SlideShare a Scribd company logo
1 of 13
Download to read offline
The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023
© MEDINA Consortium Contract No. GA 952633 Page 1 of 13
www.medina-project.eu
The MEDINA Controlled Natural Language
(Whitepaper)
Editor(s): Marinella Petrocchi, Michela Fazzolari
Responsible Partner: Consiglio Nazionale delle Ricerche (CNR)
Status-Version: Final – v1.0
Date: 30.09.2023
Distribution level (CO, PU): PU
The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023
© MEDINA Consortium Contract No. GA 952633 Page 2 of 13
www.medina-project.eu
Project Number: 952633
Project Title: MEDINA
Editor(s): Marinella Petrocchi, Michela Fazzolari (CNR)
Contributor(s):
Reviewer(s): Cristina Martínez (TECNALIA)
Approved by: All Partners
Recommended readers: Cloud Service Providers, Auditors, IT Security-related
Keyword List: MEDINA Cloud Certification Language, MEDINA CNL, CNL
Licensing information: This work is licensed under Creative Commons
Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0)
http://creativecommons.org/licenses/by-sa/3.0/
Disclaimer This document reflects only the author’s views and
neither Agency nor the Commission are responsible for
any use that may be made of the information contained
therein.
Document Description
Version Date
Modifications Introduced
Modification Reason Modified by
v0.1 07.09.2023 First draft version Marinella Petrocchi
v0.2 11.09.2023 Add MEDINA Template Michela Fazzolari
v0.3 12.09.2023 Add Executive Summary Michela Fazzolari
v0.4 14.09.2023 Add Benefits, Drawbacks and
Conclusions
Michela Fazzolari
v1.0 30.09.2023 Final revised version Cristina Martinez
The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023
© MEDINA Consortium Contract No. GA 952633 Page 3 of 13
www.medina-project.eu
Table of contents
Terms and abbreviations............................................................................................................... 4
Executive Summary....................................................................................................................... 5
1 Introduction ............................................................................................................................. 6
2 Background .............................................................................................................................. 7
3 MEDINA CNL........................................................................................................................... 10
4 Benefits and drawbacks ......................................................................................................... 11
5 Conclusions ............................................................................................................................ 12
6 References ............................................................................................................................. 13
List of figures
FIGURE 1. OPERATIONAL SEMANTICS FOR THE COMPOSITE AUTHORIZATION FRAGMENT, WHERE THE SYMMETRIC
RULE FOR (;) IS OMITTED (SOURCE: UNPUBLISHED MANUSCRIPT, PETROCCHI M AND MATTEUCCI I.)........ 9
The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023
© MEDINA Consortium Contract No. GA 952633 Page 4 of 13
www.medina-project.eu
Terms and abbreviations
BNF Backus-Naur Form
CNL Controlled Natural Language
CNL4DSA Controlled Natural Language for Data Sharing Agreement
CSP Cloud Service Provider
EUCS European Cybersecurity Certification Scheme for Cloud Services
GA Grant Agreement
NL Natural Language
XACML eXtensible Access Control Markup Language
The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023
© MEDINA Consortium Contract No. GA 952633 Page 5 of 13
www.medina-project.eu
Executive Summary
This whitepaper provides an overview of the MEDINA Controlled Natural Language, which has
been designed in the framework of the EU MEDINA project. This document highlights its pivotal
role as a dedicated language designed to express requirements from schemes like the European
Union Cloud Security Certification Scheme (EUCS) in a formal, machine-readable manner, to
automate automatic compliance assessment for cybersecurity certification schemes.
The report initially introduces the motivations behind creating the Medina CNL to bridge the gap
between natural language controls and automated compliance assessment. Then, it presents
the structure and functionality of the Medina CNL, emphasizing its significance within the cloud
service certification context. Furthermore, the benefits of using Medina CNL include enhanced
automation, improved accuracy in compliance checks, and streamlined certification processes.
The drawbacks of the presented approach are primarily related to the learning curve for users
transitioning to CNL-based compliance assessments and potential limitations in expressing
highly complex requirements.
In summary, the MEDINA CNL serves as a critical tool for automating the assessment of
compliance with security certification schemes in cloud services. It bridges the gap between
human-readable security requirements and machine-processing, enhancing the trust and
security of cloud environments.
The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023
© MEDINA Consortium Contract No. GA 952633 Page 6 of 13
www.medina-project.eu
1 Introduction
In an increasingly digitized world, cybersecurity and data protection have become topmost
priority. Regulatory bodies have established stringent requirements to safeguard sensitive
information, particularly in cloud service environments. The adoption of cloud services involves
a shift from direct management and oversight of data and applications to a more indirect form
of control, raising concerns about matters such as security, privacy, transparency, and reliability.
To enhance trust in cloud services, the adoption of Cloud Service certifications has emerged as
an effective remedy.
Cloud Service certifications assure that Cloud Providers adhere to industry standards and best
practices, by offering a certification to validate compliance with one or more security
certification schemes. A security certification scheme, often referred to simply as a certification
scheme, is a structured and standardized framework that defines a set of security requirements,
controls, and guidelines that organizations or systems must adhere to in order to demonstrate
their commitment to security best practices and compliance with established security standards.
However, requirements, controls and guidelines are often conveyed in Natural Language (NL),
making them comprehensible to humans but challenging for automated systems to process and
enforce. This challenge led the MEDINA consortium to define a dedicated language called the
MEDINA Controlled Natural Language (CNL), which allows requirements defined in cybersecurity
certification schemes, such as the European Union Cloud Security Certification Scheme (EUCS)
[1], to be expressed in a formal, processable language.
EUCS controls, like other types of requirements, are written in natural language. While this
allows Cloud Service Providers to understand the specific cloud security certification
requirements, it poses a challenge because natural language is not machine-readable, making it
impossible to automatically verify if controls and requirements are met. To assess compliance
with these requirements in an automated and continuous manner, machine-readable input is
needed, such as the widely accepted XACML standard used in access control rule enforcement.
The controls within the EUCS scheme, which consist of sets of statements, can be likened to
policies. There are several CNLs developed by both academia and industry to articulate such
policies. In this context, this whitepaper will explore languages that articulate policies related to
data management, and will describe in detail the MEDINA CNL.
The remaining part of this document is structured as follows: Section 2 provides some
background information on CNLs in general, and on the CNL that served as a basis for the
MEDINA CNL. Section 3 presents a description of the proposed CNL. Section 4 highlights some
