{"catalog":{"description":"The Cloud Security Alliance Cloud Controls Matrix (CCM) is specifically designed to provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in assessing the overall security risk of a cloud provider. The CSA CCM provides a controls framework that gives detailed understanding of security concepts and principles that are aligned to the Cloud Security Alliance guidance in 13 domains. The foundations of the Cloud Security Alliance Controls Matrix rest on its customized relationship to other industry-accepted security standards, regulations, and controls frameworks such as the ISO 27001/27002, ISACA COBIT, PCI, NIST, Jericho Forum and NERC CIP and will augment or provide internal control direction for service organization control reports attestations provided by cloud providers.","datePublished":"2019-08-03T20:00:00","uuid":"edfab901-7d4b-4f6e-8b3d-3ebec2420bd1","version":null,"regulationDateModified":null,"abstract":"The Cloud Security Alliance Cloud Controls Matrix (CCM) is specifically designed to provide fundamental security principles to guide cloud vendors and to assist prospective cloud customers in assessing the overall security risk of a cloud provider. The CSA CCM provides a controls framework that gives detailed understanding of security concepts and principles that are aligned to the Cloud Security Alliance guidance in 13 domains. The foundations of the Cloud Security Alliance Controls Matrix rest on its customized relationship to other industry-accepted security standards, regulations, and controls frameworks such as the ISO 27001/27002, ISACA COBIT, PCI, NIST, Jericho Forum and NERC CIP and will augment or provide internal control direction for service organization control reports attestations provided by cloud providers.","url":"https://cloudsecurityalliance.org/artifacts/cloud-controls-matrix-v3-0-1/","defaultName":"csa-ccm-301","title":"CSA Cloud Controls Matrix (CCM) Version 3.0.1","lastRevisionDate":"2024-07-15T12:00:00","regulationDatePublished":"2019-08-03T12:00:00","keywords":"Cloud, CSA, Controls, Compliance, Matrix, Framework","requireUniqueControlId":true,"securityControls":[{"objectives":[],"description":"Applications and programming interfaces (APIs) shall be designed, developed, deployed, and tested in accordance with leading industry standards (e.g., OWASP for web applications) and adhere to applicable legal, statutory, or regulatory compliance obligations.","uuid":"2851794f-07cb-47a1-b930-673ebc9603e3","family":"Application & Interface Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"AIS-01 Application & Interface Security\nApplication Security","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
AIS-01.1Do you use\n industry standards (i.e. OWASP Software Assurance Maturity Model, ISO 27034)\n to build in security for your Systems/Software Development Lifecycle (SDLC)?
AIS-01.2Do\n you use an automated source code analysis tool to detect security defects in\n code prior to production?
AIS-01.3Do\n you use manual source-code analysis to detect security defects in code prior\n to production?
AIS-01.4Do\n you verify that all of your software suppliers adhere to industry standards\n for Systems/Software Development Lifecycle (SDLC) security?
AIS-01.5(SaaS\n only) Do you review your applications for security vulnerabilities and\n address any issues prior to deployment to production?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"AIS-01"},{"objectives":[],"description":"Organizations shall create and maintain a control framework which captures standards, regulatory, legal, and statutory requirements relevant for their business needs. The control framework shall be reviewed at least annually to ensure changes that could affect the business processes are reflected.","uuid":"c5b29c8f-376c-4eb3-8447-df8ee6275540","family":"Audit Assurance & Compliance","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"AAC-03 Audit Assurance & Compliance\nInformation System Regulatory Mapping","ccis":[],"assessmentPlan":"\n \n
AAC-03.1Do you have a\n program in place that includes the ability to monitor changes to the\n regulatory requirements in relevant jurisdictions, adjust your security\n program for changes to legal requirements, and ensure compliance with\n relevant regulatory requirements?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"AAC-03"},{"objectives":[],"description":"A consistent unified framework for business continuity planning and plan development shall be established, documented, and adopted to ensure all business continuity plans are consistent in addressing priorities for testing, maintenance, and information security requirements.
Requirements for business continuity plans include the following:

Defined purpose and scope, aligned with relevant dependencies

Accessible to and understood by those who will use them

Owned by a named person(s) who is responsible for their review, update, and approval

Defined lines of communication, roles, and responsibilities

Detailed recovery procedures, manual work-around, and reference information

Method for plan invocation","uuid":"0354550c-54bc-49d8-aa34-58dee5ce370e","family":"Business Continuity Management & Operational Resilience","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"BCR-01 Business Continuity Management & Operational Resilience\nBusiness Continuity Planning","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
BCR-01.1Does your\n organization have a plan or framework for business continuity management or\n disaster recovery management?
BCR-01.2Do\n you have more than one provider for each service you depend on?
BCR-01.3Do\n you provide a disaster recovery capability?
BCR-01.4Do\n you monitor service continuity with upstream providers in the event of\n provider failure?
BCR-01.5Do\n you provide access to operational redundancy reports, including the services\n you rely on?
BCR-01.6Do\n you provide a tenant-triggered failover option?
BCR-01.7Do\n you share your business continuity and redundancy plans with your tenants?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"BCR-01"},{"objectives":[],"description":"Audit plans shall be developed and maintained to address business process disruptions. Auditing plans shall focus on reviewing the effectiveness of the implementation of security operations. All audit activities must be agreed upon prior to executing any audits.","uuid":"b5a7ddb0-d212-4e81-9b16-aa05d5cd8b61","family":"Audit Assurance & Compliance","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"AAC-01 Audit Assurance & Compliance\nAudit Planning","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
AAC-01.1Do you develop\n and maintain an agreed upon audit plan (e.g., scope, objective, frequency,\n resources,etc.) for reviewing the efficiency and effectiveness of implemented\n security controls?
AAC-01.2Does\n your audit program take into account effectiveness of implementation of\n security operations?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"AAC-01"},{"objectives":[],"description":"Independent reviews and assessments shall be performed at least annually to ensure that the organization addresses nonconformities of established policies, standards, procedures, and compliance obligations.","uuid":"b995b1a8-1f79-45bb-b407-c1cf7d453d45","family":"Audit Assurance & Compliance","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"AAC-02 Audit Assurance & Compliance\nIndependent Audits","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
AAC-02.1Do you allow\n tenants to view your SOC2/ISO 27001 or similar third-party audit or\n certification reports?
AAC-02.2Do\n you conduct network penetration tests of your cloud service infrastructure at\n least annually?
AAC-02.3Do\n you conduct application penetration tests of your cloud infrastructure\n regularly as prescribed by industry best practices and guidance?
AAC-02.4Do\n you conduct internal audits at least annually?
AAC-02.5Do\n you conduct independent audits at least annually?
AAC-02.6Are\n the results of the penetration tests available to tenants at their request?
AAC-02.7Are\n the results of internal and external audits available to tenants at their\n request?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"AAC-02"},{"objectives":[],"description":"Business continuity and security incident response plans shall be subject to testing at planned intervals or upon significant organizational or environmental changes. Incident response plans shall involve impacted customers (tenant) and other business relationships that represent critical intra-supply chain business process dependencies.","uuid":"e006b322-4b05-44d2-a421-8ac427e2b2c6","family":"Business Continuity Management & Operational Resilience","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"BCR-02 Business Continuity Management & Operational Resilience\nBusiness Continuity Testing","ccis":[],"assessmentPlan":"\n \n
BCR-02.1Are business\n continuity plans subject to testing at planned intervals or upon significant\n organizational or environmental changes to ensure continuing effectiveness?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"BCR-02"},{"objectives":[],"description":"Information system documentation (e.g., administrator and user guides, and architecture diagrams) shall be made available to authorized personnel to ensure the following:

