Tuesday, 28 July 2020 06:31

Australian cloud providers united in praise for new secure cloud guidelines Featured

Rupert Taylor-Price: "Industry collaboration in the process to devise these guidelines was good." Rupert Taylor-Price: "Industry collaboration in the process to devise these guidelines was good." Supplied

Canberra-based secure cloud services provider Vault has welcomed the release of new guidelines for vendors to be assessed for their competence in delivering secure cloud services by either public or private sector entities.

Chief executive Rupert Taylor-Price told iTWire that the way that industry had collaborated in the process to devise these guidelines was very good.

Vault was one of three companies to be granted the coveted Protected cloud certification by the Australian Signals Directorate under the old system; Sliced Tech and Macquarie Government were the others. There were also three foreign companies given the certification: Dimension Data, Microsoft and Amazon Web Services.

In July last year, for unspecified reasons a process was initiated to change the certification system and in March this year, the old method was scrapped. The new guidelines, drafted by the Australian Cyber Security Centre and the Digital Transformation Agency, were announced on Monday.

Taylor-Price said he was a fan of the Certified Cloud Services List, which was part of the old system, and closing this down was not the best move. But, he added, the replacement was just as good.

And, he added, the best feature of the lot was the focus on sovereignty, which emphasises the fact that the best protected cloud solution for an Australian workload would always be an Australian provider.

Phil Dawson, the chief of AUCloud, a Canberra-headquartered cloud provider, also had good words to say about the new guidelines.

In a statement, he said the new guidelines outlined a more transparent and efficient process which would avoid the delays that were so much a part of the old process.

He added that it would also reduce duplication and misinterpretation, while encouraging agility. re-use and knowledge transfer of learning that would benefit cloud consumers.

"With the Protective Security Policy Framework and the ASD’s Information Security Manual central to the Cloud Assessment and Authorisation Framework, clear delineation and ownership of roles between cloud consumers, cloud service providers and Information Security Registered Assessors Program assessors is welcomed," Dawson said.

"Importantly the new arrangements reinforce the responsibilities of cloud consumers to manage risks within their specific context; Cloud Services Providers supporting a multi-tenanted customer base; and assessors balancing consistent and prescriptive reporting with open text narrative."

He said the scaling limitations of the old system had been addressed, with the ACSC now clearly positioned as custodian, rather than undertaking the process itself.

"The commitment to provide increased investment to support and train the IRAP community is an important acknowledgement of the need for consistency of approach and decision- making," Dawson added.

Aidan Tudehope, the managing director of Macquarie Government, another Australian firm certified under the old Protected cloud system, said the new rules highlighted the importance of the legal authority that could be asserted over data based on its jurisdiction.

"With data hosted in global cloud environments, it is at higher risk as it could be subject to multiple overlapping or concurrent jurisdictions, while in the hands of personnel outside of Australia," he pointed out.

Tudehope said he was disappointed by the decision to scrap the CCSL, but nevertheless welcomed the new guide.

"This is about more than simply the physical geographic location where data is stored. Data sovereignty is about the legal authority that can be asserted over data because it resides in a particular jurisdiction, or is controlled by a cloud service provider over which another jurisdiction extends," he noted.

"Data hosted in globalised cloud environments may be subject to multiple overlapping or concurrent jurisdictions as the debate about the reach of the US CLOUD Act demonstrates. As the ACSC points out, globalised clouds are also maintained by personnel from outside Australia, adding another layer of risk."

The US CLOUD Act was passed in 2018 to make it possible for warrants issued by an American authority to be used to seize data stored by branches of US firms in other countries. It was drafted to overcome an obstacle faced by the FBI in obtaining data which Microsoft had stored in Ireland. The agency said the data in question was related to a drug-trafficking case.

Other countries are now attempting to use the Act after an agreement with the US. Britain has already got a deal in place. The corresponding Australian law that has been proposed, would allow Australian authorities to have the same reach as the Americans, this time to data and individuals in the US, provided that data was needed for advancing a judicial or criminal case or investigation.

Added Tudehope: "The only way to guarantee Australian sovereignty is ensuring data is hosted in an Australian cloud, in an accredited Australian data centre, and is accessible only by Australian-based staff with appropriate government security clearances. Taken alongside [Government Services] Minister [Stuart] Robert’s planned sovereign data policy, this guide opens new opportunities for Australian cloud service providers."

Subscribe to ITWIRE UPDATE Newsletter here

Active Vs. Passive DWDM Solutions

An active approach to your growing optical transport network & connectivity needs.

Building dark fibre network infrastructure using WDM technology used to be considered a complex challenge that only carriers have the means to implement.

This has led many enterprises to build passive networks, which are inferior in quality and ultimately limit their future growth.

Why are passive solutions considered inferior? And what makes active solutions great?

Read more about these two solutions, and how PacketLight fits into all this.


WEBINAR INVITE 8th & 10th September: 5G Performing At The Edge

Don't miss the only 5G and edge performance-focused event in the industry!

Edge computing will play a critical part within digital transformation initiatives across every industry sector. It promises operational speed and efficiency, improved customer service, and reduced operational costs.

This coupled with the new capabilities 5G brings opens up huge opportunities for both network operators and enterprise organisations.

But these technologies will only reach their full potential with assured delivery and performance – with a trust model in place.

With this in mind, we are pleased to announce a two-part digital event, sponsored by Accedian, on the 8th & 10th of September titled 5G: Performing at the Edge.


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News