=Paper= {{Paper |id=Vol-2878/paper3 |storemode=property |title=MEDINA: Improving Cloud Services Trustworthiness through Continuous Audit-based Certification |pdfUrl=https://ceur-ws.org/Vol-2878/paper3.pdf |volume=Vol-2878 |authors=Juncal Alonso,Jesús Luna Garcia,Leire Orue-Echevarria,Christian Banse }} ==MEDINA: Improving Cloud Services Trustworthiness through Continuous Audit-based Certification== https://ceur-ws.org/Vol-2878/paper3.pdf
MEDINA: Improving Cloud Services trustworthiness through
continuous audit-based certification
Leire Orue-Echevarria 1, Jesus Luna Garcia 2, Christian Banse 3 and Juncal Alonso 1
1
  TECNALIA, Basque Research and Technology Alliance (BRTA), Parque Científico y Tecnológico de Bizkaia,
Astondo bidea,700, E-48160 Derio, Spain
2
  Robert Bosch GmbH, Postfach 30 02 20 , 70442 Stuttgart, Germany
3
  Fraunhofer AISEC, Lichtenbergstraße 11, 85748 Garching near Munich, Germany


               Abstract
               One of the reasons of the still limited adoption of Cloud Computing in the EU is the EU
               customers’ perceived lack of security and transparency in this technology. Cloud service
               providers (CSPs) usually rely on security certifications as a mean to improve transparency and
               trustworthiness, however European CSPs still face multiple challenges for certifying their
               services (e.g., fragmentation in the certification market, and lack of mutual recognition). In this
               context, the EU Cybersecurity Act (EU CSA) proposes improving customer's trust in the
               European ICT market through a European certification scheme (EUCS). The proposed cloud
               security certification scheme conveys new technological challenges including the notion of
               automated monitoring for the whole supply chain, which needs to be solved in order to bring
               all the expected benefits to EU cloud providers and customers. In this context, MEDINA
               proposes a framework for supporting a continuous audit-based certification for CSPs based on
               EU CSA’s scheme for cloud security certification. MEDINA will tackle challenges in areas
               like security validation/ testing, machine-readable certification language, cloud security
               performance, and audit evidence management. MEDINA will provide and empirically validate
               sustainable outcomes in order to benefit EU adopters.

               Keywords 1
               cloud certification scheme, Cybersecurity Act, continuous auditing, continuous certification,
               smart contracts, certification language

1. Introduction and motivation
    Despite the conspicuous benefits to customer’s trustworthiness in cloud services, which result from
leveraging recognized security certifications (just as evidenced by the EU Cybersecurity Act (EU
CSA)), it is also true that European cloud providers currently face multiple challenges to certify their
services. Take for example the European Commission’s study SMART 2016/0029 “Certification
schemes for cloud computing” led by TECNALIA [3], which shows that the market penetration of the
cloud security certification is rather uneven. ISO 27001-based certifications are leading the market,
despite being a generic IT systems management standard and not focusing solely on cloud services. The
above-mentioned study has analysed the market penetration of international certification schemes (e.g.,
ISO, Cloud Security Alliance, …), Member States’ schemes (e.g., Germany’s BSI C5, Spain’s Esquema
Nacional de Seguridad – ENS), private initiatives (e.g., Zeker online, EuroCloud), public-private
initiatives (e.g. Trusted Cloud) and cross-border initiatives (e.g., ESCloud) in 50 Cloud Service
Providers (CSPs). The conclusions demonstrate a big fragmentation in the domain of existing
certification schemes.