Configuring, installing, and operating the information system

Effectively using the system
s security features","uuid":"30ce9d68-5922-4445-aa5d-9a83bfa99e55","family":"Business Continuity Management & Operational Resilience","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"BCR-04 Business Continuity Management & Operational Resilience\nDocumentation","ccis":[],"assessmentPlan":"\n \n
BCR-04.1Are information\n system documents (e.g., administrator and user guides, architecture diagrams,\n etc.) made available to authorized personnel to ensure configuration,\n installation and operation of the information system?
\n
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"BCR-04"},{"objectives":[],"description":"Policies and procedures shall be established and maintained in support of data security to include (confidentiality, integrity, and availability) across multiple system interfaces, jurisdictions, and business functions to prevent improper disclosure, alteration, or destruction.","uuid":"f24725a4-bace-4db3-8351-dc4f649dcd72","family":"Application & Interface Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"AIS-04 Application & Interface Security\nData Security / Integrity","ccis":[],"assessmentPlan":"\n \n
AIS-04.1Is your Data\n Security Architecture designed using an industry standard (e.g., CDSA,\n MULITSAFE, CSA Trusted Cloud Architectural Standard, FedRAMP, CAESARS)?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"AIS-04"},{"objectives":[],"description":"Physical protection against damage from natural causes and disasters, as well as deliberate attacks, including fire, flood, atmospheric electrical discharge, solar induced geomagnetic storm, wind, earthquake, tsunami, explosion, nuclear accident, volcanic activity, biological hazard, civil unrest, mudslide, tectonic activity, and other forms of natural or man-made disaster shall be anticipated, designed, and have countermeasures applied.","uuid":"e83a4e06-dfe6-4042-bdbb-d93f230fed6b","family":"Business Continuity Management & Operational Resilience","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"BCR-05 Business Continuity Management & Operational Resilience\nEnvironmental Risks","ccis":[],"assessmentPlan":"\n \n
BCR-05.1Is physical\n damage anticipated and are countermeasures included in the design of physical\n protections?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"BCR-05"},{"objectives":[],"description":"Data center utilities services and environmental conditions (e.g., water, power, temperature and humidity controls, telecommunications, and internet connectivity) shall be secured, monitored, maintained, and tested for continual effectiveness at planned intervals to ensure protection from unauthorized interception or damage, and designed with automated fail-over or other redundancies in the event of planned or unplanned disruptions.","uuid":"9f48a3dd-0e03-42e1-a503-3ec48fb1a84d","family":"Business Continuity Management & Operational Resilience","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"BCR-03 Business Continuity Management & Operational Resilience\nDatacenter Utilities / Environmental Conditions","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
BCR-03.1Does your\n organization adhere to any international or industry standards when it comes\n to securing, monitoring, maintaining and testing of datacenter utilities\n services and environmental conditions?
BCR-03.2Has\n your organization implemented environmental controls, fail-over mechanisms or\n other redundancies to secure utility services and mitigate environmental\n conditions?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"BCR-03"},{"objectives":[],"description":"Policies and procedures shall be established, and supporting business processes and technical measures implemented, for equipment maintenance ensuring continuity and availability of operations and support personnel.","uuid":"e6d297ce-2c93-49d0-85a0-81c2e630402d","family":"Business Continuity Management & Operational Resilience","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"BCR-07 Business Continuity Management & Operational Resilience Equipment Maintenance","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
BCR-07.1Do you have\n documented policies, procedures and supporting business processes for\n equipment and datacenter maintenance?
BCR-07.2Do\n you have an equipment and datacenter maintenance routine or plan?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"BCR-07"},{"objectives":[],"description":"To reduce the risks from environmental threats, hazards, and opportunities for unauthorized access, equipment shall be kept away from locations subject to high probability environmental risks and supplemented by redundant equipment located at a reasonable distance.","uuid":"c55c7dc8-3815-4a69-a6ed-fc310aeecb1c","family":"Business Continuity Management & Operational Resilience","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"BCR-06 Business Continuity Management & Operational Resilience\nEquipment Location","ccis":[],"assessmentPlan":"\n \n
BCR-06.1Are any of your\n data centers located in places that have a high probability/occurrence of\n high-impact environmental risks (floods, tornadoes, earthquakes, hurricanes,\n etc.)?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"BCR-06"},{"objectives":[],"description":"Protection measures shall be put into place to react to natural and man-made threats based upon a geographically-specific business impact assessment.","uuid":"8ccb8df7-c819-4bce-8afa-90457cd508a0","family":"Business Continuity Management & Operational Resilience","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"BCR-08 Business Continuity Management & Operational Resilience\nEquipment Power Failures","ccis":[],"assessmentPlan":"\n \n
BCR-08.1Are security\n mechanisms and redundancies implemented to protect equipment from utility\n service outages (e.g., power failures, network disruptions, etc.)?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"BCR-08"},{"objectives":[],"description":"Prior to granting customers access to data, assets, and information systems, identified security, contractual, and regulatory requirements for customer access shall be addressed.","uuid":"ec495ab8-8769-4fce-a991-510fba85ceb0","family":"Application & Interface Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"AIS-02 Application & Interface Security\nCustomer Access Requirements","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
AIS-02.1Are all\n identified security, contractual, and regulatory requirements for customer\n access contractually addressed and remediated prior to granting customers\n access to data, assets, and information systems?
AIS- 02.2Are\n all requirements and trust levels for customers’ access defined and\n documented?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"AIS-02"},{"objectives":[],"description":"Policies and procedures shall be established, and supporting business processes and technical measures implemented, for appropriate IT governance and service management to ensure appropriate planning, delivery, and support of the organization's IT capabilities supporting business functions, workforce, and/or customers based on industry acceptable standards (i.e., ITIL v4 and COBIT 5). Additionally, policies and procedures shall include defined roles and responsibilities supported by regular workforce training.","uuid":"e89acfb7-bdbd-4f03-96cb-b7c203f6da1b","family":"Business Continuity Management & Operational Resilience","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"BCR-10 Business Continuity Management & Operational Resilience\nPolicy","ccis":[],"assessmentPlan":"\n \n
BCR-10.1Are policies\n and procedures established and made available for all personnel to adequately\n support services operations’ roles?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"BCR-10"},{"objectives":[],"description":"Policies and procedures shall be established, and supporting business processes and technical measures implemented, for defining and adhering to the retention period of any critical asset as per established policies and procedures, as well as applicable legal, statutory, or regulatory compliance obligations. Backup and recovery measures shall be incorporated as part of business continuity planning and tested accordingly for effectiveness.","uuid":"56f15de4-5cbb-434c-a4f3-269655bbdd25","family":"Business Continuity Management & Operational Resilience","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"BCR-11 Business Continuity Management & Operational Resilience\nRetention Policy","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
BCR-11.1Do you have\n technical capabilities to enforce tenant data retention policies?
BCR-11.2Do\n you have documented policies and procedures demonstrating adherence to data\n retention periods as per legal, statutory or regulatory compliance\n requirements?
BCR-11.3Have\n you implemented backup or recovery mechanisms to ensure compliance with\n regulatory, statutory, contractual or business requirements?
BCR-11.4If\n using virtual infrastructure, does your cloud solution include independent\n hardware restore and recovery capabilities?
BCR-11.5If\n using virtual infrastructure, do you provide tenants with a capability to\n restore a virtual machine to a previous configuration?
BCR-11.6Does\n your cloud solution include software/provider independent restore and\n recovery capabilities?
BCR-11.7Do\n you test your backup or redundancy mechanisms at least annually?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"BCR-11"},{"objectives":[],"description":"External business partners shall adhere to the same policies and procedures for change management, release, and testing as internal developers within the organization (e.g., ITIL service management processes).","uuid":"2a746765-c64f-4f1a-a36b-82e8bbf89b7c","family":"Change Control & Configuration Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"CCC-02 Change Control & Configuration Management\nOutsourced Development","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
CCC-02.1Are policies\n and procedures for change management, release, and testing adequately\n communicated to external business partners?
CCC-02.2Are\n policies and procedures adequately enforced to ensure external business\n partners comply with change management requirements?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"CCC-02"},{"objectives":[],"description":"Policies and procedures shall be established, and supporting business processes and technical measures implemented, to ensure the development and/or acquisition of new data, physical or virtual applications, infrastructure network, and systems components, or any corporate, operations and/or data center facilities have been pre-authorized by the organization's business leadership or other accountable business role or function.","uuid":"65d7b008-5176-4878-adb9-854a299d596b","family":"Change Control & Configuration Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"CCC-01 Change Control & Configuration Management\nNew Development / Acquisition","ccis":[],"assessmentPlan":"\n \n
CCC-01.1Are policies\n and procedures established for management authorization for development or\n acquisition of new applications, systems, databases, infrastructure,\n services, operations and facilities?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"CCC-01"},{"objectives":[],"description":"Data input and output integrity routines (i.e., reconciliation and edit checks) shall be implemented for application interfaces and databases to prevent manual or systematic processing errors, corruption of data, or misuse.","uuid":"50add6ee-de3d-4ae4-934f-d5d7dc95a41c","family":"Application & Interface Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"AIS-03 Application & Interface Security\nData Integrity","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
AIS-03.1Does your data\n management policies and procedures require audits to verify data input and\n output integrity routines?
AIS-03.2Are\n data input and output integrity routines (i.e. MD5/SHA checksums) implemented\n for application interfaces and databases to prevent manual or systematic\n processing errors or corruption of data?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"AIS-03"},{"objectives":[],"description":"Organizations shall follow a defined quality change control and testing process (e.g., ITIL Service Management) with established baselines, testing, and release standards that focus on system availability, confidentiality, and integrity of systems and services.","uuid":"bedcdb6e-d1aa-4a78-a6f5-40d918d0cb27","family":"Change Control & Configuration Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"CCC-03 Change Control & Configuration Management\nQuality Testing","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
CCC-03.1Do you have a\n defined quality change control and testing process in place based on system\n availability, confidentiality, and integrity?
CCC-03.2Is\n documentation describing known issues with certain products/services\n available?
CCC-03.3Are\n there policies and procedures in place to triage and remedy reported bugs and\n security vulnerabilities for product and service offerings?
CCC-03.4Do\n you have controls in place to ensure that standards of quality are being met\n for all software development?
CCC-03.5Do\n you have controls in place to detect source code security defects for any\n outsourced software development activities?
CCC-03.6Are\n mechanisms in place to ensure that all debugging and test code elements are\n removed from released software versions?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"CCC-03"},{"objectives":[],"description":"There shall be a defined and documented method for determining the impact of any disruption to the organization (cloud provider, cloud consumer) that must incorporate the following:

Identify critical products and services

Identify all dependencies, including processes, applications, business partners, and third party service providers

Understand threats to critical products and services

Determine impacts resulting from planned or unplanned disruptions and how these vary over time

Establish the maximum tolerable period for disruption

Establish priorities for recovery

Establish recovery time objectives for resumption of critical products and services within their maximum tolerable period of disruption

Estimate the resources required for resumption","uuid":"0054ed00-6c28-45cb-892e-e33243942ef0","family":"Business Continuity Management & Operational Resilience","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"BCR-09 Business Continuity Management & Operational Resilience\nImpact Analysis","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
BCR-09.1Do you use\n industry standards and frameworks to determine the impact of any disruption\n to your organization (i.e. criticality of services and recovery priorities,\n disruption tolerance, RPO and RTO etc) ?
BCR-09.2Does\n your organization conduct impact analysis pertaining to possible disruptions\n to the cloud service?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"BCR-09"},{"objectives":[],"description":"Policies and procedures shall be established for managing the risks associated with applying changes to:

Business-critical or customer (tenant)-impacting (physical and virtual) applications and system-system interface (API) designs and configurations.

