Last updated: 
3 months 2 weeks ago
Blog Manager
One of Jisc’s activities is to monitor and, where possible, influence regulatory developments that affect us and our customer universities, colleges and schools as operators of large computer networks. Since Janet and its customer networks are classified by Ofcom as private networks, postings here are likely to concentrate on the regulation of those networks. Postings here are, to the best of our knowledge, accurate on the date they are made, but may well become out of date or unreliable at unpredictable times thereafter. Before taking action that may have legal consequences, you should talk to your own lawyers. NEW: To help navigate the many posts on the General Data Protection Regulation, I've classified them as most relevant to developing a GDPR compliance process, GDPR's effect on specific topics, or how the GDPR is being developed. Or you can just use my free GDPR project plan.

Group administrators:

ENISA - working out cloud security requirements

Wednesday, April 22, 2015 - 12:23

ENISA’s new report proposing a "Security Framework for Governmental Clouds" may be more widely useful than its title and explicit scope suggest. Chapter 3 of the report suggests something pretty close to a project plan that any organisation could use to assess which applications and data are appropriate to move to a cloud service, what security measures they require, and which cloud models and services can provide them.

Being based on the Deming “Plan-Do-Check-Act” cycle, the report also identifies the need for monitoring and corrective measures (Check and Act stages). Here the most detailed information is in the Chapter 4 case studies, which indicate the types of monitoring, auditing and certification that four countries (including the UK) apply to their Government clouds. The report suggests some categories for these activities, but the variety of approaches actually taken suggests that the right level of monitoring/audit/certification may actually depend on the types and levels of risk identified for particular applications.