Editor’s Note: The joint CIO Council – Chief Acquisition Officers Council publication, “Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service,” is attached below.
From: Information Week
As agencies adopt cloud services, a new report helps set some guidelines around SLAs, security, and privacy.
By Elizabeth Montalbano
Since cloud computing services represents a paradigm shift from the way federal agencies historically have acquired IT systems, they have a number of new factors to consider–service-level agreements (SLAs), security and privacy among them–as they make plans to implement the cloud, according to a new report.
As part of a broad IT reform plan, the feds have adopted a “cloud first” policy requiring agencies to consider the cloud first as they plan new IT projects, which should accelerate adoption of the technology at the federal level.
While the government sector is playing catch-up to businesses in the cloud computing market, it has the potential to be the cloud market’s single largest purchaser, and this could play a major role in shaping how services are purchased and consumed in the future, according to “Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service” (PDF), a new report offering guidance for the ins and outs of acquiring and deploying cloud computing services.
This means agencies must think carefully not only about how they implement cloud computing from a technical perspective, but also about how they work with cloud service providers to hammer out the terms of service.
The most consistent lessons learned from the early adopters show that the Federal Government needs to buy, view, and think about IT differently,” the report says. “Cloud computing presents a paradigm shift that is larger than IT, and while there are technology changes with cloud services, the more substantive issues that need to be addressed lie in the business and contracting models applicable to cloud services.”
Since cloud computing usually means handing over control of data and systems to a third party, SLAs, security, and privacy are three particular areas of concern for agencies when working with vendors of the services, according to the report, which provides advice on how to handle each area. The Federal CIO Council, the Chief Acquisition Officers Council, and the Federal Cloud Compliance Committee collaborated on the report.
In the area of SLAs, agencies must craft them with clear terms and definitions for the performance of systems, including ways to demonstrate how performance is being measured. They also must put in place mechanisms that ensure enforcement of the terms of the SLAs.
Security–which has been cited as one of the chief roadblocks to cloud computing adoption by government customers–must be handled with particular care as well. Because of its importance, the feds have been preparing common security requirements for cloud computing in the form of the Federal Risk Assessment Program (FedRAMP).
The report cites FedRAMP as the baseline guide for helping agencies address the security needed to acquire, authorize, and consume cloud services. It also listed seven other key security areas agencies must factor into their decisions: clear security authorization requirements; continuous monitoring; incident response; key escrow; forensics; two-factor authentication with Homeland Security Presidential Directive-12, a common federal identification standard for employees and contractors; and auditing.
Privacy is also another new concern with cloud computing, as third parties now will be in charge of storing personal data and information—specifically, personally identifiable information (PII)–about agency employees, other network users, or members of the public.
To ensure that data is protected, agencies must ensure their cloud implementations comply with the Privacy Act of 1974 and related requirements for how agencies must store and handle PII, according to the report.
They also must work with cloud providers to engage in privacy impact assessments (PIAs) and privacy training, and be clear about the location of their data in the cloud to ensure it is properly secured. Moreover, the report specifies that agencies must agree with cloud service providers on how to respond in the event of a data breach.
Leave a Reply