Infrastructure network and systems components.
Technical measures shall be implemented to provide assurance that all changes directly correspond to a registered change request, business-critical or customer (tenant), and/or authorization by, the customer (tenant) as per agreement (SLA) prior to deployment.","uuid":"e5b53269-7662-43ae-9a73-0e1477358a0f","family":"Change Control & Configuration Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"CCC-05 Change Control & Configuration Management\nProduction Changes","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n
CCC-05.1Do you provide\n tenants with documentation that describes your production change management\n procedures and their roles/rights/responsibilities within it?
CCC-05.2Do\n you have policies and procedures established for managing risks with respect\n to change management in production environments?
CCC-0.5.3Do\n you have technical measures in place to ensure that changes in production\n environments are registered, authorized and in adherence with existing SLAs?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"CCC-05"},{"objectives":[],"description":"Data and objects containing data shall be assigned a classification by the data owner based on data type, value, sensitivity, and criticality to the organization.","uuid":"fb4f82a8-d975-47ec-8bdd-e695d15c1a16","family":"Data Security & Information Lifecycle Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"DSI-01 Data Security & Information Lifecycle Management \nClassification","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
DSI-01.1Do you provide\n a capability to identify data and virtual machines via policy tags/metadata\n (e.g., tags can be used to limit guest operating systems from\n booting/instantiating/transporting data in the wrong country)?
DSI-01.2Do\n you provide a capability to identify data and hardware via policy\n tags/metadata/hardware tags (e.g., TXT/TPM, VN-Tag, etc.)?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"DSI-01"},{"objectives":[],"description":"Policies and procedures shall be established, and supporting business processes and technical measures implemented, to inventory, document, and maintain data flows for data that is resident (permanently or temporarily) within the service's geographically distributed (physical and virtual) applications and infrastructure network and systems components and/or shared with other third parties to ascertain any regulatory, statutory, or supply chain agreement (SLA) compliance impact, and to address any other business risks associated with the data. Upon request, provider shall inform customer (tenant) of compliance impact and risk, especially if customer data is used as part of the services.","uuid":"df74d217-d560-4d83-ad6f-d4aa70cf14cc","family":"Data Security & Information Lifecycle Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"DSI-02 Data Security & Information Lifecycle Management\nData Inventory / Flows","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
DSI-02.1Do you\n inventory, document, and maintain data flows for data that is resident\n (permanent or temporary) within the services' applications and infrastructure\n network and systems?
DSI-02.2Can\n you ensure that data does not migrate beyond a defined geographical\n residency?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"DSI-02"},{"objectives":[],"description":"Policies and procedures shall be established, and supporting business processes and technical measures implemented, to restrict the installation of unauthorized software on organizationally-owned or managed user end-point devices (e.g., issued workstations, laptops, and mobile devices) and IT infrastructure network and systems components.","uuid":"a5ccd41c-9f5b-47e0-acce-e203dc674a52","family":"Change Control & Configuration Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"CCC-04 Change Control & Configuration Management\nUnauthorized Software Installations","ccis":[],"assessmentPlan":"\n \n
CCC-04.1Do you have\n controls in place to restrict and monitor the installation of unauthorized\n software onto your systems?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"CCC-04"},{"objectives":[],"description":"Policies and procedures shall be established for the labeling, handling, and security of data and objects which contain data. Mechanisms for label inheritance shall be implemented for objects that act as aggregate containers for data.","uuid":"30d29bb1-69a8-4090-9c3c-e5c3e6edb663","family":"Data Security & Information Lifecycle Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"DSI-04 Data Security & Information Lifecycle Management\nHandling / Labeling / Security Policy","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n
DSI-04.1Are policies\n and procedures established for data labeling and handling in order to ensure\n the security of data and objects that contain data?
DSI-04.2Do\n you follow a structured data-labeling standard (e.g., ISO 15489, Oasis XML\n Catalog Specification, CSA data type guidance)?
DSI-04.3Are\n mechanisms for label inheritance implemented for objects that act as\n aggregate containers for data?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"DSI-04"},{"objectives":[],"description":"Production data shall not be replicated or used in non-production environments. Any use of customer data in non-production environments requires explicit, documented approval from all customers whose data is affected, and must comply with all legal and regulatory requirements for scrubbing of sensitive data elements.","uuid":"1fc129de-4f97-4d80-a66c-489e846ca741","family":"Data Security & Information Lifecycle Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"DSI-05 Data Security & Information Lifecycle Management\nNon-Production Data","ccis":[],"assessmentPlan":"\n \n
DSI-05.1Do you have\n procedures in place to ensure production data shall not be replicated or used\n in non-production environments?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"DSI-05"},{"objectives":[],"description":"All data shall be designated with stewardship, with assigned responsibilities defined, documented, and communicated.","uuid":"e5e1386d-1331-48c2-882e-a3f3d806c271","family":"Data Security & Information Lifecycle Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"DSI-06 Data Security & Information Lifecycle Management\nOwnership / Stewardship","ccis":[],"assessmentPlan":"\n \n
DSI-06.1Are the\n responsibilities regarding data stewardship defined, assigned, documented,\n and communicated?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"DSI-06"},{"objectives":[],"description":"Policies and procedures shall be established with supporting business processes and technical measures implemented for the secure disposal and complete removal of data from all storage media, ensuring data is not recoverable by any computer forensic means.","uuid":"4659fcbe-673b-4727-8a14-496db45b21a3","family":"Data Security & Information Lifecycle Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"DSI-07 Data Security & Information Lifecycle Management\nSecure Disposal","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
DSI-07.1Do you support\n the secure deletion (e.g., degaussing/cryptographic wiping) of archived and\n backed-up data?
DSI-07.2Can\n you provide a published procedure for exiting the service arrangement,\n including assurance to sanitize all computing resources of tenant data once a\n customer has exited your environment or has vacated a resource?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"DSI-07"},{"objectives":[],"description":"Assets must be classified in terms of business criticality, service-level expectations, and operational continuity requirements. A complete inventory of business-critical assets located at all sites and/or geographical locations and their usage over time shall be maintained and updated regularly, and assigned ownership by defined roles and responsibilities.","uuid":"b15d2171-b682-4a6e-b71a-2cb669d83e39","family":"Datacenter Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"DCS-01 Datacenter Security\nAsset Management","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
DCS-01.1Do you classify\n your assets in terms of business criticality, service-level expectations, and\n operational continuity requirements?
DCS-01.2Do\n you maintain a complete inventory of all of your critical assets located at\n all sites/ or geographical locations and their assigned ownership?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"DCS-01"},{"objectives":[],"description":"Physical security perimeters (e.g., fences, walls, barriers, guards, gates, electronic surveillance, physical authentication mechanisms, reception desks, and security patrols) shall be implemented to safeguard sensitive data and information systems.","uuid":"d1de87e5-2480-4bdd-8f45-5a207b1cf21b","family":"Datacenter Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"DCS-02 Datacenter Security\nControlled Access Points","ccis":[],"assessmentPlan":"\n \n
DCS-02.1Are physical\n security perimeters (e.g., fences, walls, barriers, guards, gates, electronic\n surveillance, physical authentication mechanisms, reception desks, and\n security patrols) implemented for all areas housing sensitive data and\n information systems?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"DCS-02"},{"objectives":[],"description":"Data related to electronic commerce (ecommerce) that traverses public networks shall be appropriately classified and protected from fraudulent activity, unauthorized disclosure, or modification in such a manner to prevent contract dispute and compromise of data.","uuid":"6890875a-b6fc-436b-8528-79799bebf542","family":"Data Security & Information Lifecycle Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"DSI-03 Data Security & Information Lifecycle Management\nEcommerce Transactions","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
DSI-03.1Do you provide\n standardized (e.g. ISO/IEC) non-proprietary encryption algorithms (3DES, AES,\n etc.) to tenants in order for them to protect their data if it is required to\n move through public networks (e.g., the Internet)?
DSI-03.2Do\n you utilize open encryption methodologies any time your infrastructure\n components need to communicate with each other via public networks (e.g.,\n Internet-based replication of data from one environment to another)?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"DSI-03"},{"objectives":[],"description":"Automated equipment identification shall be used as a method of connection authentication. Location-aware technologies may be used to validate connection authentication integrity based on known equipment location.","uuid":"e47c4686-f731-4a54-92f0-e704f0e5ad69","family":"Datacenter Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"DCS-03 Datacenter Security\nEquipment Identification","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
