
Procurement Guide Offers Best Practices for Moving to Cloud
The Center for Digital Government just released a new guide to help governments in their cloud journeys. Here’s why cybersecurity pros should pay close attention.
With a seemingly never-ending list of data breaches, ransomware attacks, and network vulnerabilities that threaten sensitive constituent data, how can state and local governments securely execute leadership plans to move more data into cloud computing environments?
Executive Summary
Introduction
Specific Models and Understanding Cloud Procurement
– Service Models
– Data
– Breach Notification
– Personnel
– Security
– Encryption
– Audits, Third Party Assessments and Continuous Monitoring
– Operations
– Hybrid Cloud Environments
– Preparation for Migrating Workloads to the Cloud
Conclusion
Workgroup Members and Contributors Appendix 1: Model Terms and Conditions Templates; Appendix 2: Service Level Agreement; Appendix 3: Key Contact Information; Appendix 4: Guiding Principles; Appendix 5: Procurement Approaches; Appendix 6: Glossary; Appendix 7: Clause Comparison Matrix; Appendix 8: Aligning Procurement with Risk Authorization and Management; Appendix 9: Risk and Authorization Management Program (RAMP) Checklist
Expert Spotlights on Companies: Amazon Web Services – Citrix – Knowledge Services – VMware
Endnotes
PROCUREMENT GUIDE OVERVIEW
WHO WAS INVOLVED?
Q: How have procurement policies for cloud evolved in recent years?
Joe: State and local governments have acknowledged that security risks are increasing every day. Procurement provisions related to cloud have evolved to require attestation that a provider meets security policies, disclosure of security incidents and increasing amounts of cyber insurance.
In particular, cyber insurance requirements have reached the point where we’ve seen vendors unable to obtain a policy large enough to comply. It’s not just about cost — some insurance companies are no longer underwriting cyber policies. As it becomes more difficult to obtain cyber insurance, preventative measures become even more important. The next evolution we are seeing in cloud procurement policies is a shift away from accepting self-attestation of a product’s security posture toward a verification model, such as StateRAMP.
Q: What are the biggest barriers to effective cloud procurement?
Joe: Governments have deep experience in procurement. However, most government procurement organizations don’t have the depth of experience or budget to support cybersecurity expertise. There’s work to be done in standardizing and simplifying procurements. And there’s the need for abundant yet confidential cyber transparency — without it, governments can’t say whether a vendor meets their security requirements. That adds costs, creates an uneven playing field, and puts constituents and governments at risk.
Q: What are the greatest benefits of StateRAMP for governments and vendors?
Joe: It comes down to cost and procurement efficiencies. Procurement teams are not staffed with cybersecurity experts to perform continuous security monitoring. Government IT and information security teams don’t have the resources for this either — they’re focused on battening down their own applications, data centers and physical spaces.
For solution providers, there’s also a cost; every government regulation carries a cost. What we are trying to do with StateRAMP is bring verification transparency and standardization to cloud procurement, which are the critical components to reducing the cost of continuous security monitoring and increasing speed to award.
Q: What do solid risk management programs look like?
Joe: FedRAMP established a model for a solid risk management program. StateRAMP’s governing committees leverage the work of FedRAMP to incorporate the best practices and chief characteristics that include independent audits, continuous security monitoring and NIST-based standards.
FINAL THOUGHTS
*The Center for Digital Government is part of e.Republic, Government Technology’s parent company.
See More Stories by Dan Lohrmann
*** This is a Security Bloggers Network syndicated blog from Lohrmann on Cybersecurity authored by Lohrmann on Cybersecurity. Read the original post at: https://www.govtech.com/blogs/lohrmann-on-cybersecurity/procurement-guide-offers-best-practices-for-moving-to-cloud