Academia.eduAcademia.edu

Securing Cloud Computing Through IT Governance

SSRN Electronic Journal

IT in Industry, vol. 7, no.1, 2019 Published online 11-Feb-2019 Securing Cloud Computing Through IT Governance 1 Salman M. Faizi and 2Shawon Rahman, Ph.D. 1 Information Assurance and Cyber security Program, Capella University, Minneapolis, Minnesota, USA 2 Associate Professor, Dept. of Computer Science & Engineering, University of Hawaii-Hilo, 200 W. Kawili Street, Hilo, HI 96720, USA Abstract—Lack of alignment between information technology (IT) and the business is a problem facing many organizations. Most organizations, today, fundamentally depend on IT. When IT and the business are aligned in an organization, IT delivers what the business needs and the business is able to deliver what the market needs. IT has become a strategic function for most organizations, and it is imperative that IT and business are aligned. IT governance is one of the most powerful ways to achieve IT to business alignment. Furthermore, as the use of cloud computing for delivering IT functions becomes pervasive, organizations using cloud computing must effectively apply IT governance to it. While cloud computing presents tremendous opportunities, it comes with risks as well. Information security is one of the top risks in cloud computing. Thus, IT governance must be applied to cloud computing information security to help manage the risks associated with cloud computing information security. This study advances knowledge by extending IT governance to cloud computing and information security governance. Keywords—Business alignment, cloud computing, cloud computing security, information security, IT governance. I.INTRODUCTION T HIS paper presents a study on implementing information technology (IT) governance policies and processes to cloud computing information security. IT governance is defined as a set of mechanisms designed to encourage behaviors that are consistent with the mission, strategy, and culture of the organization; the mechanisms address various matters related to IT such as decision processes, policies, the assignment of accountabilities, and participation rights for the stakeholder [1, 2]. From the preceding definition, it is evident that IT policies and processes such as information security fall within the domain of IT governance. IT governance also applies governance to information security. Moreover, as organizations move from on-premises computing to cloud computing, it is imperative that they adopt information security governance to the Copyright © Salman M. Faizi, Shawon S. M. Rahman 2019 essential characteristics of cloud computing. Lack of effective IT governance is one of the barriers to cloud computing adoption [3]. It is vital that organizations consider a sound IT governance framework as they adopt cloud computing. In organizations today, the alignment of IT operations with the business strategies and management of IT risks are imperative. IT governance is a way to accomplish IT-Business alignment; furthermore, according to the research on the subject, the most important purpose of IT governance is to align IT operations of an organization with its business strategies [4]. IT-Business alignment ensures that IT operations deliver and operate in a way that supports the business strategies and the vision of the organization. IT governance is the management of an organization’s IT and business processes in such a way that IT and business are integrated; however, aligning IT operations with business strategies is not easy [4]. In addition to IT-Business alignment, the literature on information system (IS) research emphasizes management of IT-related risks. IT governance provides a structure of processes and relationships to attain the goals of an enterprise by adding value while balancing risks with a return over IT investments [5]. Thus, the two main aspects of IT governance, emphasized by researchers, are to align IT to business and to manage risk, and the alignment and risk management lead to an organization that is better positioned to serve the market needs. IT governance must be effective. Studies have shown that the effectiveness of IT governance relies on the existence of three mechanisms: (a) an IT steering committee, (b) the involvement of senior management in IT, and (c) corporate performance measurement systems [5]. The three mechanisms of IT governance allow organizations to build effective IT governance to help realize business success through alignment of their IT operations with business strategies. Researchers have long established that IT-Business strategic alignment is key to business success [6]. One of the primary goals of IT governance should be making decisions for investment and utilization of IT functions by addressing the question of how an organization should make investments to its IT for maximum benefit to the entire organization. IT governance applies to an organization in various ways such as principle, 1 ISSN (Print): 2204-0595 ISSN (Online): 2203-1731 IT in Industry, vol. 7, no.1, 2019 Published online 11-Feb-2019 policy, process, or organization specific activities [7]. Effective IT governance is in the interest of an organization. Furthermore, IT governance driven IT-Business alignment even increases the status of the CIO. When CIOs have used IT governance to ensure alignment between business and IT, IT governance has been pivotal for the CIOs to increase their status within an organization [8]. IT governance not only helps the IT leadership gain prominence within the organization but also positively moderates business performance of the organization. Effective IT governance provides efficient mechanisms to achieve alignment between IT and business and to allocate their resources such as people, processes, and technology to IT investments. II. BACKGROUND OF THE STUDY One area where organizations must apply governance to allocate IT resources is the area of information security. Many organizations today find that information has grown to become their lifeblood because information is used to drive most business processes for employees of all levels [2]. Furthermore, information is not only used as an enabler but also used to gain a competitive advantage in the marketplace and to drive business value chain. Information has become an essential asset for most organizations, and similar to all other critical assets, information needs adequate protection to prevent theft or intentional or unintentional misuse of information. Information security is not just an implementation of technology; there are other elements involved. Information security consists of technology, processes, and people [9]. Technical measures such as passwords, firewalls, network monitoring, and the likes are not enough to counter threats to information; therefore, organizations must consider a combination of measures to protect their information against theft and harm whether intentional or unintentional [9]. Processes include things like user registration, deregistration, and organizations must consider people aspects such as compliance, training, and leadership by example instead of just deploying a solution that protects information from theft, loss, or misuse. The way to achieve the security objectives of protecting information through people, process, and technology is for information security to have its governance framework. Moreover, there are compliance reasons to adopt IT governance. Most modern corporate governance rules as well as some country laws make the Board and specifically the CEO responsible for protecting sensitive information [10, 11]. Placing such a responsibility on the board of directors and the CEO of an enterprise highlights the importance of protection of private and business-critical information. In some cases, Copyright © Salman M. Faizi, Shawon S. M. Rahman 2019 2 there is a regulatory obligation to safeguard information, and the violation of the responsibility can have punitive repercussions for an organization and its executives. Consequently, the boards and the CEOs have a vested interest in using governance to efficiently protect their organization’s information in both the existing and new models of delivering IT services to customers and employees. One relatively new model for delivering IT services is cloud computing, and it needs a framework for IT governance intended to secure an organization’s information when stored in the model of cloud computing. Given the maturity and development of cloud computing, public cloud computing services are a natural choice for