
be evaluated against security metrics previously 
obtained from tests performed on predefined models. 
The specifics of the tests will not be covered, 
however, some guidelines should be followed to 
assure that Cloud specific issues are addressed, such 
as what to what to test, the approach, and how to 
evaluate the results.  
OWASP (2012) has started a new chapter 
denominated “Cloud-10 Project” to approach Cloud 
security risks. OWASP top ten lists are important 
because it helps the enterprises to focus on the most 
serious threats to web applications, and the Cloud-10 
projects is a work in project (Pre-Alpha) to address 
this new paradigm in enterprise computing. OWASP 
top ten lists are maintained by a community of users 
and experts in every domain, and are ranked by 
criteria such as (OWASP, 2012): 
 
  Easily Executable 
  Most Damaging 
  Incidence Frequency (Known) 
 
The OWASP Cloud-10 project defines the criteria 
that can guide the security tests, but an appropriate 
testing methodology is required. The Open Source 
Security Testing Methodology or OSSTMM has its 
focus on operational effectiveness, that is, how it 
works (Herzog, 2011). OSSTMM3 is an evolution 
from a penetration testing methodology which 
evolved to more than a best practices framework by 
2005 (Herzog, 2010) and finally into a more 
contemporary security assessment methodology that 
prioritizes tests (avoiding guesses), concentrates on 
the interactions and its required protections, and 
balance between security and operations (Herzog, 
2011). 
OSSTMM has redirected its focus in the earlier 
releases from testing physical resources such as 
firewalls and routers to verifying operational 
security and its related channels, such as Human, 
Physical, Wireless, Telecommunications, and Data 
Networks (Herzog, 2010) in the latest versions of the 
methodology. OSSTMM also introduces its own 
measurement metrics called ravs, which provides 
graphical representation of system’s states and 
system state changes over time, and are suitable to 
be used in operational monitoring consoles. 
The Cloud Security Alliance (CSA) is a non-
profit organization engaged in providing security 
awareness and tools to adopters. CSA has a specific 
publication providing guidance to Cloud security, 
“Security Guidance for Critical Areas of Focus in 
Cloud Computing” (CSA, 2009), which is structured 
around thirteen domains covering several aspects of 
Cloud security, including Identity and Access 
Management. CSA has also started the “Consensus 
Assessments Initiative” to provide means of 
documenting existing controls for Cloud services, 
This initiative is based on a questionnaire available 
at CSA web site, which can be downloaded, have the 
questions answered and then submitted to the 
repository of respondents where it can be consulted 
by customers. 
Guidance is also provided by the US 
Government, and targeted to U.S. Federal Agencies 
but publicly available. The “Proposed Security 
Assessment and Authorization for U.S. Government 
Cloud Computing” has a strong focus on 
authorization, defines a baseline of security controls 
and a monitoring process, and also proposes a 
framework to assess cloud security during vetting of 
Cloud Service Providers (U.S CIO, 2010). 
4 BACKGROUND CONCEPTS 
The Figure 3 presents our base line model. 
Everything inside the enterprise can be seen as a 
controlled environment, while everything in the 
outside is beyond its control (Grobauer et al, 2011) 
(Hiroyuki et al, 2011), and therefore, must not be 
trusted. That is not to say that an intranet is a safe 
place to run business without protection, which it is 
not. According to the “2011 Cyber Security Watch 
Survey - How Bad Is the Insider Threat?” (CERT 
2011) carried out by the Carnegie Mellon University 
over a population of 607 companies, 27% of all 
security incidents were caused by insiders in 2010, 
at the same time that 46% of all respondents affirm 
that the internal incidents had caused more damage 
than the outside attacks.  
In the Figure 4 we have extended some services 
from the internal enterprise network to a Public 
Cloud, while in Figure 5 it was extended further to 
provide employee’s access to the organization’s 
resources in the Cloud. 
Almost any enterprise application can be 
configured to work in a Public Cloud. However, two 
important factors must be considered: 
 
  The Cloud is not under the Enterprise’s control - 
therefore, it can be considered an uncontrolled 
environment (Hiroyuki et al, 2011). 
  To work with the applications in the Public 
Cloud, it is necessary to cross a potential 
insecure channel: the Internet. 
 
EnterprisetoCloudSecurityAssessment-AMethodusingOSSTMM3.0Concepts
573