HERE - Lotteries and Gaming Authority

CLOUD SOLUTIONS
FOR REMOTE GAMING INDUSTRY
Cloud Solutions Guidelines for Remote Gaming Operators
Consultation Paper
Date: 31 October 2014
Foreword
Cloud technologies have started to move beyond the hype and into the very fabric of today’s
enterprise management. With the majority of organisations now claiming to have adopted cloud
solutions into at least part of their enterprise, we are now seeing the market mature to the point
that cloud solutions are being used for mission critical enterprise activities and services. Over
recent years, new lessons have been learnt, leading practices and challenges are emerging and
a body of knowledge is now taking shape.
The Lotteries and Gaming Authority of Malta (LGA) recognises the advantages and options
cloud solutions provide to the remote gaming industry in general. It allows for significant cut
in infrastructure and operational costs, better management and allocation of IT resources,
flexibility and scalability of operations. However, we are cognisant of the fact that changing from
one environment to another presents new challenges which operators and regulators alike are
doing their best to address both from a policy and operational standpoint. It is the intention of
the LGA to release guidelines for the Remote Gaming operators making use of cloud solutions.
It will also allow facilities to be used as cloud service providers in defined circumstances for
gaming transactions. This consultation is proposing a sharper focus on long-standing principles,
with a clearer explanation of why they are important from a policy and regulatory perspective.
These guidelines serve as a clear sign to the gaming industry that the LGA wants to be a
prime mover in innovation and policy and is well positioned to react to these trends in order to
safeguard the collective achievement of the gaming industry over the last 11 years.
I, therefore strongly encourage all stakeholders to actively participate in this consultation
document so that we make sure that the new policy on cloud solutions is well thought out and
forward looking. To this effect, your opinions and insights on this matter are critical to keep
Malta at the leading edge of technology and innovation.
Joseph Cuschieri
Executive Chairman
Lotteries & Gaming Authority of Malta
4
Contents
1.Introduction7
1.1 Background
7
1.2 Objectives
8
1.3 Pre-consultation activities
8
2.The Authority’s perspective on
Cloud Computing9
2.1 Cloud Computing – a definition
9
2.2 Deployment Models
9
2.3 Cloud Service Providers
11
2.4 The Current Situation
12
3.An overview of risks related to operating
on a Cloud environment13
3.1 Security
13
3.2 Confidentiality
13
3.3 Integrity
14
3.4 Availability
14
3.5 Compliance
14
3.6 Jurisdictional / Legal
14
4. Relevant standards15
5. The Authority’s proposal16
5.1 The Authority’s position
16
5.2 Scope
16
5.3 Establishing the context
16
5.4 Remote Gaming Components
16
6. Proposed Approval Process18
6.1 The Authority’s conformance kite mark 18
6.2 Geographic locations
18
6.3 Monitoring and review of the kite mark 18
6.4 Control of operational documents
& records
18
6.5 A Risk-based approach
18
6.6 Risks relating to the adoption of
Cloud Computing
19
6.7 Final Considerations
20
7. Consultation procedure22
7.1 Consultation period
22
7.2 Queries and contributions
22
7.3 Questions to be addressed by
stakeholders22
7.4 Direct interaction
22
7.5 Transparency register
22
7.6 Post-consultation
23
8.Data Protection Statement Data Protection Act (Chapter 440)24
Appendix A – Summary of
consultation questions25
Notes26
5
Definitions
6
Classes
As per the First Schedule to Regulation 3, Licences of
the Remote Gaming Regulations 2004, SL438.04
Cloud Computing
In this paper the Authority has adopted the Cloud
Security Alliance definition for Cloud Computing - see
Section 2.1 in this Paper
Cloud Service Provider
A Cloud Computing service provider, also referred to
as CSP in this Paper
Financial data
Any data pertaining to the financial activity of a player
Licensee
As per the definition of licensee in Remote Gaming
Regulations 2004, SL438.04
Player data
Any data which contributes or may contribute to the
identification of a player
Remote Gaming Operator/Operator
An economic operator registered in Malta and
licensed, or in the process of obtaining a license, to
operate as a Remote Gaming Operator in accordance
to the Remote Gaming Regulations 2004, SL 438.04
Saas
Software-as-a-Service is software which is deployed
over the internet and used by someone on a personal
computer or local area network.
Paas
Platform as a service is a category of cloud computing
services that provides a computing platform and a
solution stack as a service.
Iaas
The virtual delivery of computing resources in
the form of hardware, networking, and storage
services. It may also include the delivery of operating
systems and virtualisation technology to manage the
resources.