First workshop on trustworthy software and open source, March 23-25, 2021, Virtual Conference
EMAIL: Leire.Orue-echevarria@tecnalia.com (L.Orue-Echevarria) ; Jesus.LunaGarcia@de.bosch.com         (J.   Luna   Garcia),
christian.banse@aisec.fraunhofer.de (C. Banse) , juncal.alonso@tecnalia.com (J. Alonso)
ORCID: 0000-0002-0648-4689 (L. Orue-Echevarria); 0000-0002-9244-2652 (J. Alonso);
            ©️ 2020 Copyright for this paper by its authors.
            Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
            CEUR Workshop Proceedings (CEUR-WS.org)
    In addition to the evident fragmentation in cloud security certification schemes, the EC study also
highlighted the diverse focus of the different security controls in current certification schemes.
    The final challenge that European cloud providers face when seeking a certification is the selection
of the conformity assessment method (CAM). Several different CAMs exist at the state of practice such
as self-assessment, evidence-based, ISO-based, and ISAE 3402. Each of these CAMs also have
different scopes. While ISO mainly assesses if security measures are defined and put in place at a certain
point of time, ISAE evaluates the efficiency of the implemented controls in a period of time, usually
six months.
    The conspicuous lack of cloud-specific security certifications, in addition to the existing market
fragmentation (scope, methodologies), hinder transparency and accountability in the provision of
European cloud services. Both issues ultimately reflect on the level of customer’s trustworthiness and
adoption of cloud services in Europe.
    In an effort to solve some of the challenges depicted above, the EU Cybersecurity Act (EU CSA,
approved in June 2019) in its Title III gives ENISA the mandate of defining and implementing a
European security certification scheme for ICT products, processes and services for three different
levels of assurance (low, substantial, and high). Being cloud computing one of the identified EU CSA
priorities, Articles 54 (j) and 57 (9) propose the possibility of deploying a high-assurance, evidence-
based and continuous certification of European cloud providers. Despite the evident benefits of EU
CSA’s principles for the European market and cloud customers, currently there are no concrete cloud
certification frameworks nor tools for implementing any of those proposals.
    To overcome this situation, the main objective of the MEDINA European research project [14] is to
provide a holistic framework that enhances cloud customers’ control and trust in consumed cloud
services, by supporting CSPs (IaaS, PaaS and SaaS providers) towards the successful achievement of a
continuous certification aligned to the EU Cybersecurity Act (EU CSA). Such certification should fulfill
the requirements of the EU cloud security certification scheme in their basic, substantial and high
assurance levels. The proposed framework will be comprised of tools, techniques, and processes
supporting the continuous auditing and certification of cloud services where security and accountability
are measurable by design. As the MEDINA framework is leveraged into a cloud supply chain, it will
support continuously assessing the efficiency and efficacy of security measures to ultimately achieve
and maintain a certification.
    The rest of this paper is structured in the following manner: Section 2 introduces an overview of the
related state of the art and the progress that MEDINA expect to provide to each topic. Section 3 details
the MEDINA approach for Cloud Security Continuous Certification and section 4 oversees the future
work in MEDINA.


2. Introduction and motivation
   In the last years, several projects and initiatives have worked in research areas of interest for
continuous certification of security in Cloud Services. Table 1 shows an overview of the main
challenges identified after the analysis of the current state of the art per area of interest, considering
national and/or international initiatives, and highlighting the main scientific advances that MEDINA
will bring.

Table 1
State of the art analysis
    Topic and related works            Current        state-of-the-art      Expected progress beyond
                                    (SOTA)                               the SOTA