DCS-03.1Do you have a\n capability to use system geographic location as an authentication factor?
DCS-03.2Is\n automated equipment identification used as a method to validate connection\n authentication integrity based on known equipment location?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"DCS-03"},{"objectives":[],"description":"Policies and procedures shall be established for the secure disposal of equipment (by asset type) used outside the organization's premises. This shall include a wiping solution or destruction process that renders recovery of information impossible. The erasure shall consist of a full overwrite of the drive to ensure that the erased drive is released to inventory for reuse and deployment, or securely stored until it can be destroyed.","uuid":"c16af9ac-8c50-4d26-82e9-e797f9c55b59","family":"Datacenter Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"DCS-05 Datacenter Security\nOff-Site Equipment","ccis":[],"assessmentPlan":"\n \n
DCS-05.1Can you provide\n tenants with your asset management policies and procedures?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"DCS-05"},{"objectives":[],"description":"Authorization must be obtained prior to relocation or transfer of hardware, software, or data to an offsite premises.","uuid":"722034f8-9662-4ccb-acbf-24c1f821cd5b","family":"Datacenter Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"DCS-04 Datacenter Security\nOff-Site Authorization","ccis":[],"assessmentPlan":"\n \n
DCS-04.1Is\n authorization obtained prior to relocation or transfer of hardware, software,\n or data to an offsite premises?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"DCS-04"},{"objectives":[],"description":"Policies and procedures shall be established, and supporting business processes implemented, for maintaining a safe and secure working environment in offices, rooms, facilities, and secure areas storing sensitive information.","uuid":"d913752f-30e9-4065-8373-18f057741d8f","family":"Datacenter Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"DCS-06 Datacenter Security\nPolicy","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
DCS-06.1Can you provide\n evidence that policies, standards, and procedures have been established for\n maintaining a safe and secure working environment in offices, rooms,\n facilities, and secure areas?
DCS-06.2Can\n you provide evidence that your personnel and involved third parties have been\n trained regarding your documented policies, standards, and procedures?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"DCS-06"},{"objectives":[],"description":"Ingress and egress to secure areas shall be constrained and monitored by physical access control mechanisms to ensure that only authorized personnel are allowed access.","uuid":"7e76ef10-5abb-4908-a6f5-162fcc3ea704","family":"Datacenter Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"DCS-07 Datacenter Security\nSecure Area Authorization","ccis":[],"assessmentPlan":"\n \n
DCS-07.1Are physical\n access control mechanisms (e.g. CCTV cameras, ID cards, checkpoints) in place\n to secure, constrain and monitor egress and ingress points?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"DCS-07"},{"objectives":[],"description":"Physical access to information assets and functions by users and support personnel shall be restricted.","uuid":"b0f0c576-49ea-4504-be7a-62fb7256997f","family":"Datacenter Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"DCS-09 Datacenter Security\nUser Access","ccis":[],"assessmentPlan":"\n \n
DCS-09.1Do you restrict\n physical access to information assets and functions by users and support\n personnel?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"DCS-09"},{"objectives":[],"description":"Ingress and egress points such as service areas and other points where unauthorized personnel may enter the premises shall be monitored, controlled and, if possible, isolated from data storage and processing facilities to prevent unauthorized data corruption, compromise, and loss.","uuid":"03540f91-2550-453c-a4ae-a5c005e76b84","family":"Datacenter Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"DCS-08 Datacenter Security\nUnauthorized Persons Entry","ccis":[],"assessmentPlan":"\n \n
DCS-08.1Are ingress and\n egress points, such as service areas and other points where unauthorized\n personnel may enter the premises, monitored, controlled and isolated from\n data storage and process?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"DCS-08"},{"objectives":[],"description":"Policies and procedures shall be established for the management of cryptographic keys in the service's cryptosystem (e.g., lifecycle management from key generation to revocation and replacement, public key infrastructure, cryptographic protocol design and algorithms used, access controls in place for secure key generation, and exchange and storage including segregation of keys used for encrypted data or sessions). Upon request, provider shall inform the customer (tenant) of changes within the cryptosystem, especially if the customer (tenant) data is used as part of the service, and/or the customer (tenant) has some shared responsibility over implementation of the control.","uuid":"aa300d13-6f52-480f-ac11-14fe1da09a7b","family":"Encryption & Key Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"EKM-02 Encryption & Key Management\nKey Generation","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
EKM-02.1Do you have a\n capability to allow creation of unique encryption keys per tenant?
EKM-02.2Do\n you have a capability to manage encryption keys on behalf of tenants?
EKM-02.3Do\n you maintain key management procedures?
EKM-02.4Do\n you have documented ownership for each stage of the lifecycle of encryption\n keys?
EKM-02.5Do\n you utilize any third party/open source/proprietary frameworks to manage\n encryption keys?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"EKM-02"},{"objectives":[],"description":"Keys must have identifiable owners (binding keys to identities) and there shall be key management policies.","uuid":"edaf571c-e097-4f3f-9804-70ec6b3838eb","family":"Encryption & Key Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"EKM-01 Encryption & Key Management\nEntitlement","ccis":[],"assessmentPlan":"\n \n
EKM-01.1Do you have key\n management policies binding keys to identifiable owners?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"EKM-01"},{"objectives":[],"description":"Policies and procedures shall be established, and supporting business processes and technical measures implemented, for the use of encryption protocols for protection of sensitive data in storage (e.g., file servers, databases, and end-user workstations), data in use (memory), and data in transmission (e.g., system interfaces, over public networks, and electronic messaging) as per applicable legal, statutory, and regulatory compliance obligations.","uuid":"f6b8af70-f6a1-4e20-bdc1-21021c07962e","family":"Encryption & Key Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"EKM-03 Encryption & Key Management\nSensitive Data Protection","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n
EKM-03.1Do you encrypt\n tenant data at rest (on disk/storage) within your environment?
EKM-03.2Do\n you leverage encryption to protect data and virtual machine images during\n transport across and between networks and hypervisor instances?
EKM-03.3Do\n you have documentation establishing and defining your encryption management\n policies, procedures, and guidelines?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"EKM-03"},{"objectives":[],"description":"Platform and data-appropriate encryption (e.g., AES-256) in open/validated formats and standard algorithms shall be required. Keys shall not be stored in the cloud (i.e., at the cloud provider in question), but maintained by the cloud consumer or trusted key management provider. Key management and key usage shall be separated duties.","uuid":"7d65f811-fe7b-4ba1-9a19-43bd05563dea","family":"Encryption & Key Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"EKM-04 Encryption & Key Management\nStorage and Access","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
EKM-04.1Do you have\n platform and data appropriate encryption that uses open/validated formats and\n standard algorithms?
EKM-04.2Are\n your encryption keys maintained by the cloud consumer or a trusted key\n management provider?
EKM-04.3Do\n you store encryption keys in the cloud?
EKM-04.4Do\n you have separate key management and key usage duties?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"EKM-04"},{"objectives":[],"description":"Managers are responsible for maintaining awareness of, and complying with, security policies, procedures, and standards that are relevant to their area of responsibility.","uuid":"9483c529-d457-4055-953e-ef2753c5c164","family":"Governance & Risk Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"GRM-03 Governance and Risk Management\nManagement Oversight","ccis":[],"assessmentPlan":"\n \n
GRM-03.1Are your\n technical, business, and executive managers responsible for maintaining\n awareness of and compliance with security policies, procedures, and standards\n for both themselves and their employees as they pertain to the manager and\n employees' area of responsibility?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"GRM-03"},{"objectives":[],"description":"Baseline security requirements shall be established for developed or acquired, organizationally-owned or managed, physical or virtual, applications and infrastructure system and network components that comply with applicable legal, statutory, and regulatory compliance obligations. Deviations from standard baseline configurations must be authorized following change management policies and procedures prior to deployment, provisioning, or use. Compliance with security baseline requirements must be reassessed at least annually unless an alternate frequency has been established and authorized based on business needs.","uuid":"aae2c2c9-8a07-4478-9a54-6e7dad85c36f","family":"Governance & Risk Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"GRM-01 Governance and Risk Management\nBaseline Requirements","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
GRM-01.1Do you have\n documented information security baselines for every component of your\n infrastructure (e.g., hypervisors, operating systems, routers, DNS servers,\n etc.)?
GRM-01.2Do\n you have the capability to continuously monitor and report the compliance of\n your infrastructure against your information security baselines?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"GRM-01"},{"objectives":[],"description":"Risk assessments associated with data governance requirements shall be conducted at planned intervals and shall consider the following:

Awareness of where sensitive data is stored and transmitted across applications, databases, servers, and network infrastructure

Compliance with defined retention periods and end-of-life disposal requirements

Data classification and protection from unauthorized use, access, loss, destruction, and falsification","uuid":"54c64adb-8850-4fe5-83c6-9c77c9d465e8","family":"Governance & Risk Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"GRM-02 Governance and Risk Management\nData Focus Risk Assessments","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
GRM-02.1Does your\n organization's risk assessments take into account awareness of data\n residency, legal and statutory requirements for retention periods and data\n protection and classification?
GRM-02.2Do\n you conduct risk assessments associated with data governance requirements at\n least once a year?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"GRM-02"},{"objectives":[],"description":"An Information Security Management Program (ISMP) shall be developed, documented, approved, and implemented that includes administrative, technical, and physical safeguards to protect assets and data from loss, misuse, unauthorized access, disclosure, alteration, and destruction. The security program shall include, but not be limited to, the following areas insofar as they relate to the characteristics of the business:

Risk management

Security policy

Organization of information security

Asset management

Human resources security

Physical and environmental security

Communications and operations management

Access control

Information systems acquisition, development, and maintenance","uuid":"542bc2ac-5dbd-4fcc-9247-45806ffc19fa","family":"Governance & Risk Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"GRM-04 Governance and Risk Management\nManagement Program","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
GRM-04.1Do you provide\n tenants with documentation describing your Information Security Management\n Program (ISMP)?
GRM-04.2Do\n you review your Information Security Management Program (ISMP) at least once\n a year?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"GRM-04"},{"objectives":[],"description":"Executive and line management shall take formal action to support information security through clearly-documented direction and commitment, and shall ensure the action has been assigned.","uuid":"7f0dda18-9fab-4796-b562-386520c9351f","family":"Governance & Risk Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"GRM-05 Governance and Risk Management\nManagement Support/Involvement","ccis":[],"assessmentPlan":"\n \n
GRM-05.1Do executive\n and line management take formal action to support information security\n through clearly-documented direction and commitment, and ensure the action\n has been assigned?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"GRM-05"},{"objectives":[],"description":"Risk assessment results shall include updates to security policies, procedures, standards, and controls to ensure that they remain relevant and effective.","uuid":"19146463-8f38-4156-89a5-efbc10425dc0","family":"Governance & Risk Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"GRM-08 Governance and Risk Management\nPolicy Impact on Risk Assessments","ccis":[],"assessmentPlan":"\n \n
GRM-08.1Do risk\n assessment results include updates to security policies, procedures,\n standards, and controls to ensure they remain relevant and effective?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"GRM-08"},{"objectives":[],"description":"A formal disciplinary or sanction policy shall be established for employees who have violated security policies and procedures. Employees shall be made aware of what action might be taken in the event of a violation, and disciplinary measures must be stated in the policies and procedures.","uuid":"1725ce7e-c5b1-4dda-82d0-bd7ac726f664","family":"Governance & Risk Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"GRM-07 Governance and Risk Management\nPolicy Enforcement","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
GRM-07.1Is a formal\n disciplinary or sanction policy established for employees who have violated\n security policies and procedures?
GRM-07.2Are\n employees made aware of what actions could be taken in the event of a\n violation via their policies and procedures?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"GRM-07"},{"objectives":[],"description":"Information security policies and procedures shall be established and made readily available for review by all impacted personnel and external business relationships. Information security policies must be authorized by the organization's business leadership (or other accountable business role or function) and supported by a strategic business plan and an information security management program inclusive of defined information security roles and responsibilities for business leadership.","uuid":"560c6231-3a2c-443c-9d21-3b6a5f2060e8","family":"Governance & Risk Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"GRM-06 Governance and Risk Management\nPolicy","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
GRM-06.1Are your\n information security policies and procedures made available to all impacted\n personnel and business partners, authorized by accountable business\n role/function and supported by the information security management program as\n per industry best practices (e.g. ISO 27001, SOC 2)?
GRM-06.2Are\n information security policies authorized by the organization's business\n leadership (or other accountable business role or function) and supported by\n a strategic business plan and an information security management program\n inclusive of defined information security roles and responsibilities for\n business leadership?
GRM-06.3Do\n you have agreements to ensure your providers adhere to your information\n security and privacy policies?
GRM-06.4Can\n you provide evidence of due diligence mapping of your controls, architecture,\n and processes to regulations and/or standards?
GRM-06.5Do\n you disclose which controls, standards, certifications, and/or regulations\n you comply with?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"GRM-06"},{"objectives":[],"description":"The organization's business leadership (or other accountable business role or function) shall review the information security policy at planned intervals or as a result of changes to the organization to ensure its continuing alignment with the security strategy, effectiveness, accuracy, relevance, and applicability to legal, statutory, or regulatory compliance obligations.","uuid":"6b05b9d0-3d2d-4902-b386-f3b49a3a7dfa","family":"Governance & Risk Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"GRM-09 Governance and Risk Management\nPolicy Reviews","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
GRM-09.1Do you notify\n your tenants when you make material changes to your information security\n and/or privacy policies?
GRM-09.2Do\n you perform, at minimum, annual reviews to your privacy and security\n policies?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"GRM-09"},{"objectives":[],"description":"Risks shall be mitigated to an acceptable level. Acceptance levels based on risk criteria shall be established and documented in accordance with reasonable resolution time frames and stakeholder approval.","uuid":"6402454b-9d93-467e-aae7-abb6078f8a2d","family":"Governance & Risk Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"GRM-11 Governance and Risk Management\nRisk Management Framework","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
GRM-11.1Do you have a\n documented, organization-wide program in place to manage risk?
GRM-11.2Do\n you make available documentation of your organization-wide risk management\n program?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"GRM-11"},{"objectives":[],"description":"Aligned with the enterprise-wide framework, formal risk assessments shall be performed at least annually or at planned intervals, (and in conjunction with any changes to information systems) to determine the likelihood and impact of all identified risks using qualitative and quantitative methods. The likelihood and impact associated with inherent and residual risk shall be determined independently, considering all risk categories (e.g., audit results, threat and vulnerability analysis, and regulatory compliance).","uuid":"b7468698-5188-466c-88b3-7b48eb2017e6","family":"Governance & Risk Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"GRM-10 Governance and Risk Management\nRisk Assessments","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
GRM-10.1Are formal risk\n assessments aligned with the enterprise-wide framework and performed at least\n annually, or at planned intervals, determining the likelihood and impact of\n all identified risks, using qualitative and quantitative methods?
GRM-10.2Is\n the likelihood and impact associated with inherent and residual risk\n determined independently, considering all risk categories?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"GRM-10"},{"objectives":[],"description":"Upon termination of workforce personnel and/or expiration of external business relationships, all organizationally-owned assets shall be returned within an established period.","uuid":"7a798e74-4cb8-4f83-aafb-3119976bfd34","family":"Human Resources","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"HRS-01 Human Resources\nAsset Returns","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
HRS-01.1Upon\n termination of contract or business relationship, are employees and business\n partners adequately informed of their obligations for returning\n organizationally-owned assets?
HRS-01.2Do\n you have asset return procedures outlining how assets should be returned\n within an established period?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"HRS-01"},{"objectives":[],"description":"Employment agreements shall incorporate provisions and/or terms for adherence to established information governance and security policies and must be signed by newly hired or on-boarded workforce personnel (e.g., full or part-time employee or contingent staff) prior to granting workforce personnel user access to corporate facilities, resources, and assets.","uuid":"89e37d6d-ffa4-4021-b161-81c11671a717","family":"Human Resources","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"HRS-03 Human Resources\nEmployment Agreements","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
HRS-03.1Do your\n employment agreements incorporate provisions and/or terms in adherence to\n established information governance and security policies?
\n
\n
HRS-03.2Do\n you require that employment agreements are signed by newly hired or\n on-boarded workforce personnel prior to granting workforce personnel user\n access to corporate facilities, resources, and assets? 
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"HRS-03"},{"objectives":[],"description":"Pursuant to local laws, regulations, ethics, and contractual constraints, all employment candidates, contractors, and third parties shall be subject to background verification proportional to the data classification to be accessed, the business requirements, and acceptable risk.","uuid":"07682661-f3c7-47ec-a173-a14f354fe65b","family":"Human Resources","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"HRS-02 Human Resources\nBackground Screening","ccis":[],"assessmentPlan":"\n \n
HRS-02.1Pursuant to\n local laws, regulations, ethics, and contractual constraints, are all\n employment candidates, contractors, and involved third parties subject to\n background verification?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"HRS-02"},{"objectives":[],"description":"Roles and responsibilities for performing employment termination or change in employment procedures shall be assigned, documented, and communicated.","uuid":"695a9cda-2998-45fd-8173-053a95287067","family":"Human Resources","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"HRS-04 Human Resources\nEmployment Termination","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
HRS-04.1Are documented\n policies, procedures, and guidelines in place to govern change in employment\n and/or termination?
HRS-04.2Do\n the above procedures and guidelines account for timely revocation of access\n and return of assets?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"HRS-04"},{"objectives":[],"description":"Policies and procedures shall be established, and supporting business processes and technical measures implemented, to manage business risks associated with permitting mobile device access to corporate resources and may require the implementation of higher assurance compensating controls and acceptable-use policies and procedures (e.g., mandated security training, stronger identity, entitlement and access controls, and device monitoring).","uuid":"12d1333f-f3c8-4225-9425-5536138427bc","family":"Human Resources","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"HRS-05 Human Resources\nMobile Device Management","ccis":[],"assessmentPlan":"\n \n
HRS-05.1Are policies\n and procedures established and measures implemented to strictly limit access\n to your sensitive data and tenant data from portable and mobile devices\n (e.g., laptops, cell phones, and personal digital assistants (PDAs)), which\n are generally higher-risk than non-portable devices (e.g., desktop computers\n at the provider organization’s facilities)?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"HRS-05"},{"objectives":[],"description":"Requirements for non-disclosure or confidentiality agreements reflecting the organization's needs for the protection of data and operational details shall be identified, documented, and reviewed at planned intervals.","uuid":"2c6c425b-749f-4f5b-80b2-bd3a86c3fc5e","family":"Human Resources","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"HRS-06 Human Resources\nNon-Disclosure Agreements","ccis":[],"assessmentPlan":"\n \n
HRS-06.1Are\n requirements for non-disclosure or confidentiality agreements reflecting the\n organization's needs for the protection of data and operational details\n identified, documented, and reviewed at planned intervals?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"HRS-06"},{"objectives":[],"description":"Policies and procedures shall be established, and supporting business processes and technical measures implemented, for defining allowances and conditions for permitting usage of organizationally-owned or managed user end-point devices (e.g., issued workstations, laptops, and mobile devices) and IT infrastructure network and systems components. Additionally, defining allowances and conditions to permit usage of personal mobile devices and associated applications with access to corporate resources (i.e., BYOD) shall be considered and incorporated as appropriate.","uuid":"9a625493-e0c2-4c14-b807-bb8496ba01ab","family":"Human Resources","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"HRS-08 Human Resources\nTechnology Acceptable Use","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
HRS-08.1Do you have\n policies and procedures in place to define allowances and conditions for\n permitting usage of organizationally-owned or managed user end-point devices\n and IT infrastructure network and systems components? 
HRS-08.2Do\n you define allowance and conditions for BYOD devices and its applications to\n access corporate resources?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"HRS-08"},{"objectives":[],"description":"Roles and responsibilities of contractors, employees, and third-party users shall be documented as they relate to information assets and security.","uuid":"3d4789e5-5914-4fd0-a881-2cf98acb0a20","family":"Human Resources","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"HRS-07 Human Resources\nRoles / Responsibilities","ccis":[],"assessmentPlan":"\n \n
HRS-07.1Do you provide\n tenants with a role definition document clarifying your administrative\n responsibilities versus those of the tenant?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"HRS-07"},{"objectives":[],"description":"A security awareness training program shall be established for all contractors, third-party users, and employees of the organization and mandated when appropriate. All individuals with access to organizational data shall receive appropriate awareness training and regular updates in organizational procedures, processes, and policies relating to their professional function relative to the organization.","uuid":"53bba7e2-8f37-4151-9e78-e095a234f6b7","family":"Human Resources","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"HRS-09 Human Resources\nTraining / Awareness","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
HRS-09.1Do you provide\n a formal, role-based, security awareness training program for cloud-related\n access and data management issues (e.g., multi-tenancy, nationality, cloud\n delivery model, segregation of duties implications, and conflicts of\n interest) for all persons with access to tenant data?
HRS-09.2Do\n you specifically train your employees regarding their specific role and the\n information security controls they must fulfill?
HRS-09.3Do\n you document employee acknowledgment of training they have completed?
HRS-09.4Is\n successful and timed completion of the training program(s) considered a\n prerequisite for acquiring and maintaining access to sensitive systems?
HRS-09.5Are\n personnel trained and provided with awareness programs at least once a year?
HRS-09.6Are\n administrators and data stewards properly educated on their legal\n responsibilities with regard to security and data integrity?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"HRS-09"},{"objectives":[],"description":"All personnel shall be made aware of their roles and responsibilities for:

Maintaining awareness and compliance with established policies and procedures and applicable legal, statutory, or regulatory compliance obligations.