1.Introduction
In 2004, Malta was the first country in Europe to identify the potential of this industry and enact
the appropriate legislative framework to position the country as a leading global player in
remote gaming regulation. With the regulatory and financial incentives in place, the portfolio
of companies setting up their operations in Malta started to grow at a fast pace. Today, the
Lotteries and Gaming Authority, hereafter referred to as “the Authority”, hosts a remote gaming
industry that directly contributes 11% of GDP, employs more than 7,000 people and has direct
and indirect economic benefits that have created a multiplier effect impacting many business
sectors, including property, hospitality and corporate services. Over 250 remote gaming
companies and 400 licenses are currently on the LGA’s books, and the numbers keep growing
steadily.
Malta’s huge success is underpinned by a package of incentives and other factors that make
Malta a unique gaming jurisdiction of international repute. Our package includes corporate
and personal tax incentives, a robust ICT infrastructure, an English-speaking population, a
strong educational system and a regulatory framework that focuses on consumer protection,
fairness of games, strict compliance and the prevention of money laundering and other crimes.
In fact, other European jurisdictions have been looking at Malta as a role model to develop their
national legal frameworks for remote gaming.
Malta’s reputation in this sector needs to be maintained and one way of achieving this is by
being responsive to technological developments which bring with them benefits to stakeholders
in the sector. However, developments such as Cloud Computing/Services, also present new or
heightened levels of risks which need to be addressed and managed, in order to safeguard the
jurisdiction’s reputation and adequate levels of player protection.
With this in mind, the Authority is launching this public consultation process in respect of Cloud
Computing Solutions adoption by Remote Gaming Operators, with a view to gather insights
and feedback from relevant stakeholders, industry experts, and other interested parties, on its
proposals as set out in this consultation paper.
1.1 Background
A number of remote gaming operators have, or are considering, leveraging the opportunities
offered by the adoption of Cloud Computing Solutions in order to take advantage of the extensive
benefits that may be achieved, including; better management and allocation of IT resources,
flexibility, scalability and cost savings.
The Authority recognises the advantages that cloud computing provides to licensees. It also
recognises the fact that the adoption of cloud computing by operators may also provide
competitive advantages to the Remote Gaming sector in Malta.
However, migrating from the traditional environment to a cloud environment presents some
disadvantages as well, in the form of new or heightened risks. The Authority believes that by
setting out good practice, operators will be able to mitigate the risks that cloud computing
introduces, meet the level of security and standards required by the Authority as well as attain
the benefits offered by cloud computing.
7
1.2 Objectives
It is the Authority’s objective to establish guidelines and to set good practice requirements on
the industry in respect of the use of cloud services for remote gaming. These guidelines should:
a)Offer additional clarity on the use of cloud services, placing the obligations on the correct
party. Therefore, making it clear as to who is responsible for what in the security process;
b)Stipulate those ‘reasonable steps’ which must be taken to protect the information from
misuse, loss, unauthorised access, modification and other security breaches, regardless of
where it is stored.
1.3 Pre-consultation activities
The Authority has already received submissions on the subject matter from the Malta Remote
Gaming Council Working Group and the Malta Chamber Remote Gaming Business Section
and has taken these into consideration in arriving at its position and in compiling this this
consultation paper.
8
2.The Authority’s perspective on Cloud Computing
2.1 Cloud Computing – a definition
According to the Cloud Security Alliance, cloud computing is defined as “… a model for enabling
ubiquitous, convenient, on-demand network access to a shared pool of configurable computing
resources (e.g., networks, servers, storage, applications, and services). Cloud computing is
a disruptive technology that has the potential to enhance collaboration, agility, scaling, and
availability, and provides the opportunities for cost reduction through optimized and efficient
computing. The cloud model envisages a world where components can be rapidly orchestrated,
provisioned, implemented and decommissioned, and scaled up or down to provide an ondemand utility-like model of allocation and consumption”.
2.2 Deployment Models
Several security and privacy concerns within the cloud computing environment are similar to
those of traditional non-cloud services, however amplified by external control over operators’
assets. Cloud computing also introduces new risks, which vary according to the deployment
model and setup utilised by the operator. Moreover Cloud Service Providers (hereinafter
referred to CSPs) offer a range of services to their customers such as Software as a Service
(SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS).
The following is a summary of the different deployment models and some of the key elements
that characterises each model.
2.2.1 Private Cloud
This cloud infrastructure is for the exclusive use of a single licensee. No interaction with other
entities is allowed within this type of cloud computing deployment model.
In this case, physical or location-related considerations can still be closely controlled by the
Authority as this particular cloud infrastructure can be located either on the operator’s premises
or at a Data Centre with dedicated servers. Building a private cloud seems to be the best option
in terms of security.
2.2.2 Community Cloud
In a community cloud, services are shared by a number of licensees with similar security
requirements and need to store or process data of similar sensitivity. In some cases, all the
entities are subject to common security policies. These security components in a community
cloud make the level of risk lower than in a public cloud, however it remains higher than in a
private cloud.