enterprises to achieve greater cost savings and resource utilization; however, there are worries about the security of cloud computing services [12]. Moreover, enterprise data security and privacy issues have become one of the main factors that have hindered the popularity of cloud computing [12]. Thus, cloud computing will benefit from a framework of IT governance and the associated best practices. III. CLOUD COMPUTING Cloud computing is a relatively recent entrant onto the landscape of information technology, and it stands to fundamentally shift how organizations deliver information technology services to their employees, customers, and partners. The following diagram provides a conceptual overview of cloud computing showing its various elements. Figure 1. Cloud Computing Today, cloud computing has become a global trend, and it has drawn attention from both the business world and the academic community [13]. Such technology provides a paradigm shift in the field of information technology. Thus, increasingly information assets will be stored, retrieved, and processed on cloud computing platforms. ISSN (Print): 2204-0595 ISSN (Online): 2203-1731 IT in Industry, vol. 7, no.1, 2019 Numerous surveys show that a substantial majority of organizations are either already using cloud computing or plan to adopt it in the near future[14]. The characteristics of cloud computing are already impacting IT organizations. Right Scale Inc. [15] reported that companies not only already process most of their computational workload using cloud computing, but they are planning on increasing their use of cloud computing. The report also indicated that among the respondents to its survey, public cloud adoption increased to 92% in 2018 from 89% in 2017. Such an explosive growth in the adoption of cloud computing points to its importance. The cloud computing adoption is just as applicable to the government sector as it is to the private sector. Cloud computing has received attention at all levels of the US government since, according to the Brookings Institution, government agencies can save 25-50% by migrating to the cloud [16]. Similarly, the European Commission is promoting the use of cloud computing among the government sector in Europe as part of the “Digital Agenda for Europe” [17]. In the developing economies, cloud computing is a vehicle for the realization of electronic government or e-government [18]. Both private and public sectors are accelerating adoption of cloud computing. Consequently, cloud computing is just as important to the private sector as it is to the public sector. A. Definition of Cloud Computing Before proceeding further, it is helpful to define cloud computing. The cloud computing literature contains several definitions of cloud computing, and the definitions do not seem to cover all the features of the cloud. There is confusion about the definition of cloud computing [19]. It is important to define cloud computing because the definition will help contain the scope of the discussion for this paper. Efforts have been made to standardize the definition of cloud computing. One such standardized definition is from Mell and Grance [20] of the National Institute of Standards and Technology (NIST). The NIST definition of cloud computing is a reasonable definition [21]. The NIST [20] defines cloud computing as follows: Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models. (p. 2). B. The Essential Characteristics of Cloud Computing The above definition of cloud computing leads to the five essential characteristics of cloud computing. These Copyright © Salman M. Faizi, 3 Shawon S. M. Rahman 2019 Published online 11-Feb-2019 characteristics are (a) on-demand self-service, (b) broad network access, (c) resource pooling, (d) rapid elasticity, and (e) measured service. Next, we define each one of these characteristics per the definitions of Mell and Grance [20] and Stieninger and Nedbal [19]. The first characteristic is on-demand self-service which means a cloud computing consumer can solely provision computing features, such as server time and network storage, as desired automatically without needing human interaction with a cloud computing service provider. The cloud computing customers can adjust the demand of cloud computing services as their needs change. An essential characteristic of cloud computing is on-demand self-service. The second characteristic of cloud computing is broad network access which means that cloud computing capabilities are available over the network and are accessible through standard mechanisms employed by varied thin or thick client platforms such as mobile phones, tablets, laptops, workstations, and other similar clients. Broad network access is one of the highly attractive features of cloud computing and is deemed essential. The third characteristic of cloud computing is resource pooling which implies that the cloud computing provider’s computing resources are pooled to serve multiple consumers using a multi-tenant model. Multitenancy in cloud computing refers to an architecture that allows each tenant or customer to keep his or her data separate and invisible to other tenants. In the multitenancy model different physical and virtual resources are dynamically assigned and reassigned according to consumer demand at a given moment. This aspect provides a sense of location independence such that the customer normally does not have any control or knowledge over the exact location of the cloud computing provided resources. However, when provisioning a cloud computing service, the customer may be able to specify location at a higher level of abstraction. The customer can specify country, state, region, or data center to control the general location of where the hardware and associated services will originate. Examples of cloud computing resources are storage, processing, virtual network, memory, and network bandwidth. Resource pooling is an essential characteristic of cloud computing. The fourth characteristic of cloud computing is rapid elasticity which means that cloud computing capabilities can be dynamically provisioned and released to scale rapidly per the increasing and decreasing demand. In some cases, elasticity can occur automatically based on rules predefined by the customer. Elasticity is important because, to the cloud computing customer, the capacity available for provisioning often appears to be unlimited. The customer can allocate ISSN (Print): 2204-0595 ISSN (Online): 2203-1731 IT in Industry, vol. 7, no.1, 2019 capacity in almost any quantity at any time. A crucial characteristic of cloud computing is fast elasticity. The fifth and final characteristic of cloud computing is measured service which suggests that cloud computing systems use metering capabilities and associated metrics to automatically regulate and optimize resource usage at some level of abstraction appropriate to the type of service. Type of service includes storage, processing, bandwidth, and active user accounts and other similar types. The consumer can monitor, control, and obtain reports on resource usage. Such monitoring provides transparency for both the provider and consumer of the utilized service. A vital characteristic of cloud computing is measured service. Published online 11-Feb-2019 infrastructure which is a collection of hardware and software to enable the five essential characteristics discussed above [20]. The cloud infrastructure is both the physical and the abstraction layer of cloud computing where physical layer is the hardware on which cloud computing runs, and the abstraction layer consists of software that manages the cloud and its essential characteristics [20]. Understanding the service models and the infrastructure is important to implement an IT governance framework for information security. The diagram below, adopted from Schouten [24], shows the three service delivery models and the management responsibility of the customer compared to the management responsibility of the cloud vendor. Therefore, due to the unique characteristics of cloud computing, information stored in cloud computing is susceptible to additional security threats that traditional onpremises computing does not face. The public cloud computing services have their specific security issues, which are different from traditional IT technology [12]. The organizations considering cloud computing for their IT needs must first understand the factors that lead to cloud adoption. The literature on cloud computing reports several challenges towards the adoption of cloud computing. Stieninger, et al. [22] investigated