benefits and drawbacks. Section 5 concludes the document.
The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023
© MEDINA Consortium Contract No. GA 952633 Page 7 of 13
www.medina-project.eu
2 Background
Over the past two decades, data protection has become a focal point of discussion across various
domains, including critical infrastructures and social networks. Informally, regulations governing
data protection, storage, and sharing are typically expressed in natural language. However,
bridging the gap between traditional legal contracts that regulate data sharing across different
domains and the underlying software architecture that supports them requires a more
adaptable approach. CNLs serve as a flexible intermediary for achieving this.
Here are some examples of languages and associated tools designed for secure data
management:
• Binder [2] is an open, logic-based security language that encodes security authorizations
among components within distributed communication systems.
• The Rodin platform offers an animation and model-checking toolkit for analysing
properties of specifications based on the Event-B language, which is capable of
expressing security data policies. In a related study [3], the creators of Rodin and Event-
B introduced a formalization of data management clauses using Event-B. They employed
a model checker to ensure that a system adheres to its associated clauses.
• Another noteworthy contribution comes from [4], which presents a comprehensive
framework for articulating highly intricate privacy-related policies, encompassing
purposes and obligations.
• The Klaim family of process calculi [5] provides a high-level model for distributed
systems, enabling programming and control over resource access and usage.
• Additionally, research in [6] delves into policies that regulate the utilization and
replication of information, such as imposing limitations on how often certain
information can be used or copied. The analysis tool employed is a static analyser
designed for a variant of Klaim.
We will now introduce a language previously developed by members of the MEDINA consortium,
known as the Controlled Natural Language for Data Sharing Agreement (CNL4DSA) [7], it was
created to address several key objectives:
• Reducing Adoption Barriers: CNL4DSA aims to lower the hurdles associated with the
adoption of data policies, particularly in the realms of security and privacy.
• Ensuring Formal Policy Mapping: It is designed to ensure that policies can be effectively
mapped to formal languages, allowing for automated policy verification [7].
A data sharing agreement essentially constitutes a contract agreed upon by two or more parties,
outlining terms and conditions governing data sharing, storage, and utilization. This language,
abbreviated as CNL4DSA for brevity, facilitates straightforward yet formal specifications of
various categories of privacy policies, as outlined below:
• Authorizations: These express permissions for subjects to carry out actions on objects
(e.g., data) under specific contextual conditions.
• Obligations: Obligations define instances where subjects are required to perform
actions on objects under specific contextual conditions.
A central concept within CNL4DSA is the fragment f, which takes the form of a tuple: <s, a, o>,
where s represents the subject, a denotes the action, and o signifies the object. In essence, a
fragment conveys that "subject s is performing action a on object o." By introducing "can" and
"must" constructs to the basic fragment, it transforms into an authorization or an obligation,
respectively.
The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023
© MEDINA Consortium Contract No. GA 952633 Page 8 of 13
www.medina-project.eu
Fragments are evaluated within specific contexts denoted as c which are predicates
characterizing factors such as user roles, data categories, time, geographical locations, and
more. Contexts are assessed as either true or false. Examples of simple contexts include "subject
hasRole CSP" or "object hasCategory CloudResource”. In order to describe complex policies,
contexts are composable. A composite context C is defined inductively as follows.
C = c | C and C | C or C | not C
where and, or, and not are Boolean connectors.
The syntax of a composite fragment FM is described by the following Backus-Naur Form BNF-like
syntax:
FM = nil | mod f | FM; FM | if C then FM
where the modality mod ranges over {can, must} and the subscript M ranges over {A, O} where
A stands for Authorization and O stands for Obligation. By changing both the modality and
subscript, we can distinguish between two distinct policy categories: authorizations and
obligations. FA represents a composite authorization fragment, while FO represents a composite
obligation fragment.
Let us now comment on the individual policy constructors:
• nil does nothing.
• mod f is the atomic authorization/obligation fragment that expresses that f = <s,a,o> is
allowed/obliged. Its informal meaning is that “subject s can/must perform action a on
object o”.
• FM ; FM is a list of composite fragments. (Subscript M takes either only O or only A).
• If C then FM expresses the logical implication between a composite context C and a
composite fragment FM: if C holds, then FM is permitted/obliged (according to the value
of M).
CNL4DSA employs an operational semantics rooted in a Modal Transition System (MTS),
enabling the expression of permissible and mandatory requirements for CNL4DSA specifications.
Modal transition systems are utilized to represent the specifications' behaviour. In its original
version [8] MTS is a structure
(𝒜, 𝒮, →◊, →⊡ )
where 𝒮 is a set of specifications, like for example processes in the context of Process Algebras,
𝒜 is the set of actions which specifications may perform, and →◊, →⊡ ⊆ 𝒮 × 𝒜 × 𝒮 are the
two modal transition relations expressing admissible and necessary requirements to the
behaviour of the specifications.
In particular, S
𝒶
→ ◊ S’ with S, S’ ∈ 𝒮 and 𝒶 ∈ 𝒜 means that it is admissible that the
implementation of S performs 𝒶 and then behaves like S’. Dually, S
𝒶
→ ⊡ S’ represents a
transition in which the implementation of S is required to perform 𝒶 and then behaves like S’.
This works under the assumption that all the required transitions are admissible transitions.
Figure 1 shows the operational semantics of FA in terms of a modified label transition system
MTSAuth = (𝒜𝒰𝒯, ℱ , →◊, 𝒞 ). As usual, rules are expressed in terms of a set of premises, possibly
empty (above the line) and a conclusion (below the line).
The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023
© MEDINA Consortium Contract No. GA 952633 Page 9 of 13
www.medina-project.eu
Figure 1. Operational Semantics for the composite authorization fragment, where the
symmetric rule for (;) is omitted (source: unpublished manuscript, Petrocchi M and Matteucci I.)
MTSAuth deals with authorized transitions only and it also considers the set of contexts because
the transitions may depend also on the value of such contexts, see rule (if) in Figure 1.
The introduction of 𝒞 (= a set of predicates) in a labelled transition system is a standard practice
[9]. We observe that the if operator implies the binding of variable appearing in the context C.
The operational semantics of FO is expressed in terms of the modal transition system MTSObl =
(𝑂𝐵𝐿, ℱ , →⊡, 𝒞 ). The axioms and rules are similar to the ones presented for FA apart from
changing the transition relation, that becomes →⊡.
The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023
© MEDINA Consortium Contract No. GA 952633 Page 10 of 13
www.medina-project.eu
3 MEDINA CNL
In this section, we introduce the MEDINA CNL.
Inspired by the presence of the authorization and obligation modalities in CNL4DSA, presented
in Section 2, we further analysed the EUCS draft candidate certification scheme and were able
to summarize the requirements, being either technical or organizational [10] in the following
general textual formula:
The value assumed by the metric x on the resource of type y can/must be equal/major to/minor
