diff --git a/doc/arch-design-draft/source/legal-requirements.rst b/doc/arch-design-draft/source/legal-requirements.rst index d98875144f..a8d8946ee1 100644 --- a/doc/arch-design-draft/source/legal-requirements.rst +++ b/doc/arch-design-draft/source/legal-requirements.rst @@ -4,12 +4,17 @@ Legal requirements ================== -Most countries have legislative and regulatory requirements governing -the storage and management of data in cloud environments. This is particularly -relevant for public, community and hybrid cloud models, to ensure data privacy -and protection for organizations using a third party cloud provider. +Using remote resources for collection, processing, storage, +and retrieval provides potential benefits to businesses. +With the rapid growth of data within organizations, businesses +need to be proactive about their data storage strategies from +a compliance point of view. -.. TODO Elaborate and refine this section later. +Most countries have legislative and regulatory requirements governing +the storage and management of data in cloud environments. This is +particularly relevant for public, community and hybrid cloud models, +to ensure data privacy and protection for organizations using a +third party cloud provider. Common areas of regulation include: @@ -23,11 +28,66 @@ Common areas of regulation include: information needing to reside in certain locations due to regulatory issues - and more importantly, cannot reside in other locations for the same reason. +* Data location policies ensuring that the services deployed + to the cloud are used according to laws and regulations in place + for the employees, foreign subsidiaries, or third parties. +* Disaster recovery policies ensuring regular data backups and + relocation of cloud applications to another supplier in scenarios + where a provider may go out of business, or their data center could + become inoperable. +* Security breach policies governing the ways to notify individuals + through cloud provider's systems or other means if their personal + data gets compromised in any way. +* Industry standards policy governing additional requirements on what + type of cardholder data may or may not be stored and how it is to + be protected. -Examples of such legal frameworks include the -`data protection framework `_ -of the European Union, and the requirements of the +This is an example of such legal frameworks: + +Data storage regulations in Europe are currently driven by provisions of +the `Data protection framework `_. `Financial Industry Regulatory Authority -`_ -in the United States. -Consult a local regulatory body for more information. +`_ works on this in +the United States. + +Privacy and security are spread over different industry-specific laws and +regulations: + +* Health Insurance Portability and Accountability Act (HIPAA) +* Gramm-Leach-Bliley Act (GLBA) +* Payment Card Industry Data Security Standard (PCI DSS) +* Family Educational Rights and Privacy Act (FERPA) + +Cloud security architecture +~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +An efficient cloud security architecture should recognize the issues +that arise with security management. The security management addresses +these issues with security controls. Cloud security controls are put +in place to safeguard any weaknesses in the system and reduce the +effect of an attack. + +The following are different types of security controls. +See also `NIST Special Publication 800-53 +`_. + +Deterrent controls: + Typically reduce the threat level by informing potential attackers + that there will be adverse consequences for them if they proceed. + +Preventive controls: + Strengthen the system against incidents, generally by reducing + if not actually eliminating vulnerabilities. + +Detective controls: + Intended to detect and react appropriately to any incidents + that occur. System and network security monitoring, including + intrusion detection and prevention arrangements, are typically + employed to detect attacks on cloud systems and the supporting + communications infrastructure. + +Corrective controls: + Reduce the consequences of an incident, normally by limiting + the damage. They come into effect during or after an incident. + Restoring system backups in order to rebuild a compromised + system is an example of a corrective control.