    Cloud security certification     •   Fragmented                    •   MEDINA framework
 schemes      and   conformity certification schemes.              supports the homogenization of
 assessments                         •   Partial coverage of certification          schemes,  by
    [26], [3]                    relevant cloud security controls. aligning to the EU CSA.
                                         •   Wide         variety     of     •    Framework           fully
                                      conformity             assessment covers security controls from
                                      methods.                           relevant standards and good
                                                                         practices.
                                                                             •    MEDINA        leverages
                                                                         conformity           assessment
                                                                         methodologies proposed to EU
                                                                         CSA
   Continuous         assessment,         •    Static cloud security         •    Toolset supporting EU
audit and certification               configurations, i.e., forced by CSA’s cloud certification
   [22], [18], [10], [19], [8]        traditional audits, cannot adapt processes,               including
                                      to a changing threat landscape. automation (smart contracts),
                                          •    Lack of KPIs and accountability                         and
                                      techniques for measuring cloud trustworthiness.
                                      security efficiency/efficacy.          •    Risk-based MEDINA’s
                                          •    Trustworthiness        of framework supports CSPs in
                                      evidences, and automation are adapting security configuration
                                      missing in current cloud at run-time/design-time, in a
                                      certification processes.           certifiable manner.
                                          •    Non-technical                 •    Contribution of         a
                                      measures are not quantifiable repository containing TOMs,
                                      and thus currently hard to assess metrics and security KPIs
                                      continuously                       derived from internationally
                                                                         accepted control frameworks.
                                                                             •    New techniques to
                                                                         analyse the semantic of
                                                                         documents        and      process
                                                                         descriptions to address non-
                                                                         technical and organisational
                                                                         controls
   Policies for certification             •    Limited      scope     of     •    Provision of a broad
language                              existing     tools     on     new spectrum of evidence gathering
   [27], [28], [6], [5], [29], [21]   computing paradigms such as techniques             for     technical
                                      serverless computing               measures, such as security
                                          •    Existing static code assessment of cloud workloads,
                                      analysis techniques are not containers            and     serverless
                                      adopted to the needs of functions
                                      gathering evidences in a               •    Analysis of data flows
                                      certification context              of cloud applications using
                                          •    Non-technical             code property graphs on
                                      measures are not quantifiable incomplete source code
                                      and thus currently hard to assess      •    Machine-learning and
                                      continuously                       NLP to analyse the semantic of
                                          •    Auditors lack real- documents and process to
                                      world experience on continuous address          non-technical      or
                                      certification                      organisational measures
                                                                             •    Validation             of
                                                                         techniques based on real-world
                                                                         audit practices
   Economic and risk aspects              •    Lack of (economic)            •    MEDINA framework
of certification                      analysis for evaluating the cost- for quantitative risk-assessment
   [16], [15], [30], [2], [11],       benefit         of        security for cloud security certification.
[31], [12], [7]                       certifications,    and     related     •    Contribution           of
                                      cybersecurity risks.               validated cost-benefit analysis
                                        •   No CSP guidance for        to ensure the cost-effectiveness
                                    selecting        risk-assessment   of          the           selected
                                    methodologies for purposes of      countermeasures.
                                    cloud certification.                  •     The            MEDINA
                                        •   Entry barrier for small    framework will also help to
                                    EU CSPs, which face costly         compare       various     security
                                    setup of security configurations   system      configurations       to
                                    to achieve a certification.        support      CSPs      in     their
                                                                       certification efforts.
                                                                          •     Provide support re-
                                                                       evaluate the CSP security
                                                                       configuration at run-time, thus
                                                                       ensuring               continuous
                                                                       adaptability of the certification.