2.2.2.1 Security
Although different classes of licensed remote gaming entities operate in the same sector, they
may have adopted different security measures or security requirements. Consequently, other
third party users hosted on the same CSP as that engaged by a remote gaming operator may
have inferior security standards, security levels, procedures or Service Level Agreements
(hereinafter referred to SLAs) for the same category of data exposing remote gaming operators
to related risks.
9
2.2.2.2 Jurisdictional/Legal
Compliance with garnishee orders, search warrants and seizures served to companies could
be difficult to enforce if a particular operator hosts its business in a cloud shared by other
companies.
2.2.3 Public Cloud
In a public cloud, the CSPs share their infrastructure and resources among various unrelated
enterprises and individuals. Public Cloud Services are generally considered as more ‘risky’,
although the security related investment and the resources available to major Public Cloud
Service Providers often exceed those of a typical licensee.
Transition to a public cloud requires a transfer of responsibility and control to the cloud provider
over information as well as system components that were previously under the organisation’s
direct control.
This cloud infrastructure is shared by multiple tenants of the cloud service provider. These
tenants have no relation to each other in the same space, therefore no common interest and
concerns for security. A malicious attack on one tenant could have adverse impacts on other
tenants of the same cloud environment, even if they are not the intended target.
2.2.3.1 Isolation Failure
Multi-tenancy and shared resources are defining characteristic of both the Public and
Community Cloud. High degrees of multi-tenancy over large numbers of platforms are needed
for cloud computing to achieve the benefits of scale economies. The threats of these deployment
models include the failure of mechanisms separating storage, memory, routing and even
reputation between different tenants; the so-called guest-hopping attacks.
2.2.3.2 Security
Security depends not only on the correctness and effectiveness of many components but also
on the interactions among them. The challenge exists in understanding and securing these
applications. Having to share an infrastructure with unknown outside parties can be a major
drawback and requires a high level of assurance pertaining to the strength of the security
mechanism used for logical separation.
An attacker could pose as a consumer to exploit vulnerabilities from within the cloud
environment, overcome the separation mechanisms, and gain unauthorised access. Access to
organisational data and resources could also inadvertently be exposed to other consumers or be
blocked from legitimate consumers through a configuration or software error, although this is a
risk that is present also amongst non-cloud based deployments.
2.2.3.3 Governance
Loss of control over both the physical and logical aspects of the system and data diminishes the
organisation’s ability to effect changes in security and privacy that are in the best interest of the
operators. The ability to reduce capital investment for computing resources and simultaneously
satisfy computational needs through reductions in operational costs is one of the main
advantages of cloud computing. However, policies and procedures for privacy and security could
be overlooked and the organisation put at risk.
10
2.2.3.4 Physical location
On a public cloud, the physical location of the infrastructure is determined by the cloud provider
as is the design and implementation of the reliability, resource pooling, scalability, and other
logic needed in the support framework.
2.2.4 Hybrid
Hybrid cloud is a model that allows enterprises to create a mixture of public, community and
private clouds, depending on the level of ‘trust’ required for their information assets.
2.3 Cloud Service Providers
The flexibility, lower costs and scalability that cloud services can provide for remote gaming
companies, are more than promising. This is even more so for global cloud service providers
which have high resources and capabilities, providing services at considerable low costs also
through economies of scale. Whether a CSP is a start-up with a small set up or one of the global
cloud service providers, the security and privacy concerns are still considerable and the risks
relevant to the Authority must be addressed, independently of the size and the popularity of
the CSP. Strong privacy and security guarantees is what the industry and what the Authority
demands.
The following are further risks that large and international CSPs may introduce within the
gaming industry.
2.3.1 Physical Security
A major stumbling block to adopt cloud computing within the remote gaming industry seems
to be the difficulty in establishing the geographical location of the physical servers. Use of an
in-house computing centre allows an organisation to structure its computing environment and
to know precisely where data is stored and what safeguards are used to protect the data. In
contrast, a characteristic of many cloud computing services is that data is stored redundantly
in multiple physical locations and detailed information about the location of an organisation’s
data is unavailable or not disclosed to the service consumer. This situation makes it difficult
to ascertain whether sufficient safeguards are in place and whether legal and regulatory
compliance requirements are being met.
2.3.2 Security Features
Cloud service operators provide a number of features that are commonly used in any server
environment to ensure adequate security. Nevertheless, many of them provide additional
configurable options and for this reason it is the operator’s responsibility to implement them in
the most appropriate manner.
2.3.3 Governance
CSPs may allow operators to make use of a private and isolated portion of the cloud without
disclosing the physical location of the data and how it is processed. The Authority recognises
that a cloud customer may find it difficult to exercise any meaningful control over the way
a large (and perhaps global) cloud provider operates. The ‘take it or leave it’ SLAs do not
provide any opportunity for negotiations. However, it the Authority’s view that simply because
an operator chooses to contract for cloud computing services on the basis of the provider’s
standard terms and conditions, this does not exonerate the operator from its responsibilities in
11
this regard. The operator’s deployment logical architecture - whether it is on physical or virtual
servers - will still need to be approved by the Authority as is the current practice.
