incident and its data elements. This would allow for
easier development and deployment of new systems
as well as increase interoperability, as one would not
have to conform to multiple different definitions and
data sets, but can rely on one base format. At the same
time, if an organization needs a different representa-
tion internally, this should still be possible as long as
it is feasible to translate this representation into the
common representation.
Schneier (Schneier, 2014) claims that “Incidents
aren’t standardized; they’re all different.” NIST (Ci-
chonski et al., 2012) further state that each CSIRT
team must choose their own list of required data el-
ements, based on factors like team model, team struc-
ture and how the team defines an incident. This raises
the question of whether it is actually possible to rep-
resent every incident in one format, or if it is a bet-
ter approach to allow multiple formats and thus allow
for specialization. By using only one format that is
able to represent everything, one could, theoretically,
know that all conforming implementations would be
able to understand any incident received and be able
to handle it automatically, if desired. On the other
hand, the format would be very complex, as it needs
to include mechanisms to represent all possible rele-
vant information for any incident imaginable.
We have found the Incident Object Descrip-
tion Exchange Format (IODEF) (Danyliw et al.,
2007) and Structured Threat Information eXpression
(STIX) (Barnum, 2012) to be comprehensive for-
mats for expressing incidents. They can support most
properties included in other relevant formats, like
eCrime (Cain and Jevans, 2010) and Cyber Observ-
able eXpression (CybOX) (The MITRE Corporation,
2015), but also brings along noteworthy challenges.
The formats are complex, making them difficult to un-
derstand for humans.
On the other hand, an option can be to only trans-
fer unstructured text messages between parties in the
cloud supply chain. This would reduce the solution
to be a secure “email” system, and thus in accordance
with how incident information is mostly exchanged
today (Frøystad, 2014). The ability to provide free
text would allow the parties to exchange any informa-
tion required, but they would have to agree on a spe-
cial formatting for the text if planning to support auto-
matic handling of incidents. This would make it eas-
ier to implement the solution, and thus reduce initial
adoption costs. Notable drawbacks of this approach
include fragmentation in message formatting, leading
to potential difficulties for humans in interpreting or
encoding incident information.
A middle ground would be to have a small base
format, with the ability to represent the most common
information in a simple way and providing a struc-
tured way of attaching other incident formats such
as those mentioned above. This allows for reuse of
existing incident formats, specialization, incremental
implementation, and flexibility to support newer for-
mats.
3.2 Notification
At some point, the CSP experiencing an incident
needs to notify its cloud customers – that is other
providers in the cloud supply chain buying services
from the CSP. This could be because required by law,
legal agreements with the cloud customer or because
the CSP strives to be accountable. One approach is to
decide which notifications to send a-priori by the mu-
tual agreement between provider and customer, which
each make sure that they exchange the necessary in-
formation to fulfil the relevant laws and provide suffi-
cient data for information exchange to be useful.
Another approach could be that the provider de-
cides which notifications to send, without the cloud
customer’s influence. This could include notifications
with a core message like: “We have been breached,
but your data was not compromised.”
A hybrid, combining the two, would allow the
mutual agreement to be created by the provider list-
ing which types of incidents the cloud customer is al-
lowed to access, and the cloud customer subscribing
to the incident types he needs. In order to allow the
cloud provider to fulfil any legal obligations to notify
the cloud customer, he could, when obligated by law,
send such notifications whether the cloud customer
subscribes to them or not.
Figure 1 shows an example of the relationship be-
tween service providers and services used, and thus
provides an example of the amount of unneeded or
unwanted incident information a subscriber could re-
ceive if the defined triggers are not taken into account.
E.g. in the case of cloud B, it only uses a fraction of
the services offered by cloud C and D. If cloud B was
notified about all incidents at C and D, this would in-
clude a large amount of unneeded information relat-
ing to services not in use by cloud B. Additionally
if cloud D has thousands of customers, the overhead
of negotiating and defining which incident informa-
tion to share would become noticeable. Therefore, it
is expected to be better to use the hybrid approach,
where the subscriber defines what he wants to be no-
tified about and the provider additionally pushes all
information required by law to the subscriber by us-
ing mandatory notifications that could be defined for
each subscriber.
Security Incident Information Exchange for Cloud Services
393