the factors that are important contributors to the attitude towards cloud computing adoption. They found that compatibility, relative advantage, security and trust, as well as a lower level of complexity contribute positively to attitude towards cloud adoption. Additionally, Right Scale Inc. [15] found that the top challenges to cloud computing in 2018 reported by the respondents to its survey are security and spend; 77% considered security a challenge while 76% saw cloud spend a challenge, and enterprises experienced more challenges overall than small and medium businesses. Reports such as these point to the need for a structured control mechanism, such as IT governance, towards cloud computing. This paper will limit the application of IT governance to security. Cloud Service Delivery Models. Before applying the IT governance framework, it is helpful to look at different service models that are available for cloud computing. Looking at different models allows customization of the information security governance for each model of the cloud computing service. Three service models are available for cloud computing. These models are Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) [20, 23]. The three service models need not be orthogonal in a given deployment, and a given deployment can contain one or more of the service delivery models. Each of these service models ultimately uses cloud computing Copyright © Salman M. Faizi, 4 Shawon S. M. Rahman 2019 Figure 2. Cloud Service Delivery Models The diagram above also shows the amount of control the client has in each cloud service delivery model. On-premises computing provides enterprises complete control over assets and information. When addressing information security in cloud computing, the main difference is an enterprise’s loss of control, and therefore, loss of governance it has over assets and information [25]. Thus, governing information security to guard against the security threats in a cloud computing environment requires controlling the parts of the cloud computing environment under client control and collaboration with the cloud computing vendor to manage the parts that the vendor manages. IV. SECURITY THREATS IN CLOUD COMPUTING This section discusses major cloud computing security concerns. Similar to traditional on-premises computing, cloud computing presents security threats. The diagram below shows various areas from where cloud security threats can emerge. Four categories represent the major security concerns in cloud computing: (a) software security, (b) infrastructure ISSN (Print): 2204-0595 ISSN (Online): 2203-1731 IT in Industry, vol. 7, no.1, 2019 Published online 11-Feb-2019 security, (c) storage security, and (d) network security [26]. Next, we discuss each of these categories of major security concerns. can result during security requirements definition, conceptual design creation, following poor coding practices, improperly deploying software, or introducing a security flaw during maintenance or updating. Thus, it follows that policies, processes, and procedures must cover all phases of software development for including security. Often, software developers do not comply with secure programming practices. Many software application security flaws result due to the developer's failure to follow secure coding practices [30]. It is much more cost effective to prevent security flaws in an application than to cure them later. The view remains among software developers that security should be added after the development of the application ends. Even during training in software development curricula in universities, secure coding practices are taught as an elective towards the end of the educational program, and this practice further reinforces the view that software security is a feature that is added later [31]. A way to overcome this mentality is to provide policies, procedures, and processes for increasing secure software development. For example, a policy could require software developers to use statistic software analysis tools which can detect many vulnerabilities in the software code [30]. The management team can require software developers to use such tools and provide them training to properly configure them for effective detection of application security flaws. Figure 3. Cloud Computing Security Domains A. Software Security B. Infrastructure Security The software security risk is due to unaddressed security during development. Software applications face unique challenges and security threats. In 2009, a study found that cyber-attacks on internet web applications made up more than 60% of the total attacks on the internet [27]. However, things have only gotten worse in these areas. Cisco Systems [28] reported that in 2017, 64% of all denial of service attacks targeted applications. The attackers specifically target applications because the network layer has increased protection leaving less room for exploitation. The increased attacks on the applications need the increased protection of the application by removing security flaws in them. Infrastructure security applies to both virtual and physical infrastructure. The objective of infrastructure security to establish trust in the infrastructure [26]. Infrastructure is the foundational element in cloud computing, and it consists of physical and virtual resources. Virtual resources include virtual machines (VMs) that provide for the movement, storing, processing, and analysis of data in cloud computing. Multiple VMs can run on a single physical server to enable multitenancy. VMs are vulnerable to security risks and pose a threat to the security and privacy of cloud computing [32]. An erroneous deployment of a VM can result in a lack of isolation between other VMs on the same server leading to data leakage and cross-VMs attacks [26]. Specific VM attacks can compromise customer data. Some VM attacks include (a) a cross-VM side channel attack, which can allow a hacker to extract cryptographic keys, resource usage, and other information, (b) VM creation attacks, where malicious code is placed in VM to be replicated to other VMs at creation time, (c) VM migration and rollback attacks, where an attacker exploits VM’s vulnerability during transfer between physical machines, and (d) VM scheduler based attacks occur when an attacker attempts to steal resources by exploiting the VM scheduler [33]. Additionally, attackers can exploit VM ISSN (Print): 2204-0595 ISSN (Online): 2203-1731 The top ten security attacks experienced by applications include injection, broken authentication, sensitive data exposure, XML external entities (XXE), broken access control, security misconfiguration, cross-site scripting (XSS), insecure deserialization, using components with known vulnerabilities, and insufficient logging and monitoring [29]. No stage of software development is immune from exposure to security flaws. The OWASP Foundation [27] states that security flaws can be injected into the software during any stage of the software development lifecycle. Security flaws Copyright © Salman M. Faizi, Shawon S. M. Rahman 2019 5 IT in Industry, vol. 7, no.1, 2019 monitoring tools used to monitor VMs due to their nature of being a central control point [26]. VMs are part of infrastructure security, and they pose a security risk to a cloud computing environment. There are other security risks present in the category of infrastructure security. Electronic access control systems used to negotiate client authentication via the federation protocol of Security Assertion Mark-up Language (SAML) which contains authentication credentials [34]. In this case, an attacker can eavesdrop on a message even if it is digitally signed allowing an attacker to target random machines while masquerading as legitimate users. Furthermore, a simple network management protocol (SNMP) server, which is used to collect data from various devices, is susceptible to attacks given the cryptographic design of SNMP [26]. The vulnerabilities in the infrastructure expose cloud computing to severe security risks. Thus, it is critical that organizations using cloud computing verify that the infrastructure is secure. C. Storage Security Cloud computing deals extensively with data; data are transferred, processed, and stored in the cloud. Global data center traffic is growing exponentially and is expected to reach 10.4 zettabytes by 2019 with 83% of the data coming from the cloud [35]. Such data quantities in the cloud require storage security. Since cloud computing customers are physically separated from their data, they experience a lack