to the target value z/must fall in the range of values {z, ...w}.
Paraphrasing part of CNL4DSA, we define a MEDINA fragment as a tuple
f = <rt, m, type(op,tv)>
where rt is a resource type, m is a metric, type(op,tv) specifies the type of the metric, the
designed target value tv for that metric, and the operator op which relates the value of the
metric to tv (e.g., =, >, <, etc.).
A MEDINA fragment says that “the metric m, measured on the resource type rt, has a specific
relation with the value tv of type type, based on the operator op”.
This leads to the following syntax for the MEDINA CNL:
FM = nil | mod f | FM; FM
where M ranges over {A, O} (Authorization/Obligation) and
• nil does nothing.
• mod f is the atomic authorization/obligation MEDINA fragment that expresses that f =
<rt, m, type(op,tv)> is allowed/obliged. Its informal meaning is that “the metric m,
measured on the resource type rt, can/must have a specific relation with the value tv of
type type, based on the operator op”.
• FM ; FM is a list of composite MEDINA fragments.
mod changes depending on whether one wants to express authorizations or obligations:
can <rt, m, type(op,tv)> or must <rt, m, type(op,tv)>
We remind the reader that RT is the resource type, M is a metric associated to the EUCS
requirement, tv is a target value, op is the comparison operator, which indicates how to
compare the target value with the value measured on the resource, with respect to metric M;
finally, type indicates the unit of measure of the target value and the measured value.
The language chosen to represent MEDINA’s requirements is a simple language. However, we
argue that the language is suitable for MEDINA's purpose, which is to create a close-to-standard
language for the representation of cloud certification requirements, and which is then made
machine readable and input to the assessment tools developed within the project, described in
MEDINA Deliverable D3.3 [10].
The language described here was defined as part of the MEDINA research project, and more
information about its use and the components surrounding can be found in the MEDINA
deliverable D2.5 [11].
The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023
© MEDINA Consortium Contract No. GA 952633 Page 11 of 13
www.medina-project.eu
4 Benefits and drawbacks
Incorporating the MEDINA Controlled Natural Language into cybersecurity certification
schemes, particularly within the European Union Cloud Security Certification Scheme (EUCS),
introduces significant advantages as well as some challenges. This section delves into these
benefits and drawbacks, offering a comprehensive perspective on the implications of utilizing
the MEDINA CNL in automated compliance assessments.
One of the most compelling advantages of embracing MEDINA CNL lies in the realm of enhanced
automation. By translating natural language controls into a structured, machine-readable
format, this CNL streamlines the process of evaluating whether cloud service providers adhere
to certification requirements. This heightened level of automation reduces the reliance on
human assessors, leading to faster certification procedures and cost savings. Moreover, the
MEDINA CNL significantly improves the accuracy of compliance assessments. The potential for
ambiguity inherent in natural language controls is effectively mitigated, resulting in more precise
evaluations of compliance. Complex or vaguely defined requirements are no longer susceptible
to misinterpretation, reducing the chances of both false positives and false negatives in
compliance assessments. Standardization and consistency are additional benefits associated
with MEDINA CNL, which enforces a uniform framework for expressing certification
requirements, ensuring that all controls are structured in a consistent manner. This
standardization simplifies the task of comparing and assessing compliance across various Cloud
Service Providers and fosters the creation of unambiguous audit trails. As a result, certification
processes become more efficient, which is particularly advantageous for Cloud Service Providers
seeking rapid certification to gain a competitive edge.
Nevertheless, transitioning from traditional natural language-based compliance assessments to
CNL-based assessments may present a learning curve for assessors and organizations. The need
for training and familiarization with the CNL could potentially lead to an initial slowdown in
certification processes. Moreover, the complexity of expressing certain requirements represents
another challenge. While the CNL simplifies the representation of most controls, highly intricate
or context-specific requirements may prove difficult to accurately convey within the language.
This limitation may require additional efforts to refine CNL constructs for complex scenarios. In
addition, there is the possibility of oversimplification. In some cases, the CNL may simplify
requirements to the point of omitting nuanced aspects of certification controls. Finally,
achieving full interoperability between different CNLs and certification schemes may necessitate
significant coordination and standardization efforts. The absence of such interoperability could
potentially lead to challenges for organizations working across multiple certification schemes
employing different CNLs.
The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023
© MEDINA Consortium Contract No. GA 952633 Page 12 of 13
www.medina-project.eu
5 Conclusions
In this whitepaper, we have explained the central role of the MEDINA Controlled Natural
Language in the context of cybersecurity certification schemes, with a particular focus on the
European Union Cloud Security Certification Scheme (EUCS). This activity has resulted in a
multitude of benefits, even though some associated challenges inherent in integrating MEDINA
CNL into certification processes have been revealed.
The adoption of MEDINA CNL represents a significant leap forward in automating compliance
assessments. By translating natural language controls into a structured, machine-readable
format, this CNL streamlines the certification process, leading to faster assessments, cost
savings, and reduced human error. The potential for ambiguity is significantly mitigated,
enhancing the precision of compliance evaluations.
However, this transition to CNL-based assessments presents also challenges. In conclusion, the
adoption of the MEDINA CNL offers substantial advantages in automating compliance
assessments within cybersecurity certification schemes. While the journey may involve some
hurdles, the benefits of increased efficiency, accuracy, and transparency outweigh the
challenges.
The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023
© MEDINA Consortium Contract No. GA 952633 Page 13 of 13
www.medina-project.eu
6 References
[1] ENISA, “EUCS – Cloud Services Scheme,” [Online]. Available:
https://www.enisa.europa.eu/publications/eucs-cloud-service-scheme . [Accessed Sept. 2023].
[2] M. Abadi, “Logic in access control,” in LICS, 2003.
[3] A. Arenas, B. Aziz, J. Bicarregui and M. Wilson, “An Event-B approach to data sharing
agreements,” in IFM, LNCS 6396, 2010.
[4] Q. Ni and e. al, “Privacy-aware Role-based Access Control,” ACM Transactions on Information
and System Security, 2010.
[5] R. De Nicola, G. Ferrari and R. Pugliese, “Programming Access Control: The KLAIM
Experience,” in CONCUR 2000. LNCS, vol. 1877, 2020.
[6] R. Hansen, F. Nielson, H. Nielson and C. Probst, “Static validation of licence conformance
policies,” in ARES, 2008.
[7] Ilaria Matteucci, Marinella Petrocchi, Marco Luca Sbodio: “CNL4DSA: a controlled natural
language for data sharing agreements,” in SAC 2010: 616-620
[8] K. Larsen and B. Thomsen, “A modal process logic,” in Third Annual Symposium on Logic in
Computer Science, 1988.
[9] J. Bergstra, A. Ponse and S. Smolka, Handbook of Process Algebra, Elsevier, 2011.
[10] MEDINA Consortium, “D3.3 - Tools and techniques for the management of trustworthy
evidence v-3,” 2023.
[11] MEDINA Consortium, “D2.5 – Specification of the Cloud Security Certification Language v-
3,” 2023.