3. MEDINA approach
   The MEDINA approach is depicted in Figure 1 MEDINA approach for continuous Cloud Services
certification against the EU Cloud Certification Scheme (EUCS). It describes the lifecycle of
continuous Cloud security certification, from the definition of the security controls and metrics to the
continuous auditing of the evidences. Such lifecycle can be summarized as follows:
   1. Define a catalogue of metrics associated to technical and organizational measures out of the
   MEDINA catalogue (e.g., based on EUCS [4]). This repository of metrics (Key result 1- [KR1]) and
   measures entails a clear definition of the technical and organizational measures (TOMs) relevant for
   cloud service providers. The repository also includes the corresponding security metrics (both
   quantitative and qualitative) for security requirements/TOMs such as those related to system security
   and integrity, operational security, business continuity and incident management.
   2. Select controls: Taking into consideration the CSPs risk appetite following a risk-based
   approach and the chosen assurance level, the CSP shall select the implementing TOMs and related
   metrics for all security controls considering its risk appetite. MEDINA offers a tool-supported risk-
   based approach [KR2] to select the appropriate controls aligned with the overall risk “appetite” of
   the organisation. This will be based on a risk self-assessment tool and will help to identify the core
   assets of the service (considering all involved stakeholders), help to value them and identify the
   relevant threats. Furthermore, the framework will be improved to propose an (near) optimal security
   configuration to ensure the optimal coverage of security risks. After that, assets of the cloud service
   and relevant IT threats shall be identified, and additional implementing TOMs proposed [KR2].
   MEDINA proposes a tool-supported methodology for the selection of additional controls and
   associated TOMs, which address the concrete needs of a CSP taking into consideration both its risk
   appetite and requested certification’s assurance level.
   3. Specify the certification language: currently certification schemes are expressed using natural
   language. MEDINA proposes to transform this certification language into a machine-readable
   expression [KR3], by using NLP, including aspects such as scope of the certification, assurance level
   and conformity assessment method. For a lean and seamless trait d'union between what is required
   by official documents of the European Commission in terms of certification to the definition of the
   machine-readable certification language [KR3] MEDINA intends to develop:
   •     A procedure to semi-automatically translate Natural Language (NL) certifications terms and
   conditions, as they appear on official documents like, e.g., the Cybersecurity Act, into a Controlled
   Natural Language (CNL) [9];
   •     A tool to edit, tune and revise semi-automatically generated CNL, to manually improve the
   translation and verify the generated statements;
   •     A component to map the CNL to a runtime-enforceable Domain-Specific Language (DSL) that
   can be used by assessment tools to check the compliance status of the stated certification terms and
   conditions.
   4. Collect and evaluate evidences, continuously and automatically audit: Once the scope of the
   certification scheme is established, the evidences need to be collected [KR4] at cloud service as well
   as code level, both at design and at operation time, that is, during the whole lifecycle of the cloud
   service. The collected evidences need to be ensured that no one has tampered with them and are
   trustworthy. MEDINA refers to Distributed Ledger Technologies (DLT)-based that manage
   evidence (e.g., on a private blockchain) based on additional information about the deployed or to-
   be-deployed services. Moreover, these evidences are continuously evaluated [KR5] and the risks
   continuously monitored and updated [KR6], in order to have a secure operational service certifiable
   through the selected conformity assessment method.
   5. Achieving continuous certification is the process of continuously evaluating whether
   appropriate evidence is collected [KR4] that supports the fulfilment of individual controls of a
   certification target. MEDINA aims to greatly reduce this effort by providing quantitative measures
   for both the target as well as the evidence. Since evidence is collected as a set of measurable metrics
   (e.g., by measuring the value 256 of the metric key-size, simple Boolean expressions such as key-
   size => 128 in the certification target can be employed), MEDINA is able to validate whether a
   measurement result fulfil the certifiable requirement or not [KR5].




Figure 1 MEDINA approach for continuous Cloud Services certification against the EU Cloud
Certification Scheme (EUCS).

   Summarizing from the table above (Table 1) and the approach presented here it can be concluded
that no initiative or commercial solution fully covers the objectives of MEDINA.

4. Use cases
    The MEDINA framework will be validated in two use cases:
    1. European Certification of Multi-cloud backends for IoT Solutions, provided a big industrial
player such as Bosch. This use case will deploy a set of IaaS and PaaS services, commonly used for IoT
backends, in at least three public CSPs (e.g., Microsoft Azure, AWS, and Fabasoft). This case includes
managed Kubernetes clusters, transactional SQL databases, raw virtual storage, virtual networks, virtual
machines (e.g., as jump hosts), and serverless PaaS (e.g., functions). Furthermore, widely used
“support” PaaS will be also deployed e.g., virtual hardware security modules (HSM), log repositories,
application gateways, and network security groups/firewalls-as-a-service. Those PaaS components will
be orchestrated to mock-up and IoT service based on the company’s industrial experience. Having a
measurable, holistic, and end-to-end view of the security measures (TOMs) implemented in such a
complex cloud ecosystem becomes essential for the certification process of the supply chain. Beyond
its usage for the European certification, the continuously achieved levels of security transparency bring
a huge benefit to the internal processes of the organization providing the IoT solution e.g., security
governance, security benchmarking, measurable efficiency and efficacy of implemented TOMs, and
enablement of secure DevOps.
    2. Continuous Audit of SaaS Solutions for the Public Sector: this use case provided by Fabasoft
aims to provide a high level of automation to the current audit process of a SaaS provider in alignment
to the EU CSA, with particular focus on continuous audit-based certification. At the state of practice,
for a good number of requirements in current certification schemes (e.g., BSI C5, SOC2, ISO 20017,
etc.), several CSPs already collect evidence automatically by using monitoring tools, log files, internal
versioning and the likes. However, this generated evidence cannot, to date, be evaluated and audited
automatically (continuously) due to the lack of standardized processes and tool chains. Furthermore,
there is no clear definition of what “real evidence” is (i.e., evidence that auditors consider trustworthy
for certification purposes), when it is automatically produced. The tools and techniques proposed by
MEDINA will be validated in this use case, taking into consideration the objectives and Key Results
expected from the project.