2.3.4 Legal Issues
Such CSP’s are many times transborder, and different jurisdictions have different legal
requirements, especially concerning personal private information. The CSP will need to host its
service in a manner that is fully compliant with EU data protection and other applicable laws.
2.4 The Current Situation
The Authority must ensure that it has the right policy framework to mitigate any risks and to
seize the full benefits of cloud computing. The Authority’s current practice require that requests
for the use of public or private cloud are dealt with on a case by case basis during the licensing
process of a remote gaming operator.
Operators argue that the current practices which require the tagging of servers run counter
to the agility and benefits of a cloud environment. Tagging of servers is considered to be a
redundant and obsolete requirement by operators. The Authority is at present considering the
feasibility of alternative mechanisms or systems with a view to address this concern.
There are a number of challenges that need to be addressed to ensure that the Authority’s
licensees maximise the benefits to be derived from adoption of a cloud computing environment
whilst ensuring that the risks are mitigated.
The six main areas set out in section 3, sub-sections 3.1 to 3.6, are some of the critical areas
to be addressed if the Maltese jurisdiction is to become cloud-friendly and cloud-active. An
additional and non-exhaustive list of risks introduced or amplified by the adoption of cloud can
also be found in section 6.6.
12
3.An overview of risks related to operating on a Cloud
environment
Cloud computing promises to have far-reaching effects on the systems and work practices of
the licensees and the Authority.
Emphasis on the cost and performance of cloud computing should be balanced with the
fundamental security and privacy concerns the Authority and licensees have with these
computing environments. Many of the features that make cloud computing attractive can also be
at odds with traditional security models and controls.
The first question to ask when evaluating a cloud environment is: “Which information assets will
a remote gaming operator migrate to the cloud environment?” Information assets in the remote
gaming industry can be broadly categorised as; data, applications and processes. These assets
are commonly subjected to the threats set out in this section. In view of the generic nature of
these risks, the Authority recognises that most of them can be mitigated with the adoption of
adequate controls.
3.1 Security
Information security is possibly the biggest concern for cloud users. Whilst security frameworks
already exist, these are not sufficiently adopted across all the cloud deployment models. Illegal
activities affecting cloud computing environments such as (identity and/or data) theft, fraud and
malicious systems and data interference are threats to cloud users and service providers and
can undermine their trust. Threats to data security include the ability of hackers to infiltrate
cloud computing platforms and use cloud infrastructure to attack other machines which could
lead to sensitive data leakage and data loss.
If a multi-tenant cloud service database is not designed properly, a single flaw in one client’s
application could allow an attacker to get at not only that client’s data, but all other clients’ data
as well.
Another key risk in a cloud computing environment is data loss: the prospect of having valuable
data disappear without a trace.
Loss of governance is also an issue when using cloud infrastructure. The operator necessarily
cedes control to the cloud provider on a number of issues which may affect security. At the same
time, the SLAs or controls implemented by CSPs may not provide the security levels required by
the operator, thus leaving a gap in security defences.
3.2 Confidentiality
There is a fear of moving sensitive data to the cloud. The confidentiality of specific data –
personal, gaming and financial - may be at greater risk where remote gaming functions are
placed under the control of cloud systems, when compared to a traditional system. Cloud
computing may increase the risk of account or data traffic hijacking depending on the CSPs
inherent security design and confidentiality processes.
13
3.3 Integrity
The integrity of transaction logs and gaming functionality may be at a heightened risk when
remote gaming functions are under control of cloud systems. Technology vulnerabilities are
a threat that needs to be addressed appropriately in any cloud based remote gaming service.
Cloud service providers share infrastructure, platforms and applications to deliver their services
in a scalable way. If an integral part is compromised, it exposes the entire environment to the
potential of compromise and breach.
3.4 Availability
The Authority considers the availability of gaming and financial transaction logs and customer
accounts at heightened risk where remote gaming functions are under the hosted on cloud systems.
Data are commonly the most valuable assets and the most probable targets of attacks. However,
it is important not to overlook the risk relating to applications and processes.
3.5 Compliance
Investment in achieving certifications (such as ISO 27001 and PCI DSS) as well as the licence
granted to an operator by the Authority may be put at risk by migrating to the cloud if the CSP
cannot:
a)Provide evidence of compliance with the relevant requirements, or
b)Does not permit audits by the operators.