of control [32]. Thus it is important that steps are taken to ensure storage security in cloud computing. Additionally, cloud service providers store data in their data centers in a highly redundant fashion, and while the redundancy provides higher availability of the data, it also gives hackers an additional opportunity to steal sensitive data [19]. An attacker may steal data in several ways, but we consider two types of data storage attacks. The two data storage attacks are (a) data scavenging and (b) data deduplication [33]. Data scavenging occurs during data deletion which marks data as deleted but data are not completely removed from the physical storage devices; consequently, an attacker can steal data that is not completely removed from the physical storage devices. Chandna, et al. [36] describe symmetric key cryptography as an effective countermeasure against data scavenging. The next data storage attack is data deduplication. Data deduplication allows for minimizing storage and bandwidth requirement, and it makes it possible to identify files and their content. An attacker can create a communication channel to steal the content of the files being deduplicated. Both inside and outside adversaries can employ data deduplication as a means to mount a storage attack [35]. Copyright © Salman M. Faizi, 6 Shawon S. M. Rahman 2019 Published online 11-Feb-2019 Insiders can cause data breaches since the cloud providers typically make data available to the insiders unencrypted, and insiders can exploit the data either erroneously or maliciously. Microsoft Azure [37] attempts to protect data from insider adversaries by severely limiting the duration for which an insider can access data storage and by providing supervision even for the short duration of time. Additionally, data loss can occur due to faults in the data storage service; for example, in 2013 an outage at Dropbox lasted over ten hours [35]. Apart from data loss caused by the failure of cloud computing storage service, a malicious insider can cause data loss intentionally to cause harm. Thus, data storage attack can occur due to the activities of the inside adversaries. Similar to the insider adversaries, outsiders also pose serious security threats to data storage through data deduplication procedures. Shin, et al. [35] describe several methods that outsiders use to attack data through deduplication. Attackers use side channels to identify the presence of specific data and their content. Outsiders can gain unauthorized access to the data stored in cloud computing by exploiting the hash value sent to the cloud computing storage by the client-side deduplication systems. Outsiders can abuse cloud storage service by establishing covert channels to the outside world or using a content delivery network (CDN). Additionally, outsiders can mount attacks on the cloud computing storage by data poisoning which employs the data tags sent as part of data uploaded as search strings. Countermeasures against storage attacks help organizations keep their data safe. Encryption of data during transfer, storage, and processing is an effective countermeasure to prevent theft and unauthorized access to the data [32]. Encryption ensures the safeguarding of the data by employing encryption keys. A public cloud such as Microsoft Azure, for example, provides a secure key vault to safeguard the encryption keys [38]. Cloud computing customers can use a secure key vault to keep their keys in a safe place to prevent the keys from falling into the wrong hands. Furthermore, frameworks such as C2Detector are effective in detecting covert back-channels [39]. Other countermeasures include managing insiders’ access to customer data stored within cloud computing. D. Network Security Cloud computing components are interconnected via a network, and access to cloud computing from the outside world is a network. Attackers can exploit the vulnerabilities of the network to steal sensitive and private data; moreover, the network attacks fall into three categories [33]. The three main ISSN (Print): 2204-0595 ISSN (Online): 2203-1731 IT in Industry, vol. 7, no.1, 2019 Published online 11-Feb-2019 categories of network attacks are (a) port scanning, (b) botnets, and (c) spoofing attacks. These three categories of attacks allow an attacker to exploit a range of vulnerabilities in the cloud computing network. The first major type of network attack, port scanning, is when an attacker scans ports on a server to target vulnerabilities in the services running on the ports [32]. Port scanning can lead to denial of service. However, intrusion detection systems and firewalls can provide some level of protection against port scanning attacks [40]. Other methods to thwart denial of service attacks include a method Microsoft Azure uses to scrub traffic at the network edge before it reaches the critical services and customer servers [37]. While it may not be possible to prevent all port scanning attacks, organizations using cloud computing must take measures to guard against such attacks. The second major type of network attack is the botnet attack which occurs when a botnet steals data from a host machine and transfers them to a remote bot-master. Botnet creates a command and control system where the bot-master communicates with several infected machines, serving as zombies, which in turn can allow a hacker access to the network inside a firewall. Command and control servers are centralized servers that send minimally sized commands to the zombies to steal sensitive data or to cause damage [41]. The botnet attacks can cause serious harm and may even be difficult to detect. Individual machines are infected with botnet software when they access the network via Wi-Fi in public places such as coffee shops, airports, and hotels [42]. The users of the target machine may not realize that a malicious software agent was installed on their machine, and then without realizing it, they bring the infected machine inside the corporate firewall. Protecting against botnet involves tracking the bot-master by intercepting the communication between the infected machines and the botmaster. Incidents involving botnets have caused large-scale damage. For example, the Ramnit botnet, which infected 3.2 million computers, was detected and removed in February 2015 but it appeared again soon afterward to attack banks and commercial operations in Canada, Australia, the United States, and Finland [43]. Botnets pose a serious threat to cloud computing, and the organizations adopting cloud computing must take measures to protect against them. The third major type of network attack is the spoofing attack. A spoofing attack occurs when the attacker impersonates network entities to cause harm to the network [33]. The main objective of a spoofing attack is to steal sensitive data from the authorized user to attack the network hosts to spread malware or circumvent access control [44]. Some examples of spoof attacks are provided next. A domain Copyright © Salman M. Faizi, Shawon S. M. Rahman 2019 7 name server (DNS) spoofing attack may direct all traffic to a DNS server to the attacker’s system. Another example of a spoofing attack involves replacing the internet protocol (IP) address with a forged IP address in a network packet. For virtual machines, an address resolution protocol (ARP) attack can cause the attacker to intercept packets to other VMs. An intrusion detection system can protect against spoofing attacks [45]. All networks attacks have a potential of causing damage to cloud computing and organizations adopting cloud computing must be particularly vigilant against these attacks. V. IT GOVERNANCE AND CLOUD COMPUTING Cloud computing presents several potential benefits to organizations in both the private and public sector. However, there are risks associated with cloud computing that organizations must address [14]. Organizations must implement controls, such as IT governance, to address the risks and to ensure that IT and cloud computing adds business value. When IT operations are aligned with the business strategies, IT delivers business value. Over the past three decades studies have consistently found that Business to IT alignment is a persistent problem; however, IT governance is a way to achieve such an alignment [46]. Without the BusinessIT alignment, IT cannot deliver what the business needs and the business cannot deliver what the customers need. The diagram below provides a visual image showing how the governance of information security in cloud computing leads to various benefits. Figure 4. Cloud Computing Security