More Related Content

Similar to Whitepaper MEDINA CNL

SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTUREacijjournal
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...IJNSA Journal
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-Lillian Ekwosi-Egbulem
 
Secure Cloud Hosting.paper
Secure Cloud Hosting.paperSecure Cloud Hosting.paper
Secure Cloud Hosting.paperjagan339
 
Private sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesPrivate sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesOllie Whitehouse
 
Audio Video Conferencing in Distributed Brokering Systems
Audio Video Conferencing in Distributed Brokering SystemsAudio Video Conferencing in Distributed Brokering Systems
Audio Video Conferencing in Distributed Brokering SystemsVideoguy
 
A220113
A220113A220113
A220113irjes
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingIJERA Editor
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security IssuesStelios Krasadakis
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  dannyijwest
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 

Similar to Whitepaper MEDINA CNL (20)

SECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURESECURE CLOUD ARCHITECTURE
SECURE CLOUD ARCHITECTURE
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
 
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...A Comprehensive Review on Data Security and Threats for Data Management in Cl...
A Comprehensive Review on Data Security and Threats for Data Management in Cl...
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
 
Secure Cloud Hosting.paper
Secure Cloud Hosting.paperSecure Cloud Hosting.paper
Secure Cloud Hosting.paper
 
Private sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesPrivate sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodes
 
Audio Video Conferencing in Distributed Brokering Systems
Audio Video Conferencing in Distributed Brokering SystemsAudio Video Conferencing in Distributed Brokering Systems
Audio Video Conferencing in Distributed Brokering Systems
 
A220113
A220113A220113
A220113
 
The Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud ComputtiingThe Riisk and Challllenges off Clloud Computtiing
The Riisk and Challllenges off Clloud Computtiing
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
Fog computing
Fog computingFog computing
Fog computing
 
Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  Ant colony Optimization: A Solution of Load balancing in Cloud  
Ant colony Optimization: A Solution of Load balancing in Cloud  
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 

More from MEDINA

MEDINA brochure 2023
MEDINA brochure 2023MEDINA brochure 2023
MEDINA brochure 2023MEDINA
 
Whitepaper MEDINA Continuous Life Cycle Management of Cloud Security Certific...
Whitepaper MEDINA Continuous Life Cycle Management of Cloud Security Certific...Whitepaper MEDINA Continuous Life Cycle Management of Cloud Security Certific...
Whitepaper MEDINA Continuous Life Cycle Management of Cloud Security Certific...MEDINA
 
Whitepaper EUROSCAL MEDINA
Whitepaper EUROSCAL MEDINAWhitepaper EUROSCAL MEDINA
Whitepaper EUROSCAL MEDINAMEDINA
 
MEDINA General Presentation
MEDINA General PresentationMEDINA General Presentation
MEDINA General PresentationMEDINA
 
Towards Continuous Security Compliance in the Cloud Continuum -MEDINA Project...
Towards Continuous Security Compliance in the Cloud Continuum -MEDINA Project...Towards Continuous Security Compliance in the Cloud Continuum -MEDINA Project...
Towards Continuous Security Compliance in the Cloud Continuum -MEDINA Project...MEDINA
 
Assessing the Trustworthiness of AI Systems
Assessing the Trustworthiness of AI SystemsAssessing the Trustworthiness of AI Systems
Assessing the Trustworthiness of AI SystemsMEDINA
 
Automation-based Certification for Cloud Services in Euro
Automation-based Certification for Cloud Services in EuroAutomation-based Certification for Cloud Services in Euro
Automation-based Certification for Cloud Services in EuroMEDINA
 
TAS-S Seminar “From Continuous Monitoring to Continuous Cloud Cybersecurity C...
TAS-S Seminar “From Continuous Monitoring to Continuous Cloud Cybersecurity C...TAS-S Seminar “From Continuous Monitoring to Continuous Cloud Cybersecurity C...
TAS-S Seminar “From Continuous Monitoring to Continuous Cloud Cybersecurity C...MEDINA
 
MEDINA: Standardization to enable continuous cloud cybersecurity certification
MEDINA: Standardization to enable continuous cloud cybersecurity certificationMEDINA: Standardization to enable continuous cloud cybersecurity certification
MEDINA: Standardization to enable continuous cloud cybersecurity certificationMEDINA
 
Paving the road towards continuous auditbased certification for cloud service...
Paving the road towards continuous auditbased certification for cloud service...Paving the road towards continuous auditbased certification for cloud service...
Paving the road towards continuous auditbased certification for cloud service...MEDINA
 
MEDINA - towards continuous (automated) certification of cloud services in Eu...
MEDINA - towards continuous (automated) certification of cloud services in Eu...MEDINA - towards continuous (automated) certification of cloud services in Eu...
MEDINA - towards continuous (automated) certification of cloud services in Eu...MEDINA
 
MEDINA Brochure 2022.pdf
MEDINA Brochure 2022.pdfMEDINA Brochure 2022.pdf
MEDINA Brochure 2022.pdfMEDINA
 