3.6 Jurisdictional / Legal
Cloud computing by its very nature, operates across national boundaries and across territories
with different legal jurisdictions, within and beyond Europe. Legal and Jurisdictional issues
associated with cloud computing could pose additional challenges including:
a)Jurisdictional issues which may impair the Authority’s ability to exercise its functions and
powers as permitted by relevant laws and regulations;
b)Inconsistencies/incompatibilities in laws and regulations across different jurisdictions in
respect of Data Protection and Privacy rights of players and obligations on remote gaming
operators arising there from;
c)Ambiguity in determining who has the burden of preserving data when a client of a cloud
computing provider gets sued;
d)Compliance with garnishee orders, search warrants and possible seizures;
e)Disaster recovery implications.
Operators that are planning to adopt or that have adopted cloud computing must have a clear
understanding of which rules apply, where and how. Among the EU directives and regulations
that may impact Cloud services, the Privacy or Data Protection Directive is one of the most
relevant and important. While there is no question that these requirements are designed to
improve privacy in general, they may create barriers to the provision of cloud services.
Consultation Questions
Q1.
Do you agree with the Authority’s overview of risks in relation to cloud computing
environments?
Q2.
Do you believe that there are other risks that need to be addressed?
14
4.Relevant standards
In compiling its proposals for the purposes of this consultation, the Authority has identified
relevant standards that have been taken into consideration. These include:
a)ISO 27001: 2013: “ISO/IEC 27001 is the best-known standard in the family providing
requirements for an information security management system (ISMS).” (International Standards
Organisation: http://www.iso.org/iso/home/standards/management-standards/iso27001.htm);
b)PCI DSS: “The PCI Security Standards Council offers robust and comprehensive standards
and supporting materials to enhance payment card data security” (Payment Card Industry
Security Council: https://www.pcisecuritystandards.org/security_standards).
Consultation Questions
Q3.
Do you agree with the standards which the Authority has identified as relevant and
within the scope of these guidelines?
Q4.
What are your views, in terms of costs and feasibility, for compliance obligations
arising from the need to obtain and maintain ISO 27001certifications andPCI DSS
Level 1 standards?
15
5.The Authority’s proposal
5.1 The Authority’s position
“An external publicly available cloud, provided from outside the Authority’s approval
process may be used for simple web servers, displaying informative web pages, landing
pages and application servers. However any part of regulated game play, financial
or registration process where personal, financial or game transaction information is
processed and/or stored, may only be handled within a cloud environment, if these
systems are considered by the Authority to be safe and secure under these guidelines”.
5.2 Scope
All personnel, products and processes which may affect the safety, security, fairness or legal
status of any remote gaming operations if these are placed within a cloud infrastructure, shall
be included in the Authority’s standards and guidelines for operators making use of cloud
computing.
5.3 Establishing the context
The regulatory and jurisdictional risk appetite is low compared to commercial entities, so these
standards and guidelines should be consistent with regulatory and jurisdictional risk threshold
and objectives.
Under the cloud computing paradigm, an operator relinquishes direct control over many aspects
of security and privacy and in doing so, confers a high level of trust onto the cloud provider.
At the same time, the Authority has the responsibility to protect information and information
systems commensurate with the risk and magnitude of the harm resulting from unauthorised
access, use, disclosure, disruption, modification or destruction.
5.4 Remote Gaming Components
Challenges exist in understanding and determining the suitability of those cloud systems,
and understanding the context in which the licensees operate and the consequences from
the plausible threats it faces. This section categorises those remote gaming components that
demand a secure and reliable platform.
Critical components are:
a)Random Number Generators (RNG’s);
b)Players’ Data – see Definitions;
c)Financial Data – see Definitions;
d)All instances of databases containing player and financial data intended for disaster recovery
purposes.
These components should be hosted on a Private Cloud environment model and shall be subject
to the proposed approval process set out in section 6
16
Other components can be hosted on any other type Cloud environment model and shall also be
subject to the proposed approval process also set out in section 6.
Consultation Questions
Q5.
What are your views on the LGA’s position on cloud computing?
Q6.
What are your views on the scope and definition of the “critical components” as
proposed?
Q7.
What are your views on the Authority’s position on the hosting location of the critical
components, i.e. “…be hosted on a Private Cloud environment…” as opposed to any
other of the cloud computing models presented in this paper?
Q8.
What are your views on the hosting location of other (non-critical) components?
17
6.Proposed Approval Process
6.1 The Authority’s conformance kite mark
Making use of a cloud computing environment requires a change in mind set. To realise the
benefits of a cloud environment, it is necessary to accept that perimeters become logical rather
than physical, dynamic rather than fixed.
Whereas within a traditional computing model, rights/monitoring were tied to a physical
machine and its location, the policies and privileges assigned to a virtual machine must change.
This requires a re-think of new policies, new tools and new or updated operating practices.
Certification is a proven technique for establishing trust. CSPs may either obtain a kite mark
issued by the Authority or have their systems and controls assessed and/or inspected by the
Authority on a case-by-case basis to verify that their setup meets the criteria established in
the Authority’s guidelines; in the latter case, all expenses will be incurred by the operator. The
ISO 27001 and PCI DSS Level 1 standards will be used as a guideline standard for cloud service
providers.