Governance Outcomes IT governance manages the risks associated with IT projects and practices [47]. Thus, in the case of cloud computing, IT governance is vital in achieving Business-IT alignment and ISSN (Print): 2204-0595 ISSN (Online): 2203-1731 IT in Industry, vol. 7, no.1, 2019 Published online 11-Feb-2019 managing the traditional risks associated with the on-premises computing as well as the new risks associated with cloud computing. IT governance plays an essential role in how organizations utilize information technology (IT). The two key objectives of IT governance are to guide the use of IT to supplement business value and to manage the risks associated with IT [14]. Traditionally, organizations applied IT governance to onpremises computing which included software that ran on computers located within the premises of the organizations. However, increasingly organizations are leveraging cloud computing for their IT needs to remain competitive and innovative [48]. Similar to on-premises computing, organizations can also apply IT governance to cloud computing since business value creation through IT and managing IT risks apply just as much to on-premises computing as it does to cloud computing. IT governance is a complex undertaking, but, fortunately, there are guidelines developed by several IT governance bodies. Organizations can use these guidelines to supplement their existing IT governance; furthermore, the IT governance bodies have updated their guidelines to include IT governance of cloud computing because adoption of cloud computing often changes the risk profile of an organization [49]. Organizations can leverage the guidelines developed by the IT governance bodies to manage the new risk that comes with the adoption of cloud computing as well as other risks inherent to IT. Below is a list of some of the prominent IT governance bodies providing IT governance guidelines for cloud computing. Table 1. Standards Bodies and Cloud Computing Security Governance Standards Body Description The European Provides a guide for assessing the Network and security risks and benefits of using Information Security cloud computing. The risks are used as Agency (ENISA) a starting point for the introduction of an information assurance framework based on the ISO 27000 family [50, 51]. International ISO provides consensus-based Standards standards and guidelines for IT Organization (ISO) governance. Some ISO standards, such as ISO 27001, apply to cloud computing [52]. The Committee of A combined initiative of five Sponsoring organizations from the private sector Copyright © Salman M. Faizi, Shawon S. M. Rahman 2019 8 Organizations of the develops guidance that applies to IT Treadway governance [53]. Commission (COSO) Information Systems Provides guidance, benchmarks, and Audit and Control tools for enterprises that use Association information systems. ISACA (ISACA) developed a well-known IT governance framework known as COBIT. COBIT can be applied to cloud computing [14]. ISACA [54] document “IT Control Objectives for Cloud Computing” describes the COBIT framework [14][54]. The Cloud Security Provides guidelines on security issues Alliance (CSA) related to cloud computing including governance and enterprise risk management [55]. National Institute of A governmental agency within the Standards and Federal government in the United Technology (NIST) States, NIST is a non-regulatory agency [56]. A comparison of the frameworks for information security governance in cloud computing, mentioned above, will help both the client and the vendor determine the right framework for them. Rebollo, et al. [25] provide guidance for comparing information security governance frameworks. They recommend that the comparison criteria should include policies and processes adoption (PPA), control and audit (CA), and service level agreement (SLA). A brief description of the three criteria is provided below. When transitioning from on-premises computing to cloud computing, an enterprise should re-evaluate its security policies and processes in partnership with the cloud vendor. PPA represents the modifications to security policies and processes that enterprises transitioning from on-premises computing to cloud computing must make. CA represents the additional security controls that enterprises must establish to control the processes running in the cloud outside of their organizations. SLA contains the responsibilities and accountabilities between the cloud vendor and the cloud client. The table above contains a comparison of the frameworks along the criterion of Rebollo, et al. [25] and some of their data. Since each cloud service delivery model offers a range of controls exercised by cloud clients and vendors, it is important ISSN (Print): 2204-0595 ISSN (Online): 2203-1731 IT in Industry, vol. 7, no.1, 2019 Published online 11-Feb-2019 to select the right cloud computing solutions. The CSA furnishes a method for evaluating the tolerance of cloud computing solutions for IT assets belonging to organizations Table 2. Comparison of Cloud Computing Security Governance Frameworks [55]. ENISA [50] provides a model for selecting cloud computing solutions that are resilient and secure. ISACA [54] provides a four-step process to help decide the use of cloud computing: Service model, deployment model, and cloud provider or vendor. NIST [56] describes a decision framework for selecting a cloud computing solution which includes provisioning and managing of the cloud computing solution as well. Selecting a cloud computing solution is the first step in using cloud computing. Thus, governance models should include guidance for selecting a cloud computing solution. A. Extending Existing IT Governance to Cloud Computing The standards bodies also provide general guidance for governance. Most of the standards bodies recommend adopting existing IT and security governance frameworks to cloud computing [14]. ISACA [54] describes the application of COBIT 4.1 to cloud computing. COSO [53] recommends applying the COSO ERM framework to cloud computing. ISO is developing a standard for cloud computing, and CSA has a reference architecture for a trusted cloud; both standards contain information security governance for cloud computing [14]. Applying the existing frameworks to cloud computing makes sense since the organizations would already be familiar with them and adding the cloud computing component would be a smaller net new addition compared to introducing a new governance framework. Thus, general guidance is to apply the existing IT and security frameworks to cloud computing. Copyright © Salman M. Faizi, Shawon S. M. Rahman 2019 9 In particular, organizations must emphasize (a) establishment of business goals for cloud computing and (b) roles and responsibilities for each level of management. First, establishing business goals and objectives for cloud computing will align cloud computing adoption with business value. ISACA [54] provides ways for organizations to come up with business goals and objectives for cloud computing. Often having an end goal provides a path to achieving that goal. Next, organizations must emphasize defining roles and responsibilities. Proper governance requires a clear definition of roles and responsibilities [14]. The roles and responsibilities can be an extension of the pre-existing roles and responsibilities that an organization uses for on-premises computing. A clear definition of roles and responsibilities will help eliminate gaps in understanding of authority, responsibilities, and accountabilities. COSO [53] provides a list of responsibilities for various managers, the board of directors, the chief executive officer, chief information officer, chief legal officer, and chief internal auditors. Additionally, COSO provides a list of considerations for managers and the board of directors when transitioning to cloud computing. Thus, a clear definition of roles and responsibilities adds to the effectiveness of information security governance of cloud computing. ISSN (Print): 2204-0595 ISSN (Online): 2203-1731 IT in Industry, vol. 7, no.1, 2019 B. Risk Management The next general governance guideline is regarding risk management. Since cloud computing introduces additional risks for organizations, they must implement a risk management system [57]. The cloud computing governance standards provide several methods for capturing risk. ENISA [50] describes using SWOT analysis and a standards-based risk assessment process for evaluating risks associated with cloud computing security. CSA [55] has a framework to identify and evaluate