Answer:
A one -two pages menu was written with questions directed to the CSP which is stated below in the explanation section
Step-by-step explanation:
Solution
If CSP has no team or limited staff, you will need to ask the following questions to understand how the CSP is set up:
- Is detailed knowledge of cloud topology, storage devices is available ?
- Are there any restrictions in taking digital evidence from a cloud storage?
- For e-discovery demands on multi tenant cloud systems, is the data of investigation local or remote?
- Does the investigator have the power to make use of cloud staff conduct an investigation?
- What is the relationship of CSP's with cloud users?
- What are the SLA's and what are the guidelines to define them ? SLAs should also specify support options, penalties for services not provided, system performance,fees, provided software/hardware.
- CSP must explain who has the right to access the data ? and limitations for conducting acquisitions for an investigation.
- For guidelines of operations, digital forensics should review CSP's policies, and standards..
- What are the CSP's business continuity and disaster recovery plans.
- Are there Any plans to revise current laws ?
- Are there Any cases involving data commingling with other customer's data?
- Ask What law controls data stored in the cloud is a challenge?
To access evidence in the cloud :
- What is the configuration of the CSP?
- Is the data storage location secretly kept or it is open ?
- Are there any court orders, subpoenas with prior notice, search warrants etc?
- What are the procedures for log keeping ? so that complications we not arise in the investigations chain of evidence.
- What is the configuration of the CSP?
- What is the right key of encryption to read the data if at all the CSP has provided encryption to the data.
- Is there any threat from hackers so that they will not use any malware an modify the file meta data?
- Does CSP have a personnel trained to respond to network incidents?
- Who are the data owners, identity protection, users and access controls for a better role management.