Operators choosing a CSP which has the Authority’s kite mark, may have their application for a
licence placed on a fast-track.
6.2 Geographic locations
Any operator on a cloud infrastructure must include a list of the premises and the geographic
location of all sites where infrastructure used in a cloud system affects its remote gaming
functionality and data, unless using a CSP that has been pre-approved by the Authority.
6.3 Monitoring and review of the kite mark
CSPs shall conduct, at least annually, a detailed security audit of its cloud service performed by
an independent third party and will be required to provide a copy of the assessment to the cloud
customers and the Authority. The assessment can also be presented to new clients as it will
be sufficiently detailed to allow the cloud customers to make an informed choice as to whether
the provider’s security is appropriate and will, in turn, help the operator to comply with these
guidelines.
The assessment shall include the physical, technical and organisational security measures that
are in place. This audit is a pre-requisite to obtain the kite mark.
6.4 Control of operational documents & records
Transition to a cloud service entails a transfer of the implementation of securing portions to the
cloud provider. To fulfil the obligations of continuous monitoring, the Authority requires the full
cooperation of the cloud provider.
6.5 A Risk-based approach
The transition to an outsourced, public cloud computing environment is in many ways an
exercise in risk management. Risk management entails identifying and assessing risk, and
taking steps to reduce it to an acceptable level.
18
Assessing and managing risk in cloud computing systems requires continuous monitoring of
the security state of the system, and can prove to be challenging, since significant portions of
the computing environment are under the control of the cloud provider and likely beyond the
organisation’s preview.
By virtue of the Remote Gaming regulations, the licensing requirements of the Authority, and the
license conditions, a remote gaming operator, licensed by the Authority, may be obliged to carry
out a system audit as well as a compliance audit. The existing comprehensive process to obtain
and maintain a remote gaming licence remains unchanged.
However where the use of a cloud computing infrastructure is being proposed, a risk
assessment should be undertaken to assess whether cloud platform will meet the licensees’
needs and the authority’s policies. Licensees using pre-approved cloud platforms may be able to
fast track parts of the risk assessment of their application.
A risk assessment should be a requirement as it is a cornerstone to the requirements of these
guidelines. As a minimum the risk assessment submitted by the operator must address the
risks listed in section 6.6. During the licencing process as well as during a licensee’s operation,
the Authority may require further information on how certain risks relating to cloud are being
treated. As part of its licence application the operator shall also include the risk assessment
methodology applied, the acceptable risk level from its point of view, a clear description of what
information is being stored and processed on the cloud and what are the control measures in
place to protect such information.
These areas have been identified as important to assess:
a)Logical isolation techniques employed in the multi-tenant software architecture of the cloud;
b)Facilities for backup and recovery of data, and for sanitisation of data;
c)Capabilities and processes for electronic discovery;
d)Mechanisms used to control access to data, to protect data while at rest, in transit, and in use,
and to expunge data when no longer needed;
e)Mechanisms for secure authentication, authorisation, and other identity and access
management functions;
f) Facilities for incident response and disaster recovery.
6.6 Risks relating to the adoption of Cloud Computing
The following is a non-exhaustive list of risks that an operator may face when making use of
cloud computing. These risks shall be part of a risk assessment that needs to be submitted
together with the policies and procedures made available as part of the licencing process.
During the licencing process as well as during a licensee’s operation, the Authority may require
further information on how certain risks relating to cloud are being treated.
The risk assessment shall take into consideration, as a minimum, all the risks mentioned in
Table 1 as this shall assist the Authority in gauging how well prepared the operator is in using
cloud computing services.
If an operator is making use of a CSP that has obtained the Authority’s kite mark than the
operator would not need to provide an explanation of how some of these risk have been treated.
19
Table 1
Risk # Risk Description
1.
Loss of governance. This risk also takes into consideration the changes to the CSP’s
terms and conditions and service levels whilst an operator is making use of its
services. Such changes may also be a result of the CSP being acquired by a third
party.
2.
Inadequate maintenance of the systems and underlying infrastructure managed by
the CSP.
3.
Leakage of data during transfer within the cloud; between the operator and the cloud
or between player and the cloud.
4.
Insecure data storage.
5.
Information not being erased thoroughly or in a timely manner by the CSP’s systems
following a command issued by the operator.
6.
Unauthorised access to data through the management interface or any other system
within the cloud or interfacing with the cloud.
7.
Loss of privacy.
8.
Unreliable service engine / APIs as well as isolation failure.
9.
Loss incurred due to activities carried out by tenant(s) on the cloud.
10.
Malicious activities by tenant(s) of the cloud or employees of the CSP.
11.
Failure of the CSP’s (or its providers) to provide an adequate level of service. This
includes the risk of heightened dependency on the CSP as well as the complete
cessation of a CSP’s services.
