Are proxy servers geographically distributed for a more robust service? And what assurances are in place should disaster strike (i.e., recovery plan)?

Like public, hybrid, and multicloud cloud services, SaaS vendors should make clear the security aspects. Most major vendors like SAP[6], Adobe[7], and Atlassian[8] will have a trust center for customers to gauge how the vendor's SaaS products are managed in reference to security and compliance. Some SaaS software vendors, however, will host and manage their solutions in a public cloud. Those SaaS vendors should have at a minimum one or more web pages explaining where their solution is hosted, what security controls are in place with that public cloud provider, and what additional security controls, if any, the vendor applies. Of course, access management and other security controls are still very much the responsibility of the customer.

References

  1. 1.0 1.1 1.2 "Best Practices for SaaS Security". Moody's Analytics. Moody's Analytics, Inc. April 2018. https://www.moodysanalytics.com/articles/2018/best-practices-for-saas-security. Retrieved 21 August 2021. 
  2. "Cloud banking: More than just a CIO conversation". Deloitte. 2019. https://www2.deloitte.com/global/en/pages/financial-services/articles/bank-2030-financial-services-cloud.html. Retrieved 21 August 2021. 
  3. Chuard, M. (10 December 2020). "Cloud and SaaS technology can drive inclusive banking. Here are 3 reasons how". World Economic Forum. https://www.weforum.org/agenda/2020/12/cloud-and-saas-technology-can-drive-inclusive-banking/. Retrieved 21 August 2021. 
  4. "Getting cloud right: How can banks stay ahead of the curve?" (PDF). Deloitte. 2019. https://www2.deloitte.com/content/dam/Deloitte/ch/Documents/financial-services/deloitte-ch-fs-Cloud-for-Swiss-Banks-report-digital.pdf. Retrieved 21 August 2021. 
  5. Olavsrud, T. (18 March 2021). "What is data governance? A best practices framework for managing data assets". CIO. https://www.cio.com/article/3521011/what-is-data-governance-a-best-practices-framework-for-managing-data-assets.html. Retrieved 21 August 2021. 
  6. "SAP Trust Center". SAP America, Inc. https://www.sap.com/about/trust-center/certification-compliance.html. Retrieved 21 August 2021. 
  7. "Adobe Trust Center". Adobe, Inc. https://www.adobe.com/trust.html. Retrieved 21 August 2021. 
  8. "Atlassian Trust Center". Atlassian, Inc. https://www.atlassian.com/trust. Retrieved 21 August 2021. 


Citation information for this chapter

Chapter: 2. Standards and security in the cloud

Title: Choosing and Implementing a Cloud-based Service for Your Laboratory

Edition: First edition

Author for citation: Shawn E. Douglas

License for content: Creative Commons Attribution-ShareAlike 4.0 International

Publication date: August 2021