Whitepaper MEDINA Architecture
Whitepaper MEDINA ArchitectureWhitepaper MEDINA Architecture
Whitepaper MEDINA ArchitectureMEDINA
 
MEDINA ESG (Expert Stakeholder Group) presentation
MEDINA ESG (Expert Stakeholder Group) presentationMEDINA ESG (Expert Stakeholder Group) presentation
MEDINA ESG (Expert Stakeholder Group) presentationMEDINA
 
First Impressions on Experimenting with Automated Monitoring Requirements of ...
First Impressions on Experimenting with Automated Monitoring Requirements of ...First Impressions on Experimenting with Automated Monitoring Requirements of ...
First Impressions on Experimenting with Automated Monitoring Requirements of ...MEDINA
 
MEDINA project brochure 2021
MEDINA project brochure 2021MEDINA project brochure 2021
MEDINA project brochure 2021MEDINA
 
Medina general presentation
Medina general presentationMedina general presentation
Medina general presentationMEDINA
 
Medina general presentation
Medina general presentationMedina general presentation
Medina general presentationMEDINA
 
Medina general presentation
Medina general presentationMedina general presentation
Medina general presentationMEDINA
 
Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCS
Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCSDay2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCS
Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCSMEDINA
 

More from MEDINA (20)

MEDINA brochure 2023
MEDINA brochure 2023MEDINA brochure 2023
MEDINA brochure 2023
 
Whitepaper MEDINA Continuous Life Cycle Management of Cloud Security Certific...
Whitepaper MEDINA Continuous Life Cycle Management of Cloud Security Certific...Whitepaper MEDINA Continuous Life Cycle Management of Cloud Security Certific...
Whitepaper MEDINA Continuous Life Cycle Management of Cloud Security Certific...
 
Whitepaper EUROSCAL MEDINA
Whitepaper EUROSCAL MEDINAWhitepaper EUROSCAL MEDINA
Whitepaper EUROSCAL MEDINA
 
MEDINA General Presentation
MEDINA General PresentationMEDINA General Presentation
MEDINA General Presentation
 
Towards Continuous Security Compliance in the Cloud Continuum -MEDINA Project...
Towards Continuous Security Compliance in the Cloud Continuum -MEDINA Project...Towards Continuous Security Compliance in the Cloud Continuum -MEDINA Project...
Towards Continuous Security Compliance in the Cloud Continuum -MEDINA Project...
 
Assessing the Trustworthiness of AI Systems
Assessing the Trustworthiness of AI SystemsAssessing the Trustworthiness of AI Systems
Assessing the Trustworthiness of AI Systems
 
Automation-based Certification for Cloud Services in Euro
Automation-based Certification for Cloud Services in EuroAutomation-based Certification for Cloud Services in Euro
Automation-based Certification for Cloud Services in Euro
 
TAS-S Seminar “From Continuous Monitoring to Continuous Cloud Cybersecurity C...
TAS-S Seminar “From Continuous Monitoring to Continuous Cloud Cybersecurity C...TAS-S Seminar “From Continuous Monitoring to Continuous Cloud Cybersecurity C...
TAS-S Seminar “From Continuous Monitoring to Continuous Cloud Cybersecurity C...
 
MEDINA: Standardization to enable continuous cloud cybersecurity certification
MEDINA: Standardization to enable continuous cloud cybersecurity certificationMEDINA: Standardization to enable continuous cloud cybersecurity certification
MEDINA: Standardization to enable continuous cloud cybersecurity certification
 
Paving the road towards continuous auditbased certification for cloud service...
Paving the road towards continuous auditbased certification for cloud service...Paving the road towards continuous auditbased certification for cloud service...
Paving the road towards continuous auditbased certification for cloud service...
 
MEDINA - towards continuous (automated) certification of cloud services in Eu...
MEDINA - towards continuous (automated) certification of cloud services in Eu...MEDINA - towards continuous (automated) certification of cloud services in Eu...
MEDINA - towards continuous (automated) certification of cloud services in Eu...
 
MEDINA Brochure 2022.pdf
MEDINA Brochure 2022.pdfMEDINA Brochure 2022.pdf
MEDINA Brochure 2022.pdf
 
Whitepaper MEDINA Architecture
Whitepaper MEDINA ArchitectureWhitepaper MEDINA Architecture
Whitepaper MEDINA Architecture
 
MEDINA ESG (Expert Stakeholder Group) presentation
MEDINA ESG (Expert Stakeholder Group) presentationMEDINA ESG (Expert Stakeholder Group) presentation
MEDINA ESG (Expert Stakeholder Group) presentation
 
First Impressions on Experimenting with Automated Monitoring Requirements of ...
First Impressions on Experimenting with Automated Monitoring Requirements of ...First Impressions on Experimenting with Automated Monitoring Requirements of ...
First Impressions on Experimenting with Automated Monitoring Requirements of ...
 
MEDINA project brochure 2021
MEDINA project brochure 2021MEDINA project brochure 2021
MEDINA project brochure 2021
 
Medina general presentation
Medina general presentationMedina general presentation
Medina general presentation
 
Medina general presentation
Medina general presentationMedina general presentation
Medina general presentation
 
Medina general presentation
Medina general presentationMedina general presentation
Medina general presentation
 
Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCS
Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCSDay2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCS
Day2.2 Paving the Road Towards Continuous Certification: OSCAL and the EUCS
 

Recently uploaded

What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 

Recently uploaded (20)

