It’s been a busy few months for cloud forensics:
This blog discusses the NIST Cloud Computing Reference Architecture, as we haven’t seen much discussion on that. Read on for a brief history in NIST Cloud Forensics.
Much of the initial kick off of cloud forensics from NIST started with the “Cloud Computing Forensic Science Workshop” a decade ago in 2014. Check out this retro poster:
Off the back of this was the publication “NIST Cloud Computing Forensic Science Challenges”, which entered draft in 2014 and only made it to final publication in 2020.
At a high level, the challenges identified include:
The forensic reference architecture is not a light read. Perhaps the best summary is this section, which outlines the motivations for the forensic reference architecture:
This target audience might ask: “To what extent does the cloud system I’m designing facilitate the use of digital forensics?” The architectural methodology and initial architecture presented in this paper can help this audience identify where there could be potential challenges for conducting forensics and can allow them to focus on areas of potential concern. System trade-offs can be considered as well (e.g., the more that a system facilitates the use of forensics, the greater the negative operational or economic impacts might be, or the greater the chance that privacy might be impacted negatively).
This target audience might ask: “What items do I need to be aware of to conduct digital forensics in the cloud environment versus a traditional or on-premises computing environment?”
This target audience might ask: “What forensic questions and issues do I need to consider when discussing what a cloud provider has to offer?”
While the document describes the motivation for the reference architecture, most of the “meat” is actually in the associated spreadsheet “Forensic Reference Architecture Data Set”, and in particular the tab labelled “Challenges”.
Some of these challenges don’t seem particularly forensic, and frankly a little odd. For example:
However most track closely to the issues our own customers talk to us about, in particular:
Governance
Collection and Preservation
Processing and Analysis
Indeed, the challenges we outline in our introductory presentations of Cado unsurprisingly align closely:
If you would like to see how Cado Security can help you solve your Cloud Computing Forensic Challenges - check out our free trial or request a demo.