risks in cloud computing that an organization faces. CSA has recommendations consisting of thirteen different domains for managing cloud computing risks. COSO [53] provides an enterprise risk management framework to help decide a response to risks. NIST [56] describes various risks associated with cloud computing security and provides recommendations on an appropriate risk response. A risk management system will not only help organizations determine a response to risks captured for cloud computing but also develop an effective risk management capability. Published online 11-Feb-2019 security risks when compared to traditional on-premises computing. Depending on the cloud service delivery model used, a client organization will need to adjust its governance depending on the control they are allowed on cloud computing resources. For example, IaaS provides more resources that a client must manage when compared to other cloud service delivery models. Organizations considering adopting cloud computing may find it challenging to address its additional risks. Various standards bodies, as identified above, provide best practices and guidance on where to start and what to consider. VI. BEST PRACTICES IN IT GOVERNANCE Researchers have highlighted several best practices in implementing governance. The best practices include involvement of business management, management of data quality, combined business and IT focus, and education of users and managers [58]. The best practices also include ethical and socially responsible corporate behavior, an effective corporate communications system, and corporate performance measurement. Taking these best practices one by one, we can further analyze and evaluate them. C. Compliance Organizations must ensure compliance using contracts. ENISA [50] has a list of areas for organizations to consider when evaluating agreements with cloud vendors, and it provides a method for performing legal analysis as it relates to the usage of cloud computing. These agreements could include SLAs, memoranda of understanding, and end-user agreements. ENISA provides a three-step methodology for performing legal analysis, and it provides a list of six questions regarding an organization’s usage of cloud computing. D. Controls Organizations can employ best practices for implementing controls in cloud computing. ISACA [54] provides control objectives based on COBIT 4.1 for cloud computing. CSA [55] provides a matrix of control objectives which is helpful in dealing with various requirements as they apply to cloud computing. These requirements may include HIPAA, ISO 27001, NIST SP800-53 R3, FedRAMP Security Controls, PCI DSS v2.0, and others [14]. Based on the industry an organization operates within, these requirements can be vital to their operations. ENISA [50] developed an assurance framework for cloud computing. The framework can help achieve control objectives. The general governance guidelines provide organizations a means to adopt cloud computing to their specific business needs. Cloud computing contains additional information Copyright © Salman M. Faizi, 10 Shawon S. M. Rahman 2019 First, the involvement of business management is crucial in the IT governance process. After all, it is business management that is ultimately the consumer of many services delivered by IT. The involvement of business management will ensure that the business can gain a competitive advantage through its investment in IT [7]. Alignment between IT and business will ensure that IT delivers what the business needs and that IT gets its requirements unambiguously stated from the business. Therefore, it is essential that business stakeholders be involved in the IT governance process. Second, the management of data quality is an essential element required by any organization. Today, data contain the intellectual property, operational information, contractual obligations, and employee personal information to name a few. Managing and maintaining data quality is a key initiative for most organizations. Information technology governance must ensure that this crucial area is covered adequately in its practices. Organizations must categorize data according to its sensitivity, and data that is sensitive must be protected using mechanisms such as strong encryption while being transported to cloud computing as well as during storage. Therefore, the management of data quality is an essential element of information technology governance. Third, the combined focus on business and IT is an important best practice of information technology governance. Organizations must understand IT’s role as a service provider, not a servant; therefore, they must be inclusive of their IT as a ISSN (Print): 2204-0595 ISSN (Online): 2203-1731 IT in Industry, vol. 7, no.1, 2019 Published online 11-Feb-2019 true and valued partner [59]. A servant organization will do whatever it is asked to do while a service provider will be an equal partner in a mutually beneficial arrangement. A service provider enhances the business value chain while increasing its capabilities. Moreover, just like there is a business strategy, IT must also have a service strategy. Therefore, organizations must aspire to develop a combined focus of IT and business with both sides being equal partners. Fourth, the education of users and managers is essential. Education is necessary because when it comes to providing quality, service education and training are essential [60]. The necessity of training is evident because training the users and managers lead to better understanding, better understanding leads to better governance, better governance leads to better firm performance, and better performance is what the employees, managers and the stockholders or owners of an organization want. Thus, it is crucial, to include training and education among the best practices of information technology governance. Fifth, organizations must promote ethics. The presence of ethics and a culture of compliance in IT increases the overall effectiveness of IT governance [5]. Therefore, organizations should promote ethics and foster a culture of compliance. Sixth, corporate communication systems support is essential. The presence of corporate communication systems support significantly improves the overall success of IT governance [5]. Such a communication system allows for critical communication to take place, for ideas to permeate, and rich discussions to ensue. Consequently, organizations should invest in effective corporate communications systems. The sixth, and final, best practice is a corporate performance measurement system. Research has shown that a corporate performance measurement system moderates the level of effective IT governance; however, the impact could even become negative given an incorrect use of the measurement system [5]. Organizations should deploy a performance measurement system and train the users on its proper use. Employing the best practices of IT governance and applying them to information security governance, organizations can significantly improve their IT governance implementation. IT governance will help best serve the organization. VII. INFORMATION SECURITY GOVERNANCE Organizations need information security to protect information. Since information security contains the triad of people, process, and technology, an information security governance framework must include all three elements [9]. Organizations must utilize a comprehensive approach to information security. A comprehensive approach is where the Copyright © Salman M. Faizi, Shawon S. M. Rahman 2019 11 management of an organization develops and enforces information security mechanisms, such as policies and technical security procedures with which employees interact and include in their working procedures [9]. Technology such as passwords for access control, monitoring, firewalls, logging, and other similar equipment can only prevent a limited number of security incidences. A blend of measures is required to protect information by securing systems against harm; therefore, organizations must deploy processes to handle granting the user access to computing resources, training, leadership discipline, compliance to regulations and policies about information security [9]. Increasing the reach of information has required an increased focus on people and processes of the trifecta of people, process, and technology. IT governance is a way to focus on people and processes. Therefore, to increase the security of information, the principles of IT governance must be applied to develop information security governance