What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 

Whitepaper MEDINA CNL

  • 1. The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023 © MEDINA Consortium Contract No. GA 952633 Page 1 of 13 www.medina-project.eu The MEDINA Controlled Natural Language (Whitepaper) Editor(s): Marinella Petrocchi, Michela Fazzolari Responsible Partner: Consiglio Nazionale delle Ricerche (CNR) Status-Version: Final – v1.0 Date: 30.09.2023 Distribution level (CO, PU): PU
  • 2. The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023 © MEDINA Consortium Contract No. GA 952633 Page 2 of 13 www.medina-project.eu Project Number: 952633 Project Title: MEDINA Editor(s): Marinella Petrocchi, Michela Fazzolari (CNR) Contributor(s): Reviewer(s): Cristina Martínez (TECNALIA) Approved by: All Partners Recommended readers: Cloud Service Providers, Auditors, IT Security-related Keyword List: MEDINA Cloud Certification Language, MEDINA CNL, CNL Licensing information: This work is licensed under Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0) http://creativecommons.org/licenses/by-sa/3.0/ Disclaimer This document reflects only the author’s views and neither Agency nor the Commission are responsible for any use that may be made of the information contained therein. Document Description Version Date Modifications Introduced Modification Reason Modified by v0.1 07.09.2023 First draft version Marinella Petrocchi v0.2 11.09.2023 Add MEDINA Template Michela Fazzolari v0.3 12.09.2023 Add Executive Summary Michela Fazzolari v0.4 14.09.2023 Add Benefits, Drawbacks and Conclusions Michela Fazzolari v1.0 30.09.2023 Final revised version Cristina Martinez
  • 3. The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023 © MEDINA Consortium Contract No. GA 952633 Page 3 of 13 www.medina-project.eu Table of contents Terms and abbreviations............................................................................................................... 4 Executive Summary....................................................................................................................... 5 1 Introduction ............................................................................................................................. 6 2 Background .............................................................................................................................. 7 3 MEDINA CNL........................................................................................................................... 10 4 Benefits and drawbacks ......................................................................................................... 11 5 Conclusions ............................................................................................................................ 12 6 References ............................................................................................................................. 13 List of figures FIGURE 1. OPERATIONAL SEMANTICS FOR THE COMPOSITE AUTHORIZATION FRAGMENT, WHERE THE SYMMETRIC RULE FOR (;) IS OMITTED (SOURCE: UNPUBLISHED MANUSCRIPT, PETROCCHI M AND MATTEUCCI I.)........ 9
  • 4. The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023 © MEDINA Consortium Contract No. GA 952633 Page 4 of 13 www.medina-project.eu Terms and abbreviations BNF Backus-Naur Form CNL Controlled Natural Language CNL4DSA Controlled Natural Language for Data Sharing Agreement CSP Cloud Service Provider EUCS European Cybersecurity Certification Scheme for Cloud Services GA Grant Agreement NL Natural Language XACML eXtensible Access Control Markup Language
  • 5. The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023 © MEDINA Consortium Contract No. GA 952633 Page 5 of 13 www.medina-project.eu Executive Summary This whitepaper provides an overview of the MEDINA Controlled Natural Language, which has been designed in the framework of the EU MEDINA project. This document highlights its pivotal role as a dedicated language designed to express requirements from schemes like the European Union Cloud Security Certification Scheme (EUCS) in a formal, machine-readable manner, to automate automatic compliance assessment for cybersecurity certification schemes. The report initially introduces the motivations behind creating the Medina CNL to bridge the gap between natural language controls and automated compliance assessment. Then, it presents the structure and functionality of the Medina CNL, emphasizing its significance within the cloud service certification context. Furthermore, the benefits of using Medina CNL include enhanced automation, improved accuracy in compliance checks, and streamlined certification processes. The drawbacks of the presented approach are primarily related to the learning curve for users transitioning to CNL-based compliance assessments and potential limitations in expressing highly complex requirements. In summary, the MEDINA CNL serves as a critical tool for automating the assessment of compliance with security certification schemes in cloud services. It bridges the gap between human-readable security requirements and machine-processing, enhancing the trust and security of cloud environments.
  • 6. The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023 © MEDINA Consortium Contract No. GA 952633 Page 6 of 13 www.medina-project.eu 1 Introduction In an increasingly digitized world, cybersecurity and data protection have become topmost priority. Regulatory bodies have established stringent requirements to safeguard sensitive information, particularly in cloud service environments. The adoption of cloud services involves a shift from direct management and oversight of data and applications to a more indirect form of control, raising concerns about matters such as security, privacy, transparency, and reliability. To enhance trust in cloud services, the adoption of Cloud Service certifications has emerged as an effective remedy. Cloud Service certifications assure that Cloud Providers adhere to industry standards and best practices, by offering a certification to validate compliance with one or more security certification schemes. A security certification scheme, often referred to simply as a certification scheme, is a structured and standardized framework that defines a set of security requirements, controls, and guidelines that organizations or systems must adhere to in order to demonstrate their commitment to security best practices and compliance with established security standards. However, requirements, controls and guidelines are often conveyed in Natural Language (NL), making them comprehensible to humans but challenging for automated systems to process and enforce. This challenge led the MEDINA consortium to define a dedicated language called the MEDINA Controlled Natural Language (CNL), which allows requirements defined in cybersecurity certification schemes, such as the European Union Cloud Security Certification Scheme (EUCS) [1], to be expressed in a formal, processable language. EUCS controls, like other types of requirements, are written in natural language. While this allows Cloud Service Providers to understand the specific cloud security certification requirements, it poses a challenge because natural language is not machine-readable, making it impossible to automatically verify if controls and requirements are met. To assess compliance with these requirements in an automated and continuous manner, machine-readable input is needed, such as the widely accepted XACML standard used in access control rule enforcement. The controls within the EUCS scheme, which consist of sets of statements, can be likened to policies. There are several CNLs developed by both academia and industry to articulate such policies. In this context, this whitepaper will explore languages that articulate policies related to data management, and will describe in detail the MEDINA CNL. The remaining part of this document is structured as follows: Section 2 provides some background information on CNLs in general, and on the CNL that served as a basis for the MEDINA CNL. Section 3 presents a description of the proposed CNL. Section 4 highlights some benefits and drawbacks. Section 5 concludes the document.
