Customers
Click below to see particular steps cloud customers* can take to make progress on individual cloud governance issues.
Click below to see particular steps cloud customers* can take to make progress on individual cloud governance issues.
Cloud Certification and Auditing
Localization and Routing Requirements
Security and Privacy in Lawful Government Access
Data Retrievability and Back-up Arrangements
Government Intervention in Extremis
Insurance for Cloud Services
Portability and Interoperability
Commercialization of Customer Data
Cloud Access Restrictions and Content Moderation
Ensuring a Beneficial and Safe Digital Environment for Children
* In this project, “customer” always refers to both enterprises and individual consumers, who use “enterprise cloud” and “consumer cloud” deployments, respectively. Where necessary, individual bullets are labeled with “Enterprise Customers” or “Consumer Customers” to specify that a certain interest, action, or concern is held only by one of these two types of customers.
1 Cloud providers and their customers should develop and integrate incident notification matrices in their SLAs and/or contracts, laying out each party’s responsibilities in crisis communications. For instance, the Cloud Security Alliance sets out the following division of responsibilities for various cloud incident response scenarios: (1) For a security incident occurring in the platform or service layer for a PaaS or SaaS application, the response should be driven by the cloud provider; (2) if a security incident is occurring in the application layer for a PaaS application, the customer should be driving the response; and (3) in the case of a security incident occurring in the platform layer for an IaaS infrastructure cloud, the response should be driven jointly by the customer and the cloud provider to determine if it originated in the customer’s environment or the cloud provider’s environment. (See: CSA, “Cloud Incident Response (CIR) Framework,” Cloud Security Alliance (CSA), 4 May 2021, https://cloudsecurityalliance.org/artifacts/cloud-incident-response-framework/.) Additionally, the retention of digital forensic evidence should be seen as a shared responsibility. (See: Ben Martini and Kim-Kwang Raymond Choo, “An integrated conceptual digital forensic framework for cloud computing,” ScienceDirect, Digital Investigation, vol. 9, issue 2, November 2012, pages 71-80, https://www.sciencedirect.com/science/article/abs/pii/S174228761200059X.)
2 See: Michael Kans, “Congress Debates Cyber Incident Reporting Deadlines in the NDAA,” Just Security, 26 October 2021, https://www.justsecurity.org/78745/congress-debates-cyber-incident-reporting-deadlines-in-the-ndaa/.
3 The localization of data in-territory does not guarantee its security. Data security is attained through encryption and robust zero-trust system architectures.
4 Many enterprise customers already produce information request reports on a voluntary basis, as part of their corporate social responsibility commitments. See: Twitter, “Information Requests,” Twitter Transparency Center, 2021, https://transparency.twitter.com/en/reports/information-requests.html#2020-jul-dec.
5 These strategies can include arrangements for failover across regions, load balancers, application gateways, and more, and should as well include a complementary data backup strategy (for example, how frequent should the backup process be, how extensive, should they be simultaneous across all applications, and so on) and a strategy on how to address lost data. A disaster recovery plan should also account for the people, processes, and applications needed to restore functionality, and should be fully and regularly tested through disaster simulations.
6 Providers may issue guidance to help customers simulate disaster scenarios to test their recovery strategies against. For instance, see: Microsoft, “Performing disaster recovery drills,” Microsoft Azure, October 18, 2021, https://docs.microsoft.com/en-us/azure/azure-sql/database/disaster-recovery-drills; and Google, “Disaster recovery scenarios for data,” Google Cloud, n.d., https://cloud.google.com/architecture/dr-scenarios-for-data.
7 AICPA, “SOC 2 – SOC for Service Organizations: Trust Services Criteria,” AICPA, n.d., https://us.aicpa.org/interestareas/frc/assuranceadvisoryservices/aicpasoc2report.
8 ISO, “ISO/IEC 27001: Information Security Management,” ISO, n.d., https://www.iso.org/isoiec-27001-information-security.html.
9 According to a 2021 report backed by Google, “Only 17% of the financial institutions surveyed . . . have already adopted multi-cloud as an architecture of choice, while 28% rely on single cloud.” Though, 88 percent of respondents without a multi-cloud strategy “reported they are considering adopting [one] in the next 12 months.” See: Zac Maufe, “Google Cloud study: cloud adoption increasing in financial services, but regulatory hurdles remain,” Google Cloud, August 12, 2021, https://cloud.google.com/blog/topics/inside-google-cloud/new-study-shows-cloud-adoption-increasing-in-financial-services and Daphne Leprince-Ringuet, “Banks are moving their core operations into the cloud at a rapid rate. But new tech brings new challenges,” ZDNet, August 13, 2021, https://www.zdnet.com/article/banks-are-moving-their-core-operations-into-the-cloud-at-a-rapid-rate-but-new-tech-brings-new-challenges/.
10 “SWIPO (Switching Cloud Providers and Porting Data), is a multi-stakeholder group facilitated by the European Commission, in order to develop voluntary Codes of Conduct for the proper application of the EU Free Flow of Non-Personal Data Regulation / Article 6 “Porting of Data.” See: SWIPO, “Switching & Porting,” SWIPO, n.d., https://swipo.eu/.
11 Beyond Standards, “IEEE Addresses Standards for the Cloud,” Beyond Standards (blog), IEEE Standards Association, April 18, 2011, https://beyondstandards.ieee.org/ieee-addresses-standards-for-the-cloud/.
12 “ISO/IEC 19941:2017 specifies cloud computing interoperability and portability types, the relationship and interactions between these two cross-cutting aspects of cloud computing and common terminology and concepts used to discuss interoperability and portability, particularly relating to cloud services. See: ISO, “ISO/IEC 19941:2017: Information technology – cloud computing – interoperability and portability,” ISO, December 2017, https://www.iso.org/standard/66639.html.
13 See, for example, Facebook’s Oversight Board, “Oversight Board Home Page,” Oversight Board, n.d., https://oversightboard.com/.
14 Sarah Perez, “TikTok to add more privacy protections for teenaged users, limit push notifications,” TechCrunch, August 12, 2021, https://techcrunch.com/2021/08/12/tiktok-to-add-more-privacy-protections-for-teenaged-users-limit-push-notifications/.