focused on people, process, and technology. The focus of information security has gradually moved from technology only to technology and governance. Initially, the discipline of information technology was limited to technical experts and technical solutions; however, gradually, technical experts determined that without management support, IT operations and business strategies could not align [9]. Thus, technical protection mechanisms have continued in parallel with management involvement. Organizations now include information security and its management in their organizational structure. Organizations can only address information security risks facing them with a governance framework containing adequate controls for their executives to direct employee behavior[9]. Consequently, a framework for information security governance allows organizations to address human behavior and accountability and the implementation of processes in addition to technology-based solutions. An information security framework should include comprehensive security for an organization’s information. Moreover, researchers have identified components that make up the comprehensive security of information, and how should the organizations go about implementing them [9]. Researchers have defined components of information security as the principles that enable assessing risk, implementing technical controls, creating an information security policy, and increasing information security awareness. These mechanisms can be included in an information security governance framework where the relationship between the mechanisms is established [9]. Thus, organizations can gain an understanding of the comprehensive requirements of information security through an information security governance framework and its components. ISSN (Print): 2204-0595 ISSN (Online): 2203-1731 IT in Industry, vol. 7, no.1, 2019 Published online 11-Feb-2019 IX. CONCLUSION VIII. INFORMATION SECURITY COMPONENTS FOR IT GOVERNANCE This paper selects information security components from various existing information security approaches. Research has listed four well-established approaches aimed at addressing all aspects of information security governance. These approaches include the ISO 17799 standard, PROTECT (an acronym for Policies, Risks, Objectives, Technology, Execute, Compliance, and Team), Capability Maturity Model, and Information Security Architecture. Researchers, using these four approaches, have derived a comprehensive list of information security components. Implementing these information security components will alter the way people conduct their day-to-day IT-related activities for any given organization. Furthermore, an important consideration is that while organizations do not change on their own, people change, and people, in turn, change an organization [9]. Organizations must pursue change management and take steps to protect the information assets of an organization due to change. Organizations must include information security components in such a way that employees can conduct their day-to-day responsibilities while successfully incorporating the information security governance. The information security components mentioned above are the basis for a sound information security governance framework. A successful information security governance framework must include these components [9]. These information security components are listed below. Information security needs executive sponsorship. Executive sponsor can help obtain a commitment from an organization’s board and its management team [9]. With an active commitment, responsibility, and accountability of the board and the management team, information security becomes an active discussion in meetings of the board and the management team; therefore, this brings greater involvement of the board of directors, management team, and business process owners [61]. Increasingly, the directors and the executives of an organization are expected to protect shareholder value. This accountability to protect shareholder value applies to information assets just as it does to any other asset [61]. Such an understanding to protect information at the highest level of an organization leads to a better understanding that information security is essential for the organization’s survival. Therefore, leadership and governance are key to protecting the information asset of an organization. Copyright © Salman M. Faizi, Shawon S. M. Rahman 2019 12 IT governance is a critical discipline to implement for an organization because it helps achieve alignment between IT operations and business strategies. Moreover, since most organizations rely on their IT systems to perform their day-today tasks, it is important that they protect IT systems against information theft or loss using information security governance. Furthermore, organizations must adapt their existing IT governance to include cloud computing. However, to successfully implement IT governance and information security governance, IT organizations must display leadership to promote information security governance, overcome user resistance, and employ a sound ethical framework that assures autonomy from external coercion, nonmaleficence to prevent harm to others, beneficence for providing a net benefit, and implement justice. It is only through these measures that IT governance and information security governance will shine. It is only through practices like the ones highlighted here, can the organization protect their information assets using proven principles of IT governance of information security. REFERENCES [1] A. Buchwald, N. Urbach, and F. Ahlemann, "Business value through controlled IT: Toward an integrated model of IT governance success and its impact," Journal of Information Technology, vol. 29, pp. 128-147, 2014. [2] J. E. Mbowe, S. S. Msanjila, G. S. Oreku, and K. Kalegele, "On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach," Journal of Software Engineering and Applications, vol. 09, no. 12, pp. 601-623, 2016. [3] H. Gangwar and H. Date, "Critical factors of cloud computing adoption in organizations: An empirical study," Global Business Review, vol. 17, pp. 886-904, 2016. [4] B. C. M. A. Nathan, S. Hare, and P. C. M. A. Raju, "Establishing IT governance," (in English), Strategic Finance, vol. 99, no. 8, pp. 62-63, Feb 20182018-07-02 2018. [5] S. Ali and P. Green, "Effective information technology (IT) governance mechanisms: An IT outsourcing perspective," Information Systems Frontiers, vol. 14, pp. 179-193, 2012. [6] J. C. F. Tai, E. T. G. Wang, and H.-Y. Yeh, "A study of IS assets, IS ambidexterity, and IS alignment: the dynamic managerial capability perspective," Information & Management, 2018. [7] K. Jairak and P. Praneetpolgrang, "Applying IT Governance Balanced Scorecard and Importance-performance Analysis for Providing IT Governance Strategy in University," Information Management & Computer Security, vol. 21, pp. 228-249, 2013. [8] J. Magnusson and B. Bygstad, "Why I act differently: studying patterns of legitimation among CIOs through motive talk," Inf. Technol. People, vol. 26, pp. 265-282, 2013. [9] A. A. Ettish, S. M. El-Gazzar, and R. A. Jacob, "Integrating internal control frameworks for effective corporate information technology governance," (in English), Journal of Information Systems and Technology Management: JISTEM, vol. 14, no. 3, pp. 361-370, SepDecSep-Dec 20172018-02-28 2017. [10] R. v. Solms and S. H. B. v. Solms, "Information security governance: Due care," Computers & Security, vol. 25, pp. 494-497, 2006. ISSN (Print): 2204-0595 ISSN (Online): 2203-1731 IT in Industry, vol. 7, no.1, 2019 Published online 11-Feb-2019 [11] R. V. Aguilera, W. Q. Judge, and S. A. Terjesen, "Corporate governance deviance," Academy of Management Review, Article vol. 43, no. 1, pp. 87-109, 2018. [12] Y. C. Zhu, P. Liu, and J. T. Wang, "Enterprise data security research in public cloud computing," Applied Mechanics and Materials, vol. 198199, pp. 435-438, 2012. [13] M. Bayramusta and V. A. Nasir, "A fad or future of IT?: A comprehensive literature review on the cloud computing research," International Journal of Information Management, vol. 36, pp. 635-644, 2016. [14] R. von Solms and M. Willett, "Cloud computing assurance – a review of literature guidance," (in English), Information and Computer Security, vol. 25, no. 1, pp. 26-46, 20172018-08-29 2017. [15] RightScale Inc. (2018). RightScale 2018 state of the cloud report uncovers cloud adoption trends. Available: https://www.rightscale.com/press-releases/rightscale-2018-state-of-thecloud-report [16] J. L. Schnase et al., "MERRA Analytic Services: Meeting the Big Data challenges of climate science through cloud-enabled Climate Analyticsas-a-Service," Computers, Environment and Urban Systems, vol. 61, pp. 198-211, 2017. [17] C. Feijóo, S. Ramos, C. Armuña, A. Arenal, and J.