  • 7. The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023 © MEDINA Consortium Contract No. GA 952633 Page 7 of 13 www.medina-project.eu 2 Background Over the past two decades, data protection has become a focal point of discussion across various domains, including critical infrastructures and social networks. Informally, regulations governing data protection, storage, and sharing are typically expressed in natural language. However, bridging the gap between traditional legal contracts that regulate data sharing across different domains and the underlying software architecture that supports them requires a more adaptable approach. CNLs serve as a flexible intermediary for achieving this. Here are some examples of languages and associated tools designed for secure data management: • Binder [2] is an open, logic-based security language that encodes security authorizations among components within distributed communication systems. • The Rodin platform offers an animation and model-checking toolkit for analysing properties of specifications based on the Event-B language, which is capable of expressing security data policies. In a related study [3], the creators of Rodin and Event- B introduced a formalization of data management clauses using Event-B. They employed a model checker to ensure that a system adheres to its associated clauses. • Another noteworthy contribution comes from [4], which presents a comprehensive framework for articulating highly intricate privacy-related policies, encompassing purposes and obligations. • The Klaim family of process calculi [5] provides a high-level model for distributed systems, enabling programming and control over resource access and usage. • Additionally, research in [6] delves into policies that regulate the utilization and replication of information, such as imposing limitations on how often certain information can be used or copied. The analysis tool employed is a static analyser designed for a variant of Klaim. We will now introduce a language previously developed by members of the MEDINA consortium, known as the Controlled Natural Language for Data Sharing Agreement (CNL4DSA) [7], it was created to address several key objectives: • Reducing Adoption Barriers: CNL4DSA aims to lower the hurdles associated with the adoption of data policies, particularly in the realms of security and privacy. • Ensuring Formal Policy Mapping: It is designed to ensure that policies can be effectively mapped to formal languages, allowing for automated policy verification [7]. A data sharing agreement essentially constitutes a contract agreed upon by two or more parties, outlining terms and conditions governing data sharing, storage, and utilization. This language, abbreviated as CNL4DSA for brevity, facilitates straightforward yet formal specifications of various categories of privacy policies, as outlined below: • Authorizations: These express permissions for subjects to carry out actions on objects (e.g., data) under specific contextual conditions. • Obligations: Obligations define instances where subjects are required to perform actions on objects under specific contextual conditions. A central concept within CNL4DSA is the fragment f, which takes the form of a tuple: <s, a, o>, where s represents the subject, a denotes the action, and o signifies the object. In essence, a fragment conveys that "subject s is performing action a on object o." By introducing "can" and "must" constructs to the basic fragment, it transforms into an authorization or an obligation, respectively.
  • 8. The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023 © MEDINA Consortium Contract No. GA 952633 Page 8 of 13 www.medina-project.eu Fragments are evaluated within specific contexts denoted as c which are predicates characterizing factors such as user roles, data categories, time, geographical locations, and more. Contexts are assessed as either true or false. Examples of simple contexts include "subject hasRole CSP" or "object hasCategory CloudResource”. In order to describe complex policies, contexts are composable. A composite context C is defined inductively as follows. C = c | C and C | C or C | not C where and, or, and not are Boolean connectors. The syntax of a composite fragment FM is described by the following Backus-Naur Form BNF-like syntax: FM = nil | mod f | FM; FM | if C then FM where the modality mod ranges over {can, must} and the subscript M ranges over {A, O} where A stands for Authorization and O stands for Obligation. By changing both the modality and subscript, we can distinguish between two distinct policy categories: authorizations and obligations. FA represents a composite authorization fragment, while FO represents a composite obligation fragment. Let us now comment on the individual policy constructors: • nil does nothing. • mod f is the atomic authorization/obligation fragment that expresses that f = <s,a,o> is allowed/obliged. Its informal meaning is that “subject s can/must perform action a on object o”. • FM ; FM is a list of composite fragments. (Subscript M takes either only O or only A). • If C then FM expresses the logical implication between a composite context C and a composite fragment FM: if C holds, then FM is permitted/obliged (according to the value of M). CNL4DSA employs an operational semantics rooted in a Modal Transition System (MTS), enabling the expression of permissible and mandatory requirements for CNL4DSA specifications. Modal transition systems are utilized to represent the specifications' behaviour. In its original version [8] MTS is a structure (𝒜, 𝒮, →◊, →⊡ ) where 𝒮 is a set of specifications, like for example processes in the context of Process Algebras, 𝒜 is the set of actions which specifications may perform, and →◊, →⊡ ⊆ 𝒮 × 𝒜 × 𝒮 are the two modal transition relations expressing admissible and necessary requirements to the behaviour of the specifications. In particular, S 𝒶 → ◊ S’ with S, S’ ∈ 𝒮 and 𝒶 ∈ 𝒜 means that it is admissible that the implementation of S performs 𝒶 and then behaves like S’. Dually, S 𝒶 → ⊡ S’ represents a transition in which the implementation of S is required to perform 𝒶 and then behaves like S’. This works under the assumption that all the required transitions are admissible transitions. Figure 1 shows the operational semantics of FA in terms of a modified label transition system MTSAuth = (𝒜𝒰𝒯, ℱ , →◊, 𝒞 ). As usual, rules are expressed in terms of a set of premises, possibly empty (above the line) and a conclusion (below the line).
  • 9. The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023 © MEDINA Consortium Contract No. GA 952633 Page 9 of 13 www.medina-project.eu Figure 1. Operational Semantics for the composite authorization fragment, where the symmetric rule for (;) is omitted (source: unpublished manuscript, Petrocchi M and Matteucci I.) MTSAuth deals with authorized transitions only and it also considers the set of contexts because the transitions may depend also on the value of such contexts, see rule (if) in Figure 1. The introduction of 𝒞 (= a set of predicates) in a labelled transition system is a standard practice [9]. We observe that the if operator implies the binding of variable appearing in the context C. The operational semantics of FO is expressed in terms of the modal transition system MTSObl = (𝑂𝐵𝐿, ℱ , →⊡, 𝒞 ). The axioms and rules are similar to the ones presented for FA apart from changing the transition relation, that becomes →⊡.