5. Conclusions and future work
   This paper presented the proposed MEDINA approach to support current challenges in the
continuous security certification of Cloud Computing services. MEDINA proposes to increase the
trustworthiness of the Cloud Services and Cloud Service Providers through a framework of methods,
mechanism and tools supporting continuous cloud security certification, through trustworthy evidence-
management methods. The project started in November 2020 and will last 36 months. Currently the
reference architecture for the MEDINA framework is being designed, and the first versions of the
methods and prototypes will be ready during 2021.These initial versions will be validated by two
European Cloud Providers which are part of the MEDINA consortium, Robert Bosch GmbH and
Fabasoft.


    Acknowledgements
   This work has been partially funded by the European project MEDINA (Horizon 2020 research and
innovation Programme, under grant agreement no 952633).


    References
[1] M. Anisetti, C.A. Ardagna, E. Damiani, N. El Ioini, F. Gaudenzi, Modeling time, probability, and
    configuration constraints for continuous cloud service certification, Computers & Security. 72
    (2018) 234–254.
[2] R.M. Blank, A. Secretary, Guide for Conducting Risk Assessments, 2011.
[3] European Commission. Directorate General for Communications Networks, Content and
    Technology., Fundación TECNALIA RESEARCH & INNOVATION., Certification schemes for
    cloud computing: final report., Publications Office, LU, 2018.
[4] European Union Agency for Cybersecurity, EUCS – Cloud Services Scheme, n.d.
[5] A. Fantechi, A. Ferrari, S. Gnesi, L. Semini, Requirement Engineering of Software Product Lines:
    Extracting Variability Using NLP, in: 2018 IEEE 26th International Requirements Engineering
    Conference (RE), 2018: pp. 418–423.
[6] A. Ferrari, G. Gori, B. Rosadini, I. Trotta, S. Bacherini, A. Fantechi, S. Gnesi, Detecting
    requirements defects with NLP patterns: an industrial experience in the railway domain, Empir
    Software Eng. 23 (2018) 3684–3733.
[7] J. Großmann, F. Seehusen, Combining Security Risk Assessment and Security Testing Based on
     Standards, in: F. Seehusen, M. Felderer, J. Großmann, M.-F. Wendland (Eds.), Risk Assessment
     and Risk-Driven Testing, Springer International Publishing, Cham, 2015: pp. 18–33.
[8] D. Knoblauch, C. Banse, Reducing Implementation Efforts in Continuous Auditing Certification
     Via an Audit API, in: 2019 IEEE 28th International Conference on Enabling Technologies:
     Infrastructure for Collaborative Enterprises (WETICE), IEEE, Napoli, Italy, 2019: pp. 88–92.
[9] T. Kuhn, A Survey and Classification of Controlled Natural Languages, Computational
     Linguistics. 40 (2014) 121–170.
[10] I. Kunz, P. Stephanow, A Process Model to Support Continuous Certification of Cloud Services,
     in: 2017 IEEE 31st International Conference on Advanced Information Networking and
     Applications (AINA), IEEE, Taipei, Taiwan, 2017: pp. 986–993.
[11] M.S. Lund, B. Solhaug, K. Stølen, Model-Driven Risk Analysis, Springer Berlin Heidelberg,
     Berlin, Heidelberg, 2011.
[12] S.N. Matheu-García, J.L. Hernández-Ramos, A.F. Skarmeta, G. Baldini, Risk-based automated
     assessment and testing for the cybersecurity certification and labelling of IoT devices, Computer
     Standards & Interfaces. 62 (2019) 64–83.
