Cloud services form an important part of the information technology landscape and are beneficial for science and the planet when used appropriately. Use this document to assess your risk and implement cyber security controls if you are considering using a cloud service for research purposes.

Still trying to decide if a cloud service makes sense? Read our page on Cloud Services - Things to Consider. Contact Cyber Security (security@lbl.gov) if you have additional questions.

Operations Divisions may not acquire or configure any IT system without coordination with and permission from IT Division (Lifecycle Management for Information, Hardware, Software, and Services).

Step 1. Identify and assess the risks

Even though all research work at Berkeley Lab is FIPS-199 Low risk, gradations still exist which may require different controls. Assess your risk level as Green, Yellow, or Red for each of the following risk areas. Some projects may be 'Green' for one risk area and 'Yellow/Red' for another. The following tables are meant to be examples of characteristics for Green, Yellow, or Red categories and may not be applicable nor be the only characteristics in every situation.

Risk AreaGreenYellowRed

Information Sensitivity

  • No Prohibited Information.
  • No Prohibited Information.
  • Prohibited Information.
  • No Personally Identifiable Information.
  • No Personally Identifiable Information.
  • Personally Identifiable Information.
  • No Controlled Information.
  • No Controlled Information.
  • Controlled Information.
  • No Prudent to Protect Information.
  • Prudent to Protect Information.
  • Prudent to Protect Information.

Trust Relationships

  • Does not use Berkeley Lab passwords / authentication.
  • Does not use Berkeley Lab passwords / authentication.
  • Requires the use of Berkeley Lab passwords / authentication.
  • No administrative access to Berkeley Lab or other systems.
  • No administrative access to Berkeley Lab or other systems.
  • Requires administrative access to Berkeley Lab or other systems.
  • Does not require access to Berkeley Lab or other systems.
  • May require temporary connections to Berkeley Lab or other systems.
  • Requires persistent connections to Berkeley Lab or other systems.

Visibility

  • No external collaborators / researchers.
  • Some external collaborators / researchers.
  • Significant collaborations with multiple external participants.
  • Little to no public interest.
  • Limited public interest.
  • Could be of significant public interest.

Personally Identifiable Information (PII): You may not contract for any cloud service to store, process, manage or dispose of Personally Identifiable Information without joint approval of the functional owner and Cyber Security (security@lbl.gov). (Controlled and Prohibited Information Categories)

Prohibited Information: You may not contract for any cloud service to store, process, manage or dispose of Prohibited Information. (Controlled and Prohibited Information Categories)

Step 2. Select and Implement Controls

Note: The user and supervisor “own” the security risk analysis and approach around the use or acquisition of any cloud service.

Controls aren’t limited to the cloud service system, there are implications for Berkeley Lab systems or other systems as well. For example, all systems in a trust relationship (e.g firewall pinholes, batch keys, common user accounts) with a cloud service, including Berkeley Lab systems, should be configured to minimize the impact of any compromise. 

Recommended Controls: All projects

Required Controls: Red

You are required to contact the Cyber Security (security@lbl.gov) if  your project has risks in the Red category prior to acquiring or using the cloud service.

PII or information normally contained in the Business Systems Enclave (FIPS 199 Moderate) cannot be processed outside the BSE without a complete risk-analysis and approval from Cyber Security (security@lbl.gov) and Data Owner.

Recommended Controls: Yellow

Controls for Yellow must be appropriately tailored for the risks. We strongly advise you to contact Cyber Security (security@lbl.gov).

Recommended Controls: Green

Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Server (SaaS) Controls

Step 3. Submit the Cloud Hosting Request Form

This form contains several questions that will help Cyber Security track cloud resources and understand what controls are needed for them. Please submit this form before requesting DNS records or making your cloud resources public:

https://go.lbl.gov/cloud-hosting-form