  • 10. The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023 © MEDINA Consortium Contract No. GA 952633 Page 10 of 13 www.medina-project.eu 3 MEDINA CNL In this section, we introduce the MEDINA CNL. Inspired by the presence of the authorization and obligation modalities in CNL4DSA, presented in Section 2, we further analysed the EUCS draft candidate certification scheme and were able to summarize the requirements, being either technical or organizational [10] in the following general textual formula: The value assumed by the metric x on the resource of type y can/must be equal/major to/minor to the target value z/must fall in the range of values {z, ...w}. Paraphrasing part of CNL4DSA, we define a MEDINA fragment as a tuple f = <rt, m, type(op,tv)> where rt is a resource type, m is a metric, type(op,tv) specifies the type of the metric, the designed target value tv for that metric, and the operator op which relates the value of the metric to tv (e.g., =, >, <, etc.). A MEDINA fragment says that “the metric m, measured on the resource type rt, has a specific relation with the value tv of type type, based on the operator op”. This leads to the following syntax for the MEDINA CNL: FM = nil | mod f | FM; FM where M ranges over {A, O} (Authorization/Obligation) and • nil does nothing. • mod f is the atomic authorization/obligation MEDINA fragment that expresses that f = <rt, m, type(op,tv)> is allowed/obliged. Its informal meaning is that “the metric m, measured on the resource type rt, can/must have a specific relation with the value tv of type type, based on the operator op”. • FM ; FM is a list of composite MEDINA fragments. mod changes depending on whether one wants to express authorizations or obligations: can <rt, m, type(op,tv)> or must <rt, m, type(op,tv)> We remind the reader that RT is the resource type, M is a metric associated to the EUCS requirement, tv is a target value, op is the comparison operator, which indicates how to compare the target value with the value measured on the resource, with respect to metric M; finally, type indicates the unit of measure of the target value and the measured value. The language chosen to represent MEDINA’s requirements is a simple language. However, we argue that the language is suitable for MEDINA's purpose, which is to create a close-to-standard language for the representation of cloud certification requirements, and which is then made machine readable and input to the assessment tools developed within the project, described in MEDINA Deliverable D3.3 [10]. The language described here was defined as part of the MEDINA research project, and more information about its use and the components surrounding can be found in the MEDINA deliverable D2.5 [11].
  • 11. The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023 © MEDINA Consortium Contract No. GA 952633 Page 11 of 13 www.medina-project.eu 4 Benefits and drawbacks Incorporating the MEDINA Controlled Natural Language into cybersecurity certification schemes, particularly within the European Union Cloud Security Certification Scheme (EUCS), introduces significant advantages as well as some challenges. This section delves into these benefits and drawbacks, offering a comprehensive perspective on the implications of utilizing the MEDINA CNL in automated compliance assessments. One of the most compelling advantages of embracing MEDINA CNL lies in the realm of enhanced automation. By translating natural language controls into a structured, machine-readable format, this CNL streamlines the process of evaluating whether cloud service providers adhere to certification requirements. This heightened level of automation reduces the reliance on human assessors, leading to faster certification procedures and cost savings. Moreover, the MEDINA CNL significantly improves the accuracy of compliance assessments. The potential for ambiguity inherent in natural language controls is effectively mitigated, resulting in more precise evaluations of compliance. Complex or vaguely defined requirements are no longer susceptible to misinterpretation, reducing the chances of both false positives and false negatives in compliance assessments. Standardization and consistency are additional benefits associated with MEDINA CNL, which enforces a uniform framework for expressing certification requirements, ensuring that all controls are structured in a consistent manner. This standardization simplifies the task of comparing and assessing compliance across various Cloud Service Providers and fosters the creation of unambiguous audit trails. As a result, certification processes become more efficient, which is particularly advantageous for Cloud Service Providers seeking rapid certification to gain a competitive edge. Nevertheless, transitioning from traditional natural language-based compliance assessments to CNL-based assessments may present a learning curve for assessors and organizations. The need for training and familiarization with the CNL could potentially lead to an initial slowdown in certification processes. Moreover, the complexity of expressing certain requirements represents another challenge. While the CNL simplifies the representation of most controls, highly intricate or context-specific requirements may prove difficult to accurately convey within the language. This limitation may require additional efforts to refine CNL constructs for complex scenarios. In addition, there is the possibility of oversimplification. In some cases, the CNL may simplify requirements to the point of omitting nuanced aspects of certification controls. Finally, achieving full interoperability between different CNLs and certification schemes may necessitate significant coordination and standardization efforts. The absence of such interoperability could potentially lead to challenges for organizations working across multiple certification schemes employing different CNLs.
  • 12. The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023 © MEDINA Consortium Contract No. GA 952633 Page 12 of 13 www.medina-project.eu 5 Conclusions In this whitepaper, we have explained the central role of the MEDINA Controlled Natural Language in the context of cybersecurity certification schemes, with a particular focus on the European Union Cloud Security Certification Scheme (EUCS). This activity has resulted in a multitude of benefits, even though some associated challenges inherent in integrating MEDINA CNL into certification processes have been revealed. The adoption of MEDINA CNL represents a significant leap forward in automating compliance assessments. By translating natural language controls into a structured, machine-readable format, this CNL streamlines the certification process, leading to faster assessments, cost savings, and reduced human error. The potential for ambiguity is significantly mitigated, enhancing the precision of compliance evaluations. However, this transition to CNL-based assessments presents also challenges. In conclusion, the adoption of the MEDINA CNL offers substantial advantages in automating compliance assessments within cybersecurity certification schemes. While the journey may involve some hurdles, the benefits of increased efficiency, accuracy, and transparency outweigh the challenges.
  • 13. The MEDINA Controlled Natural Language Version 1.0 – Final. Date: 30.09.2023 © MEDINA Consortium Contract No. GA 952633 Page 13 of 13 www.medina-project.eu 6 References [1] ENISA, “EUCS – Cloud Services Scheme,” [Online]. Available: https://www.enisa.europa.eu/publications/eucs-cloud-service-scheme . [Accessed Sept. 2023]. [2] M. Abadi, “Logic in access control,” in LICS, 2003. [3] A. Arenas, B. Aziz, J. Bicarregui and M. Wilson, “An Event-B approach to data sharing agreements,” in IFM, LNCS 6396, 2010. [4] Q. Ni and e. al, “Privacy-aware Role-based Access Control,” ACM Transactions on Information and System Security, 2010. [5] R. De Nicola, G. Ferrari and R. Pugliese, “Programming Access Control: The KLAIM Experience,” in CONCUR 2000. LNCS, vol. 1877, 2020. [6] R. Hansen, F. Nielson, H. Nielson and C. Probst, “Static validation of licence conformance policies,” in ARES, 2008. [7] Ilaria Matteucci, Marinella Petrocchi, Marco Luca Sbodio: “CNL4DSA: a controlled natural language for data sharing agreements,” in SAC 2010: 616-620 [8] K. Larsen and B. Thomsen, “A modal process logic,” in Third Annual Symposium on Logic in Computer Science, 1988. [9] J. Bergstra, A. Ponse and S. Smolka, Handbook of Process Algebra, Elsevier, 2011. [10] MEDINA Consortium, “D3.3 - Tools and techniques for the management of trustworthy evidence v-3,” 2023. [11] MEDINA Consortium, “D2.5 – Specification of the Cloud Security Certification Language v- 3,” 2023.