12.
Increased dependency on internet connectivity for the operator to manage its
operation.
13.
Inability for the Authority to confiscate hardware and carry out an investigation.
14.
Loss of intellectual property.
15.
Lack of IT resource capacity.
16.
Denial of Service heightened due to use of the CSP’s services.
17.
Inability to achieve compliance with the Authority’s requirements and other standards
that an operator adheres to.
18.
Non-compliance with legal requirements that both the CSP and operator have to
follow.
19.
Risk of the CSP moving to another jurisdiction that is deemed less safe than the one
previously used.
6.7 Final Considerations
Cloud computing is not a one-size-fits-all product and in many cases it needs to be tailored to fit
the specific needs of an operator or market sector. The compliance issues that arise will depend
on the type of cloud service in question.
Any remote gaming operator considering a move to the cloud must have a clear understanding
of its needs and compliance obligations in order to ensure that the services of cloud providers
are engaged in a manner which adequately mitigate the identified risks.
20
Consultation Questions
Q9.
What are your views on the proposal that operators should submit a risk assessment
to assess whether the cloud platform will meet the LGA’s policies?
Q10.
What are your views on the Authority’s proposal of introducing a kite mark which
will be awarded by the Authority to those Cloud Service Providers that satisfy the
Authority’s requirements on risk assessment?
Q11.
What are your views on the Monitoring and Review of Kite-mark requirements on
CSPs?
Q12.
Do you agree that a license application submitted to the Authority by a remote gaming
operator should be fast-tracked if the cloud service provider has been approved by the
Authority and granted the Kite-mark?
Q13.
Do you believe that the risk register adequately identifies the new or heightened risks
that cloud computing adoption brings with it?
Q14.
Do you consider any of the measures proposed too onerous on the operators or on the
CSPs?
Q15
Are there any other measures that the LGA should introduce in these Guidelines that
can enhance the level of protection to operators’ and player data?
Q16
Are you aware of any other potential risk(s) that has not been covered in the risk
register?
Q17
Are you aware of other constraints that could limit the wider adoption of these
guidelines?
Q18
Do you believe that these recommended guidelines can be considered to be best
practice to help operators protect data when migrating on to cloud environments?
Q19
Do you think that the scope and applicability of the guidelines is clearly defined?
Q20
Should the LGA consider any operators to be excluded from or outside the scope of
these Guidelines?
Q21
Do you think that the Authority’s proposals adequately address the need to strike a
balance between safeguarding the jurisdiction’s reputation, player protection, and the
needs of remote gaming operators?
Q22
Do you think that the guidelines provide enough guidance to Remote Gaming
Operators to adequately assess their obligations arising from these Guidelines?
Q23
Do you think that the critical components, as defined in this Paper, are sufficient to
mitigate the new risks/heightened risks of cloud environments?
Q24
Do you think that the risk register compiled in this paper adequately addresses the
new risks/heightened risk levels in relation to Cloud Computing adoption in the
sector?
Q25
Do you have any other comments or suggestions, which could help make these
Guidelines as comprehensive and clear as possible?
21
7.Consultation procedure
In this section of the consultation paper, the Authority has set out a relevant information about
the process and related information.
7.1 Consultation period
This period of consultation will be for 6 weeks from launch, as follows:
Opening date of consultation
Closing date of consultation
Friday, 31st October 2014
Friday, 12thDecember 2014 at noon
7.2 Queries and contributions
The Authority has set up a dedicated electronic mailbox for the purposes of this consultation.
The Authority will receive queries/requests for clarifications that contributors may have in
respect of the contents of the paper and proposals, and contributions/feedback from interested
parties on the following email address: [email protected]. All queries and contributions will
be acknowledged within 2 working days from receipt.
The Authority will consider only those contributions which clearly identify the originator of the
contribution, contact information, and a clear statement of which interest they represent.
7.3 Questions to be addressed by stakeholders
The Authority is keen to seek the views of stakeholders and has set out a series of questions
throughout this Paper which should be addressed by contributors. Appendix A contains a
consolidated list of the consultation questions. Other comments on the Authority’s position and
proposals will be welcome.
7.4 Direct interaction
Depending on the scope, extent and quality of contributions, the Authority may decide to provide
additional opportunities for contributors to interact directly with Authority via one-to-one
meetings, and/or events.
All one-to-one meetings will be recorded on the transparency register and documented. Any
events which the Authority may decide to organise for the purposes of direct interaction with
relevant stakeholders will be announced on the consultation website and, where applicable,
invitations may also be sent by the Authority to stakeholder groups.
7.5 Transparency register
The Authority will maintain a register containing details of all contributions received. This
register will be published on the Authority’s website following the closing date of the
consultation and not later than Friday, 9th January 2015. The following information will be
published in the register; names of respondents, and all related documents, meeting minutes,
individual contributions.