-L. Gómez-Barroso, "A study on the deployment of high-speed broadband networks in NUTS3 regions within the framework of digital agenda for Europe," Telecommunications Policy, 2017. [18] F. Mohammed, O. Ibrahim, and N. Ithnin, "Factors influencing cloud computing adoption for e-government implementation in developing countries," (in English), Journal of Systems and Information Technology, vol. 18, no. 3, pp. 297-327, 20162018-09-30 2016. [19] M. Stieninger and D. Nedbal, "Characteristics of Cloud Computing in the Business Context: A Systematic Literature Review," Global Journal of Flexible Systems Management, Article vol. 15, no. 1, pp. 59-68, 2014. [20] P. Mell and T. Grance, "The NIST definition of cloud computing recommendations of the National Institute of Standards and Technology," NIST Special Publication, vol. 145, p. 7, 2011. [21] A. Jula, E. Sundararajan, and Z. Othman, "Cloud computing service composition: A systematic literature review," Expert Systems with Applications, vol. 41, pp. 3809-3824, 2014. [22] M. Stieninger, D. Nedbal, W. Wetzlinger, G. Wagner, and M. Erskine, "Factors influencing the organizational adoption of cloud computing: A survey among cloud workers," International Journal of Information Systems and Project Management, vol. 6, no. 1, pp. 5-23, 2018. [23] O. Yigitbasioglu, "Modelling the intention to adopt cloud computing services: A transaction cost theory perspective," Australasian Journal of Information Systems, vol. 18, pp. 193-210, 2014. [24] E. Schouten. (2014, 10/14/2018). Cloud computing defined: Characteristics & service levels. Available: https://www.ibm.com/blogs/cloud-computing/2014/01/31/cloudcomputing-defined-characteristics-service-levels/ [25] O. Rebollo, D. Mellado, and E. Fernández-Medina, "A Systematic Review of Information Security Governance Frameworks in the Cloud Computing Environment," Journal of Universal Computer Science, vol. 18, pp. 798-815, 2012. [26] S. Singh, Y. S. Jeong, and J. H. Park, "A survey on cloud computing security: Issues, threats, and solutions," Journal of Network and Computer Applications, vol. 75, pp. 200-222, 2016. [27] The OWASP Foundation, "OWASP Secure Coding Practices Quick Reference Guide," 2010. [28] Cisco Systems, "Cisco Annual Cybersecurity Report,"Available: https://www.cisco.com/c/dam/m/digital/elqcmcglobal/witb/acr2018/acr2018final.pdf?dtid=odicdc000016&ccid=cc0 00160&oid=anrsc005679&ecid=8196&elqTrackId=686210143d34494fa 27ff73da9690a5b&elqaid=9452&elqat=2 [29] The OWASP Foundation, "OWASP Top 10 - 2017: The Ten Most Critical Web Application Security Risks," 2017, Available: Copyright © Salman M. Faizi, Shawon S. M. Rahman 2019 13 [30] [31] [32] [33] [34] [35] [36] [37] [38] [39] [40] [41] [42] [43] [44] [45] [46] [47] [48] [49] https://www.owasp.org/images/7/72/OWASP_Top_102017_%28en%29.pdf.pdf. J. Zhu, J. Xie, H. R. Lipford, and B. Chu, "Supporting secure programming in web applications through interactive static analysis," J Adv Res, vol. 5, no. 4, pp. 449-62, Jul 2014. M. Whitney, H. R. Lipford, B. Chu, and T. Thomas, "Embedding Secure Coding Instruction Into the IDE: Complementing Early and Intermediate CS Courses With ESIDE," Journal of Educational Computing Research, vol. 56, no. 3, pp. 415-438, 2017. A. Singh and K. Chatterjee, "Cloud security issues and challenges: A survey," Journal of Network and Computer Applications, vol. 79, pp. 88115, 2017. M. A. A. Khan, "A survey of security issues for cloud computing," Journal of Network and Computer Applications, vol. 71, pp. 11-29, 2016. S. Iqbal et al., "On cloud security attacks: A taxonomy and intrusion detection and prevention as a service," Journal of Network and Computer Applications, vol. 74, pp. 98-120, 2016. Y. Shin, D. Koo, and J. Hur, "A survey of secure data deduplication schemes for cloud storage systems," ACM Computing Surveys, vol. 49, no. 4, pp. 1-38, 2017. S. Chandna, R. Singh, and F. Akhtar, "Data scavenging threat in cloud computing," International Journal of Advances In Computer Science and Cloud Computing, vol. 2, no. 2, pp. 106-111, 2014. Microsoft Azure. (2018, 10/6/2018). Azure DDoS Protection. Available: https://azure.microsoft.com/en-us/services/ddos-protection/ D. Plastina. (2015). Azure Key Vault—Making the Cloud Safer. Available: http://blogs.technet.com/b/kv/archive/2015/01/08/azure-keyvault-making-the-cloud-safer.aspx. J. Wu, L. Ding, Y. Wu, N. Min-Allah, S. U. Khan, and Y. Wang, "C2detector: A covert channel detection framework in cloud computing," Security & Communication Networks, Article vol. 7, no. 3, pp. 544-557, 03// 2014. P. Mishra, E. S. Pilli, V. Varadharajan, and U. Tupakula, "Intrusion detection techniques in cloud environment: A survey," Journal of Network and Computer Applications, vol. 77, pp. 18-47, 2017. T. B. Waghela, "Botnet: Switching c & c servers using RaspberryPI," vol. 14, pp. 100-104, 2016. L. Ablon and M. Libicki, "Hackers' Bazaar: The Markets for Cybercrime Tools and Stolen Data," Defense Counsel Journal, vol. 82, pp. 143-152, 2015. K. Huang, M. Siegel, and S. Madnick, "Systematically understanding the cyber attack business: A survey," ACM Computing Surveys, Article vol. 51, no. 4, pp. 1-36, 2018. C. Jadala Vijaya, A. Tingilikar, and B. Prathusha, "Challenges and defenses for network and cloud security from risks, threats and attacks in cloud computing," (in English), International Journal of Advanced Research in Computer Science, vol. 8, no. 9, Nov 20172017-12-27 2017. M. Mavani and K. Asawa, "Modeling and analyses of IP spoofing attack in 6LoWPAN network," Computers & Security, vol. 70, pp. 95-110, 2017. J. Luftman, K. Lyytinen, and Z. Tal ben, "Enhancing the measurement of information technology (IT) business alignment and its influence on company performance," (in English), Journal of Information Technology, vol. 32, no. 1, pp. 26-46, Mar 20172018-04-24 2017. Z. Alreemy, V. Chang, R. Walters, and G. Wills, "Critical success factors (CSFs) for information technology governance (ITG)," International Journal of Information Management, vol. 36, pp. 907-916, 2016. H. Hassan, M. Herry, M. Nasir, and N. Khairudin, "Cloud computing adoption in organisations: Review of empirical literature," (in English), vol. 34, 2017 2017. A. Prasad and P. Green, "Governing cloud computing services: Reconsideration of IT governance structures," International Journal of Accounting Information Systems, vol. 19, pp. 45-58, 2015. ISSN (Print): 2204-0595 ISSN (Online): 2203-1731 IT in Industry, vol. 7, no.1, 2019 Published online 11-Feb-2019 [50] ENISA. (2018). About ENISA. Available: https://www.enisa.europa.eu/about-enisa [51] E. Cayirci, A. Garaga, A. Santana De Oliveira, and Y. Roudier, "A risk assessment model for selecting cloud service providers," (in English), Journal of Cloud Computing, vol. 5, no. 1, pp. 1-12, Sep 20162017-0209 2016. [52] ISO. (2018). About ISO. Available: www.iso.org/iso/home/about.htm [53] COSO. (2018). Welcome to COSO. Available: www.coso.org/ [54] ISACA. (2018, 10/3/2018). What we offer & whom we serve. Available: http://www.isaca.org/About-ISACA/What-We-Offer-Whom-WeServe/Pages/default.aspx [55] CSA. (2018). About Cloud Security Alliance. Available: https://www.cloudsecurityalliance.org/about/ [56] NIST. (2018). NIST general information. Available: www.nist.gov/public_affairs/general_information.cfm [57] J. Webb, A. Ahmad, S. B. Maynard, and G. Shanks, "A situation awareness model for information security risk management," Computers & Security, vol. 44, pp. 1-15, 2014. [58] P. P. Tallon, R. V. Ramirez, and J. E. Short, "The Information artifact in IT governance: Toward a theory of information governance," Journal of Management Information Systems, vol. 30, pp. 141-178, 2013. [59] D. Roberts, Unleashing the Power of IT: Bringing People, Business, and Technology Together, 2nd Edition [VitalSource Bookshelf version], 2014. [Online]. Available: https://bookshelf.vitalsource.com/books/9781118824528. [60] C. Low and Y. Chen, "Criteria for the evaluation of a cloud-based hospital information system outsourcing provider," Journal of Medical Systems, vol. 36, pp. 3543-3553, 2012. [61] M. Gerber and R. v. Solms, "Information security requirements – Interpreting the legal aspects," Computers & Security, vol. 27, pp. 124135, 2008. Copyright © Salman M. Faizi, Shawon S. M. Rahman 2019 14 ISSN (Print): 2204-0595 ISSN (Online): 2203-1731