Problems of Designing Complex Information Security System for Cloud Resources in the Republic of Belarus
Abstract
The influence of cloud computing on the information security of information resources during their transfer or deployment on cloud platforms is considered. The relevance of the problem of protecting information resources on cloud platforms, including for the Republic of Belarus, and the need to build an integrated system for protecting cloud resources are determined. The main features of cloud computing, affecting the security of information resources, are highlighted, such as: a model of joint responsibility of the provider and cloud clients to ensure information security; protection of the cloud platform infrastructure by the provider; the use of a reliable subsystem for identifying cloud clients; reliable isolation of virtual resources of cloud clients; the need for cloud clients to re-architect their applications and use encryption; Interaction between the cloud provider and clients when organizing audit procedures, incident response and implementing identification and authentication procedures in deployed services. General approaches to the implementation of an integrated information security system for cloud resources are proposed.
About the Authors
V. P. KochynBelarus
Ph.D., Head of the Information Technology Department
4 Independence Ave., 220030 Minsk
A. V. Shantsou
Belarus
Ph.D. student
4 Independence Ave., 220030 Minsk
References
1. Statistika oblachnykh vychisleniy i fakty [Cloud computing statistics and facts]. Available at: https://hostingpill.com/ru/статистика-облачных-вычислений (accessed: 20.01.2021) (in Russian).
2. Oblachnaya bezopasnost: obzor otcheta Spotlight [Cloud Security: Spotlight Report Overview]. Available at: https://www.it-grad.ru/blog/oblachnaya-bezopasnost-samoe-interesnoe-iz-otcheta-spotlight-report. (accessed: 17.01.2021) (in Russian).
3. Prikaz operativno-analiticheskogo tsentra ot 28.03.2014 № 26 [Order of the Operational Analytical Center dated 28.03.2014 No. 26] «Ob utverzhdenii Polozheniia ob osnovakh ispol'zovaniia gosudarstvennymi organami i organizatsiiami respublikanskoi platformy, deistvuiushchei na osnove tekhnologii oblachnykh vychislenii» s izmeneniiami, utverzhdennymi prikazom operativno-analiticheskogo tsentra ot 16.03.2020 № 80 (in Russian).
4. Ukaz Prezidenta Respubliki Belarus' ot 23.01.2014 № 46 [Decree of the President of the Republic of Belarus dated January 23, 2014 No. 46] «Ob ispol'zovanii gosudarstvennymi organami i inymi gosudarstvennymi organizatsiiami telekommunikatsionnykh tekhnologii» s izmeneniiami, utverzhdennymi Ukazami Prezidenta Respubliki Belarus' ot 31.12.2015 № 542, ot 16.12.2019 № 461 (in Russian).
5. Vishnjakov V.A., Gondag Saz M.M. Models and means of user authentication in corporate management systems and cloud computing. Doklady BGUIR [BSUIR reports]. 2016; 3(97): 111-114 (in Russian).
6. Vishnjakov V.A., Murashko E.A., Prokof'ev S.V., Marychev D.V. Enterprise network intrusion prevention system using virtualization technologies. Materialy 54 nauchnoy konferentsii aspirantov. magistrantov i studentov «Infokommunikatsii» BGUIR [Materials of the 54th Scientific Conference of Postgraduates, Undergraduates and Students «Infocommunications» BSUIR]. 2018 (in Russian).
7. Vishnjakov V.A., Murashko E.A., Petkevich D.A., Marychev D.V. Enterprise network intrusion detection system using virtualization technologies. Materialy 54 nauchnoy konferentsii aspirantov. magistrantov i studentov «Infokommunikatsii» BGUIR [Materials of the 54th Scientific Conference of Postgraduates, Undergraduates and Students «Infocommunications» BSUIR]. 2018 (in Russian).
8. Olizarovich E.V., Brazhuk A.I. Conceptual framework of analysis of information security models of cloud systems of the class «Infrastructure as a Service». Doklady BGUIR [BSUIR reports]. 2019; 6(124): 12-20 (in Russian).
9. Otchet ob oblachnoy bezopasnosti Check Point software technologies [Check Point software technologies cloud security report]. Available at: https://pages.checkpoint.com/2020-cloud-security-report.html. (accessed: 12.01.2021).
10. Rukovodstvo po bezopasnosti dlya kriticheskikh vazhnykh oblastey oblachnykh vychisleniy Cloud Security Alliance [Cloud security alliance’s security guidance for critical areas of focus in cloud computing]. Available at: https://downloads.cloudsecurityalliance.org/assets/research/security-guidance/security-guidance-v4-FINAL.pdf. (accessed: 12.01.2021).
11. O Belorusskoy integrirovannoy servisno-raschetnoy sisteme [About the Belarusian integrated service settlement system)
Review
For citations:
Kochyn V.P., Shantsou A.V. Problems of Designing Complex Information Security System for Cloud Resources in the Republic of Belarus. Digital Transformation. 2021;(3):34-39. (In Russ.)