The Authority will consider contributions which include a request for anonymity on a case-by22
case basis. However, for such requests to be considered, they must include a clear indication
of the interest group which the contributor represents/belongs. Where such requests will
be granted, the contributors information will be anonymised and will clearly indicate the
stakeholder/interest group.
7.6 Post-consultation
The Authority will consider all responses carefully when finalising its proposals, but will
only alter its position if it believes there is a sound basis to do so. Following the end of the
consultation the Authority will prepare a summary of responses, which it will publish alongside
the finalised documents.
23
8.Data Protection Statement - Data Protection Act
(Chapter 440)
As part of this consultation, individuals are invited to forward their recommendations, views and
opinions which will enhance the process. We intend to collect the following information: name of
the organisation or individual responding to the consultation, the contact details of the individual
(e-mail and telephone number). The contact details provided will enable us to contact the
person to clarify their contributions – if the moderator of this consultation needs to seek such
clarifications.
The recommendations will be analysed and placed, in full or in part, on the LGA website after
the consultation has been concluded. The comment of the organisation or the individual will
be accompanied by the ‘Display Name’ as listed at the time when the comment was entered
by the individual. If an individual chooses to have his name removed from the comments, the
moderator will categorise these comments according to the following stakeholders’ list:
• Remote Gaming operators;
• Industry experts;
• Sector associates;
• Citizens;
• Others.
The personal data collected will be processed by the people involved in the consultation process
according to the provisions of the Data Protection Act (Cap 440) and will not be accessed or
disseminated to third parties.
Contributors may request for modification or deletion of their submitted contribution to this
consultation process, by sending their request via e-mail to: [email protected].
In addition, please be aware of:
• Disclosure under the Freedom of Information Act (Chapter 496)
As we are a public authority all documents we hold, including documents related to this
public consultation process, may be released following a request to us under the Freedom of
Information Act (Chap. 496), unless such request may be subject of an exemption arising from
the same Act.
24
Appendix A – Summary of consultation questions
Consultation Questions
Q1.
Do you agree with the Authority’s overview of risks in relation to cloud computing
environments?
Q2.
Do you believe that there are other risks that need to be addressed?
Q3.
Do you agree with the standards which the Authority has identified as relevant and within
the scope of these guidelines?
Q4.
What are your views, in terms of costs and feasibility, for compliance obligations arising
from the need to obtain and maintain ISO 27001certifications and PCI DSS Level 1
standards?
Q5.
What are your views on the LGA’s position on cloud computing?
Q6.
What are your views on the scope and definition of the “critical components” as proposed?
Q7.
What are your views on the Authority’s position on the hosting location of the critical
components, i.e. “…be hosted on a Private Cloud environment…” as opposed to any other of
the cloud computing models presented in this paper?
Q8.
What are your views on the hosting location of other (non-critical) components?
Q9.
What are your views on the proposal that operators should submit a risk assessment to
assess whether the cloud platform will meet the LGA’s policies?
Q10.
What are your views on the Authority’s proposal of introducing a kite mark which will be
awarded by the Authority to those Cloud Service Providers that satisfy the Authority’s
requirements on risk assessment?
Q11.
What are your views on the Monitoring and Review of Kite-mark requirements on CSPs?
Q12.
Do you agree that a license application submitted to the Authority by a remote gaming
operator should be fast-tracked if the cloud service provider has been approved by the
Authority and granted the Kite-mark?
Q13.
Do you believe that the risk register adequately identifies the new or heightened risks that
cloud computing adoption brings with it?
Q14.
Do you consider any of the measures proposed too onerous on the operators or on the
CSPs?
Q15
Are there any other measures that the LGA should introduce in these Guidelines that can
enhance the level of protection to operators’ and player data?
Q16
Are you aware of any other potential risk/s that has not been covered in the risk register?
Q17
Are you aware of other constraints that could limit the wider adoption of these guidelines?
Q18
Do you believe that these recommended guidelines can be considered to be best practice to
help operators protect data when migrating on to cloud environments?
Q19
Do you think that the scope and applicability of the guidelines is clearly defined?
Q20
Should the LGA consider any operators to be excluded from or outside the scope of these
Guidelines?
Q21
Do you think that the Authority’s proposals adequately address the need to strike a balance
between safeguarding the jurisdiction’s reputation, player protection, and the needs of
remote gaming operators?
Q22
Do you think that the guidelines provide enough guidance to Remote Gaming Operators to
adequately assess their obligations arising from these Guidelines?
Q23
Do you think that the critical components, as defined in this Paper, are sufficient to mitigate
the new risks/heightened risks of cloud environments?
Q24
Do you think that the risk register compiled in this paper adequately addresses the new
risks/heightened risk levels in relation to Cloud Computing adoption in the sector?
Q25
Do you have any other comments or suggestions, which could help make these Guidelines
as comprehensive and clear as possible?
25
Notes
26
27