[13] I. Matteucci, M. Petrocchi, M.L. Sbodio, CNL4DSA: a controlled natural language for data sharing
     agreements, in: Proceedings of the 2010 ACM Symposium on Applied Computing - SAC ’10,
     ACM Press, Sierre, Switzerland, 2010: p. 616.
[14] MEDINA, MEDINA Security framework to achieve a continuous audit-based certification in
     compliance with the EU-wide cloud security certification scheme - Annex 1, DoA Part B, 2020.
[15] T. Mikolov, I. Sutskever, K. Chen, G. s Corrado, J. Dean, Distributed Representations of Words
     and Phrases and their Compositionality, Advances in Neural Information Processing Systems. 26
     (2013).
[16] N.M. Müller, D. Kowatsch, P. Debus, D. Mirdita, K. Böttinger, On GDPR Compliance of
     Companies’ Privacy Policies, in: K. Ekštein (Ed.), Text, Speech, and Dialogue, Springer
     International Publishing, Cham, 2019: pp. 151–159.
[17] E. Schmieders, A. Metzger, K. Pohl, A Runtime Model Approach for Data Geo-location Checks
     of Cloud Services, in: X. Franch, A.K. Ghose, G.A. Lewis, S. Bhiri (Eds.), Service-Oriented
     Computing, Springer Berlin Heidelberg, Berlin, Heidelberg, 2014: pp. 306–320.
[18] P. Stephanow, N. Fallenbeck, Towards Continuous Certification of Infrastructure-as-a-Service
     Using Low-Level Metrics, in: 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and
     Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE
     15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-
     ATC-ScalCom), IEEE, Beijing, 2015: pp. 1485–1492.
[19] P. Stephanow, K. Khajehmoogahi, Towards Continuous Security Certification of Software-as-a-
     Service Applications Using Web Application Testing Techniques, in: 2017 IEEE 31st International
     Conference on Advanced Information Networking and Applications (AINA), IEEE, Taipei,
     Taiwan, 2017: pp. 931–938.
[20] P. Stephanow, M. Moein, C. Banse, Continuous Location Validation of Cloud Service
     Components, in: 2017 IEEE International Conference on Cloud Computing Technology and
     Science (CloudCom), 2017: pp. 255–262.
[21] I.K. Tanoli, M. Petrocchi, R. De Nicola, Towards automatic translation of social network policies
     into controlled natural language, in: 2018 12th International Conference on Research Challenges
     in Information Science (RCIS), IEEE, Nantes, 2018: pp. 1–12.
[22] I. Windhorst, A. Sunyaev, Dynamic Certification of Cloud Services, in: 2013 International
     Conference on Availability, Reliability and Security, IEEE, Regensburg, Germany, 2013: pp. 412–
     417.
[23] F. Yamaguchi, N. Golde, D. Arp, K. Rieck, Modeling and Discovering Vulnerabilities with Code
     Property Graphs, in: 2014 IEEE Symposium on Security and Privacy, 2014: pp. 590–604.
[24] [24]        J. Zhang, N.M. El-Gohary, Semantic NLP-Based Information Extraction from
     Construction Regulatory Documents for Automated Compliance Checking, J. Comput. Civ. Eng.
     30 (2016) 04015014.
[25] P. Zhou, Ontology-based information extraction from environmental regulations for supporting
     environmental compliance checking, 2015.
[26] “Unleashing the Potential of Cloud Computing in Europe,” EC, 2012.
[27] OSCAL, (n.d.).
[28] OWL - Semantic Web Standards, (n.d.).
[29] Natural Language Toolkit — NLTK 3.5 documentation, (n.d.).
[30] PAe - MAGERIT v.3 : Metodología de Análisis y Gestión de Riesgos de los Sistemas de
     Información, (n.d.).
[31] Self-Assessment Tools | CyberSecurity Observatory, (n.d.).