Maintaining a safe and secure working environment","uuid":"5623ab8d-bf31-43f9-bbd3-3d40f2528efb","family":"Human Resources","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"HRS-10 Human Resources\nUser Responsibility","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n
HRS-10.1Are personnel\n informed of their responsibilities for maintaining awareness and compliance\n with published security policies, procedures, standards, and applicable\n regulatory requirements?
HRS-10.2Are\n personnel informed of their responsibilities for maintaining a safe and\n secure working environment?
HRS-10.3Are\n personnel informed of their responsibilities for ensuring that equipment is\n secured and not left unattended?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"HRS-10"},{"objectives":[],"description":"Access to, and use of, audit tools that interact with the organization's information systems shall be appropriately segregated and access restricted to prevent inappropriate disclosure and tampering of log data.","uuid":"d4b22f5b-e875-4d3b-b5a0-829394dbae5b","family":"Identity & Access Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IAM-01 Identity & Access Management\nAudit Tools Access","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
IAM-01.1Do you\n restrict, log, and monitor access to your information security management\n systems (e.g., hypervisors, firewalls, vulnerability scanners, network\n sniffers, APIs, etc.)?
IAM-01.2Do\n you monitor and log privileged access (e.g., administrator level) to\n information security management systems?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IAM-01"},{"objectives":[],"description":"Policies and procedures shall be established to require that unattended workspaces do not have openly visible (e.g., on a desktop) sensitive documents and user computing sessions are disabled after an established period of inactivity.","uuid":"4b739316-6757-44f9-b5ae-89c1ed8c1a6c","family":"Human Resources","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"HRS-11 Human Resources\nWorkspace","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
HRS-11.1Are all\n computers and laptops configured such that there is lockout screen after a\n pre-defined amount of time?
HRS-11.2Are\n there policies and procedures to ensure that unattended workspaces do not\n have openly visible (e.g., on a desktop) sensitive documents?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"HRS-11"},{"objectives":[],"description":"User access to diagnostic and configuration ports shall be restricted to authorized individuals and applications.","uuid":"10d78a3e-1e72-4e1e-a6ea-398c42dd2bf4","family":"Identity & Access Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IAM-03 Identity & Access Management\nDiagnostic / Configuration Ports Access","ccis":[],"assessmentPlan":"\n \n
IAM-03.1Is user access\n to diagnostic and configuration ports restricted to authorized individuals\n and applications?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IAM-03"},{"objectives":[],"description":"User access policies and procedures shall be established, and supporting business processes and technical measures implemented, for ensuring appropriate identity, entitlement, and access management for all internal corporate and customer (tenant) users with access to data and organizationally-owned or managed (physical and virtual) application interfaces and infrastructure network and systems components. These policies, procedures, processes, and measures must incorporate the following:

Procedures, supporting roles, and responsibilities for provisioning and de-provisioning user account entitlements following the rule of least privilege based on job function (e.g., internal employee and contingent staff personnel changes, customer-controlled access, suppliers' business relationships, or other third-party business relationships)

Business case considerations for higher levels of assurance and multi-factor authentication secrets (e.g., management interfaces, key generation, remote access, segregation of duties, emergency access, large-scale provisioning or geographically-distributed deployments, and personnel redundancy for critical systems)

Access segmentation to sessions and data in multi-tenant architectures by any third party (e.g., provider and/or other customer (tenant))

Identity trust verification and service-to-service application (API) and information processing interoperability (e.g., SSO and federation)

Account credential lifecycle management from instantiation through revocation

Account credential and/or identity store minimization or re-use when feasible

Authentication, authorization, and accounting (AAA) rules for access to data and sessions (e.g., encryption and strong/multi-factor, expireable, non-shared authentication secrets)

Permissions and supporting capabilities for customer (tenant) controls over authentication, authorization, and accounting (AAA) rules for access to data and sessions

Adherence to applicable legal, statutory, or regulatory compliance requirements","uuid":"9f67bdf9-374f-4d76-bc3a-6e4b2fd72607","family":"Identity & Access Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IAM-02 Identity & Access Management\nCredential Lifecycle / Provision Management","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
IAM-02.1Do you have\n controls in place ensuring timely removal of systems access that is no longer\n required for business purposes?
IAM-02.2Do\n you have policies, procedures and technical measures in place to ensure\n appropriate data/assets access management in adherence to legal, statutory or\n regulatory compliance requirements?
IAM-02.3Do\n you have procedures and technical measures in place for user account\n entitlement de-/provisioning based on the rule of least privilege?
IAM-02.4Do\n you have procedures and technical measures in place for data access\n segmentation in multi-tenant system architectures?
IAM-02.5Do\n you enforce data access permissions based on the rules of Authentication,\n Authorization and Accountability (AAA)?
IAM-02.6Do\n your policies and procedures incorporate security controls for establishing\n higher levels of assurance for critical business case considerations,\n supported by multifactor authentication?
IAM-02.7Do\n you provide metrics to track the speed with which you are able to remove\n systems access that is no longer required for business purposes?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IAM-02"},{"objectives":[],"description":"User access policies and procedures shall be established, and supporting business processes and technical measures implemented, for restricting user access as per defined segregation of duties to address business risks associated with a user-role conflict of interest.","uuid":"e567e94b-acfa-4f2b-b6a7-6a6e4dad8065","family":"Identity & Access Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IAM-05 Identity & Access Management\nSegregation of Duties","ccis":[],"assessmentPlan":"\n \n
IAM-05.1Do you provide\n tenants with documentation on how you maintain segregation of duties within\n your cloud service offering?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IAM-05"},{"objectives":[],"description":"Policies and procedures shall be established to store and manage identity information about every person who accesses IT infrastructure and to determine their level of access. Policies shall also be developed to control access to network resources based on user identity.","uuid":"3273a6df-04d0-4a0d-a501-9448c8579d91","family":"Identity & Access Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IAM-04 Identity & Access Management\nPolicies and Procedures","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
IAM-04.1Do you manage\n and store the identity of all personnel who have access to the IT\n infrastructure, including their level of access?
IAM-04.2Do\n you manage and store the user identity of all personnel who have network\n access, including their level of access?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IAM-04"},{"objectives":[],"description":"Access to the organization's own developed applications, program, or object source code, or any other form of intellectual property (IP), and use of proprietary software shall be appropriately restricted following the rule of least privilege based on job function as per established user access policies and procedures.","uuid":"9b8adc8d-6986-4ff7-b48b-98c212199d95","family":"Identity & Access Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IAM-06 Identity & Access Management\nSource Code Access Restriction","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
IAM-06.1Are controls in\n place to prevent unauthorized access to your application, program, or object\n source code, and assure it is restricted to authorized personnel only?
IAM-06.2Are\n controls in place to prevent unauthorized access to tenant application,\n program, or object source code, and assure it is restricted to authorized\n personnel only?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IAM-06"},{"objectives":[],"description":"The identification, assessment, and prioritization of risks posed by business processes requiring third-party access to the organization's information systems and data shall be followed by coordinated application of resources to minimize, monitor, and measure likelihood and impact of unauthorized or inappropriate access. Compensating controls derived from the risk analysis shall be implemented prior to provisioning access.","uuid":"a1da4baa-b4a8-4576-be68-5d4c4ba6ec99","family":"Identity & Access Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IAM-07 Identity & Access Management\nThird Party Access","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
IAM-07.1Does your\n organization conduct third-party unauthorized access risk assessments?
IAM-07.2Are\n preventive, detective  corrective\n compensating controls in place to mitigate impacts of unauthorized or\n inappropraite access? 
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IAM-07"},{"objectives":[],"description":"Policies and procedures are established for permissible storage and access of identities used for authentication to ensure identities are only accessible based on rules of least privilege and replication limitation only to users explicitly defined as business necessary.","uuid":"a919fbaf-3cae-4766-9821-965389afe437","family":"Identity & Access Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IAM-08 Identity & Access Management\nTrusted Sources","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n
IAM-08.1Do you document\n how you grant, approve and enforce access restrictions to tenant/customer\n credentials following the rules of least privilege?
IAM-08.2Based\n on the rules of least privilege, do you have policies and procedures\n established for permissible storage and access of identities used for\n authentication?
IAM-08.3Do\n you limit identities' replication only to users explicitly defined as\n business necessary?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IAM-08"},{"objectives":[],"description":"Provisioning user access (e.g., employees, contractors, customers (tenants), business partners, and/or supplier relationships) to data and organizationally-owned or managed (physical and virtual) applications, infrastructure systems, and network components shall be authorized by the organization's management prior to access being granted and appropriately restricted as per established policies and procedures. Upon request, provider shall inform customer (tenant) of this user access, especially if customer (tenant) data is used as part the service and/or customer (tenant) has some shared responsibility over implementation of control.","uuid":"eb19d081-b407-4692-ac39-b30e5d7edee8","family":"Identity & Access Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IAM-09 Identity & Access Management\nUser Access Authorization","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
IAM-09.1Does your\n management provision the authorization and restrictions for user access\n (e.g., employees, contractors, customers (tenants), business partners, and/or\n suppliers) prior to their access to data and any owned or managed (physical\n and virtual) applications, infrastructure systems, and network components?
IAM-09.2Do\n you provide upon the request of users with legitimate interest access (e.g.,\n employees, contractors, customers (tenants), business partners and/or\n suppliers) to data and any owned or managed (physical and virtual)\n applications, infrastructure systems and network components?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IAM-09"},{"objectives":[],"description":"User access shall be authorized and revalidated for entitlement appropriateness, at planned intervals, by the organization's business leadership or other accountable business role or function supported by evidence to demonstrate the organization is adhering to the rule of least privilege based on job function. For identified access violations, remediation must follow established user access policies and procedures.","uuid":"bb1b40ff-d9af-4017-9fe0-0ba4dbd15abc","family":"Identity & Access Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IAM-10 Identity & Access Management\nUser Access Reviews","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
IAM-10.1Do you require\n a periodical authorization and validation (e.g. at least annually) of the\n entitlements for all system users and administrators (exclusive of users\n maintained by your tenants), based on the rule of least privilege, by\n business leadership or other accountable business role or function?
IAM-10.2Do\n you collect evidence to demonstrate that the policy (see question IAM-10.1)\n has been enforced?
IAM-10.3Do\n you ensure that remediation actions for access violations follow user access\n policies?
\n
IAM-10.4Will\n you share user entitlement and remediation reports with your tenants, if\n inappropriate access may have been allowed to tenant data?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IAM-10"},{"objectives":[],"description":"Timely de-provisioning (revocation or modification) of user access to data and organizationally-owned or managed (physical and virtual) applications, infrastructure systems, and network components, shall be implemented as per established policies and procedures and based on user's change in status (e.g., termination of employment or other business relationship, job change, or transfer). Upon request, provider shall inform customer (tenant) of these changes, especially if customer (tenant) data is used as part the service and/or customer (tenant) has some shared responsibility over implementation of control.","uuid":"8c88bf4d-9308-4487-ad62-e98fb23e0dad","family":"Identity & Access Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IAM-11 Identity & Access Management User Access Revocation","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
IAM-11.1Is timely\n deprovisioning, revocation, or modification of user access to the\n organizations systems, information assets, and data implemented upon any\n change in status of employees, contractors, customers, business partners, or\n involved third parties?
IAM-11.2Is\n any change in user access status intended to include termination of\n employment, contract or agreement, change of employment or transfer within\n the organization?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IAM-11"},{"objectives":[],"description":"Utility programs capable of potentially overriding system, object, network, virtual machine, and application controls shall be restricted.","uuid":"aa141e9a-0954-48e6-a651-f8b83679f4cd","family":"Identity & Access Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IAM-13 Identity & Access Management\nUtility Programs Access","ccis":[],"assessmentPlan":"\n \n
IAM-13.1Are access to\n utility programs used to manage virtualized partitions (e.g. shutdown, clone,\n etc) appropriately restricted and monitored?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IAM-13"},{"objectives":[],"description":"Internal corporate or customer (tenant) user account credentials shall be restricted as per the following, ensuring appropriate identity, entitlement, and access management and in accordance with established policies and procedures:

Identity trust verification and service-to-service application (API) and information processing interoperability (e.g., SSO and Federation)

Account credential lifecycle management from instantiation through revocation

Account credential and/or identity store minimization or re-use when feasible

Adherence to industry acceptable and/or regulatory compliant authentication, authorization, and accounting (AAA) rules (e.g., strong/multi-factor, expireable, non-shared authentication secrets)","uuid":"83494f45-3dfa-452c-b911-c0e8a2cb627a","family":"Identity & Access Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IAM-12 Identity & Access Management\nUser ID Credentials","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
IAM-12.1Do you support\n use of, or integration with, existing customer-based Single Sign On (SSO)\n solutions to your service?
IAM-12.2Do\n you use open standards to delegate authentication capabilities to your\n tenants?
IAM-12.3Do\n you support identity federation standards (e.g., SAML, SPML, WS-Federation,\n etc.) as a means of authenticating/authorizing users?
IAM-12.4Do\n you have a Policy Enforcement Point capability (e.g., XACML) to enforce\n regional legal and policy constraints on user access?
IAM-12.5Do\n you have an identity management system (enabling classification of data for a\n tenant) in place to enable both role-based and context-based entitlement to\n data?
IAM-12.6Do\n you provide tenants with strong (multifactor) authentication options (e.g.,\n digital certs, tokens, biometrics, etc.) for user access?
IAM-12.7Do\n you allow tenants to use third-party identity assurance services?
IAM-12.8Do\n you support password (e.g., minimum length, age, history, complexity) and\n account lockout (e.g., lockout threshold, lockout duration) policy\n enforcement?
IAM-12.9Do\n you allow tenants/customers to define password and account lockout policies\n for their accounts?
IAM-12.10Do\n you support the ability to force password changes upon first logon?
IAM-12.11Do\n you have mechanisms in place for unlocking accounts that have been locked out\n (e.g., self-service via email, defined challenge questions, manual unlock)?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IAM-12"},{"objectives":[],"description":"Higher levels of assurance are required for protection, retention, and lifecycle management of audit logs, adhering to applicable legal, statutory or regulatory compliance obligations and providing unique user access accountability to detect potentially suspicious network behaviors and/or file integrity anomalies, and to support forensic investigative capabilities in the event of a security breach.","uuid":"37482e2e-b9e6-4d94-be68-d8ea2173939c","family":"Infrastructure & Virtualization Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IVS-01 Infrastructure & Virtualization Security\nAudit Logging / Intrusion Detection","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
IVS-01.1Are file\n integrity (host) and network intrusion detection (IDS) tools implemented to\n help facilitate timely detection, investigation by root cause analysis, and\n response to incidents?
IVS-01.2Is\n physical and logical user access to audit logs restricted to authorized\n personnel?
IVS-01.3Can\n you provide evidence that due diligence mapping of regulations and standards\n to your controls/architecture/processes has been performed?
IVS-01.4Are\n audit logs centrally stored and retained?
IVS-01.5Are\n audit logs reviewed on a regular basis for security events (e.g., with\n automated tools)?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IVS-01"},{"objectives":[],"description":"The provider shall ensure the integrity of all virtual machine images at all times. Any changes made to virtual machine images must be logged and an alert raised regardless of their running state (e.g., dormant, off, or running). The results of a change or move of an image and the subsequent validation of the image's integrity must be immediately available to customers through electronic methods (e.g., portals or alerts).","uuid":"ca280db4-1f75-4f43-aef9-c6e4315a9d5d","family":"Infrastructure & Virtualization Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IVS-02 Infrastructure & Virtualization Security\nChange Detection","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n
IVS-02.1Do you log and\n alert any changes made to virtual machine images regardless of their running\n state (e.g., dormant, off or running)?
IVS-02.2Does\n the virtual machine management infrastructure include a tamper audit or\n software integrity function to detect changes to the build/configuration of\n the virtual machine?
IVS-02.3Are\n changes made to virtual machines, or moving of an image and subsequent\n validation of the image's integrity, made immediately available to customers\n through electronic methods (e.g., portals or alerts)?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IVS-02"},{"objectives":[],"description":"A reliable and mutually agreed upon external time source shall be used to synchronize the system clocks of all relevant information processing systems to facilitate tracing and reconstitution of activity timelines.","uuid":"3e209f0a-3c8d-4656-ae99-d819a14d43da","family":"Infrastructure & Virtualization Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IVS-03 Infrastructure & Virtualization Security\nClock Synchronization","ccis":[],"assessmentPlan":"\n \n
IVS-03.1Do you use a\n synchronized time-service protocol (e.g., NTP) to ensure all systems have a\n common time reference?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IVS-03"},{"objectives":[],"description":"Implementers shall ensure that the security vulnerability assessment tools or services accommodate the virtualization technologies used (e.g., virtualization aware).","uuid":"c3531a2d-faf8-4d38-9997-20f5e0fa971f","family":"Infrastructure & Virtualization Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IVS-05 Infrastructure & Virtualization Security\nVulnerability Management","ccis":[],"assessmentPlan":"\n \n
IVS-05.1Do security\n vulnerability assessment tools or services accommodate the virtualization\n technologies being used (e.g., virtualization aware)?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IVS-05"},{"objectives":[],"description":"The availability, quality, and adequate capacity and resources shall be planned, prepared, and measured to deliver the required system performance in accordance with legal, statutory, and regulatory compliance obligations. Projections of future capacity requirements shall be made to mitigate the risk of system overload.","uuid":"af30a0e9-6dac-4892-9614-2ab882ac4f4e","family":"Infrastructure & Virtualization Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IVS-04 Infrastructure & Virtualization Security\nInformation System Documentation","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
IVS-04.1Do you provide\n documentation regarding what levels of system (e.g., network, storage,\n memory, I/O, etc.) oversubscription you maintain and under what\n circumstances/scenarios?
IVS-04.2Do\n you restrict use of the memory oversubscription capabilities present in the\n hypervisor?
IVS-04.3Does\n your system's capacity requirements take into account current, projected, and\n anticipated capacity needs for all systems used to provide services to the\n tenants?
IVS-04.4Is\n system performance monitored and tuned in order to continuously meet\n regulatory, contractual, and business requirements for all the systems used\n to provide services to the tenants?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IVS-04"},{"objectives":[],"description":"Each operating system shall be hardened to provide only necessary ports, protocols, and services to meet business needs and have in place supporting technical controls such as: antivirus, file integrity monitoring, and logging as part of their baseline operating build standard or template.","uuid":"d6fb79a8-82c9-465f-b493-022f123e5d44","family":"Infrastructure & Virtualization Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IVS-07 Infrastructure & Virtualization Security\nOS Hardening and Base Controls","ccis":[],"assessmentPlan":"\n \n
IVS-07.1Are operating\n systems hardened to provide only the necessary ports, protocols, and services\n to meet business needs using technical controls (e.g., antivirus, file\n integrity monitoring, and logging) as part of their baseline build standard\n or template?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IVS-07"},{"objectives":[],"description":"Network environments and virtual instances shall be designed and configured to restrict and monitor traffic between trusted and untrusted connections. These configurations shall be reviewed at least annually, and supported by a documented justification for use for all allowed services, protocols, ports, and by compensating controls.","uuid":"e233ce64-0161-49e9-aa1f-707bc4f1948d","family":"Infrastructure & Virtualization Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IVS-06 Infrastructure & Virtualization Security\nNetwork Security","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
IVS-06.1For your IaaS\n offering, do you provide customers with guidance on how to create a layered\n security architecture equivalence using your virtualized solution?
IVS-06.2Do\n you regularly update network architecture diagrams that include data flows\n between security domains/zones?
IVS-06.3Do\n you regularly review for appropriateness the allowed access/connectivity\n (e.g., firewall rules) between security domains/zones within the network?
IVS-06.4Are\n all firewall access control lists documented with business justification?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IVS-06"},{"objectives":[],"description":"Production and non-production environments shall be separated to prevent unauthorized access or changes to information assets. Separation of the environments may include: stateful inspection firewalls, domain/realm authentication sources, and clear segregation of duties for personnel accessing these environments as part of their job duties.","uuid":"7a394094-47ba-4009-abab-5cb80d64dc25","family":"Infrastructure & Virtualization Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IVS-08 Infrastructure & Virtualization Security\nProduction / Non-Production Environments","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n
IVS-08.1For your SaaS\n or PaaS offering, do you provide tenants with separate environments for\n production and test processes?
IVS-08.2For\n your IaaS offering, do you provide tenants with guidance on how to create\n suitable production and test environments?
IVS-08.3Do\n you logically and physically segregate production and non-production\n environments?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IVS-08"},{"objectives":[],"description":"Multi-tenant organizationally-owned or managed (physical and virtual) applications, and infrastructure system and network components, shall be designed, developed, deployed, and configured such that provider and customer (tenant) user access is appropriately segmented from other tenant users, based on the following considerations:

Established policies and procedures

Isolation of business critical assets and/or sensitive user data, and sessions that mandate stronger internal controls and high levels of assurance

Compliance with legal, statutory, and regulatory compliance obligations","uuid":"6ab4440f-8601-4064-a2a3-cd0a78521a83","family":"Infrastructure & Virtualization Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IVS-09 Infrastructure & Virtualization Security\nSegmentation","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
IVS-09.1Are system and\n network environments protected by a firewall or virtual firewall to ensure\n business and customer security requirements?
IVS-09.2Are\n system and network environments protected by a firewall or virtual firewall\n to ensure compliance with legal, regulatory and contractual requirements?
IVS-09.3Have\n you implemented the necessary measures for the appropriate isolation and\n segmentation of tenants' access to infrastructure system and network\n components, in adherence to established policies, legal, statutory, and\n regulatory compliance obligations?
IVS-09.4Do\n you have the ability to logically segment or encrypt customer data such that\n data may be produced for a single tenant only, without inadvertently\n accessing another tenant's data?
IVS-09.5Are\n system and network environments protected by a firewall or virtual firewall\n to ensure protection and isolation of sensitive data?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IVS-09"},{"objectives":[],"description":"Access to all hypervisor management functions or administrative consoles for systems hosting virtualized systems shall be restricted to personnel based upon the principle of least privilege and supported through technical controls (e.g., two-factor authentication, audit trails, IP address filtering, firewalls, and TLS encapsulated communications to the administrative consoles).","uuid":"7ff284e2-25b2-4b7e-9b0d-0bede0d04f80","family":"Infrastructure & Virtualization Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IVS-11 Infrastructure & Virtualization Security\nHypervisor Hardening","ccis":[],"assessmentPlan":"\n \n
IVS-11.1Do you restrict\n personnel access to all hypervisor management functions or administrative\n consoles for systems hosting virtualized systems based on the principle of\n least privilege and supported through technical controls (e.g., two-factor\n authentication, audit trails, IP address filtering, firewalls and\n TLS-encapsulated communications to the administrative consoles)?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IVS-11"},{"objectives":[],"description":"Policies and procedures shall be established, and supporting business processes and technical measures implemented, to protect wireless network environments, including the following:

Perimeter firewalls implemented and configured to restrict unauthorized traffic

Security settings enabled with strong encryption for authentication and transmission, replacing vendor default settings (e.g., encryption keys, passwords, and SNMP community strings)

User access to wireless network devices restricted to authorized personnel

The capability to detect the presence of unauthorized (rogue) wireless network devices for a timely disconnect from the network","uuid":"a9d13ea8-b495-4a99-a02f-3573a54edb30","family":"Infrastructure & Virtualization Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IVS-12 Infrastructure & Virtualization Security\nWireless Security","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n
IVS-12.1Are policies\n and procedures established and mechanisms configured and implemented to\n protect the wireless network environment perimeter and to restrict\n unauthorized wireless traffic?
IVS-12.2Are\n policies and procedures established and mechanisms implemented to ensure\n wireless security settings are enabled with strong encryption for\n authentication and transmission, replacing vendor default settings (e.g.,\n encryption keys, passwords, SNMP community strings)?
IVS-12.3Are\n policies and procedures established and mechanisms implemented to protect\n wireless network environments and detect the presence of unauthorized (rogue)\n network devices for a timely disconnect from the network?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IVS-12"},{"objectives":[],"description":"Network architecture diagrams shall clearly identify high-risk environments and data flows that may have legal compliance impacts. Technical measures shall be implemented and shall apply defense-in-depth techniques (e.g., deep packet analysis, traffic throttling, and black-holing) for detection and timely response to network-based attacks associated with anomalous ingress or egress traffic patterns (e.g., MAC spoofing and ARP poisoning attacks) and/or distributed denial-of-service (DDoS) attacks.","uuid":"6572d568-9c9d-4614-98e4-4f81345ca763","family":"Infrastructure & Virtualization Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IVS-13 Infrastructure & Virtualization Security\nNetwork Architecture","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
IVS-13.1Do your network\n architecture diagrams clearly identify high-risk environments and data flows\n that may have legal compliance impacts?
IVS-13.2Do\n you implement technical measures and apply defense-in-depth techniques (e.g.,\n deep packet analysis, traffic throttling and black-holing) for detection and\n timely response to network-based attacks associated with anomalous ingress or\n egress traffic patterns (e.g., MAC spoofing and ARP poisoning attacks) and/or\n distributed denial-of-service (DDoS) attacks?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IVS-13"},{"objectives":[],"description":"The provider shall use open and published APIs to ensure support for interoperability between components and to facilitate migrating applications.","uuid":"10397c61-9937-4b2f-b413-62ec8f55c9d1","family":"Interoperability & Portability","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IPY-01 Interoperability & Portability\nAPIs","ccis":[],"assessmentPlan":"\n \n
IPY-01.1Do you publish\n a list of all APIs available in the service and indicate which are standard\n and which are customized?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IPY-01"},{"objectives":[],"description":"Secured and encrypted communication channels shall be used when migrating physical servers, applications, or data to virtualized servers and, where possible, shall use a network segregated from production-level networks for such migrations.","uuid":"f5dbb378-eab6-4ff3-b083-d825dc474916","family":"Infrastructure & Virtualization Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IVS-10 Infrastructure & Virtualization Security\nVM Security - Data Protection","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
IVS-10.1Are secured and\n encrypted communication channels used when migrating physical servers,\n applications, or data to virtual servers?
IVS-10.2Do\n you use a network segregated from production-level networks when migrating\n physical servers, applications, or data to virtual servers?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IVS-10"},{"objectives":[],"description":"The provider shall use secure (e.g., non-clear text and authenticated) standardized network protocols for the import and export of data and to manage the service, and shall make available a document to consumers (tenants) detailing the relevant interoperability and portability standards that are involved.","uuid":"41446ff4-a563-4051-87fa-d8aca3d478ad","family":"Interoperability & Portability","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IPY-04 Interoperability & Portability\nStandardized Network Protocols","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
IPY-04.1Is data import,\n data export, and service management be conducted over secure (e.g., non-clear\n text and authenticated), industry accepted standardized network protocols?
IPY-04.2Do\n you provide consumers (tenants) with documentation detailing the relevant\n interoperability and portability network protocol standards that are\n involved?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IPY-04"},{"objectives":[],"description":"All structured and unstructured data shall be available to the customer and provided to them upon request in an industry-standard format (e.g., .doc, .xls, .pdf, logs, and flat files).","uuid":"ee872eb2-7133-4309-8027-4f525f2da991","family":"Interoperability & Portability","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IPY-02 Interoperability & Portability\nData Request","ccis":[],"assessmentPlan":"\n \n
IPY-02.1Is unstructured\n customer data available on request in an industry-standard format (e.g.,\n .doc, .xls, or .pdf)?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IPY-02"},{"objectives":[],"description":"Policies, procedures, and mutually-agreed upon provisions and/or terms shall be established to satisfy customer (tenant) requirements for service-to-service application (API) and information processing interoperability, and portability for application development and information exchange, usage, and integrity persistence.","uuid":"966be23f-ba5f-4048-b621-94885693758c","family":"Interoperability & Portability","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IPY-03 Interoperability & Portability\nPolicy & Legal","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n
IPY-03.1Do you provide\n policies and procedures (i.e. service level agreements) governing the use of\n APIs for interoperability between your service and third-party applications?
IPY-03.2If\n using virtual infrastructure, do you allow virtual machine images to be\n downloaded and ported to a new cloud provider?
IPY-03.3Do\n you provide policies and procedures (i.e. service level agreements) governing\n the migration of application data to and from your service?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IPY-03"},{"objectives":[],"description":"The provider shall use an industry-recognized virtualization platform and standard virtualization formats (e.g., OVF) to help ensure interoperability, and shall have documented custom changes made to any hypervisor in use and all solution-specific virtualization hooks available for customer review.","uuid":"b8668475-0f22-44ac-a9cb-c5f5b910ff9c","family":"Interoperability & Portability","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"IPY-05 Interoperability & Portability\nVirtualization","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n
IPY-05.1Do you use an\n industry-recognized virtualization platform and standard virtualization\n formats (e.g., OVF) to help ensure interoperability?
IPY-05.2If\n using virtual infrastructure, are machine images made available to the\n customer in a way that would allow the customer to replicate those images in\n their own off-site storage location?
IPY-05.3Do\n you have documented custom changes made to any hypervisor in use, and all\n solution-specific virtualization hooks available for customer review?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"IPY-05"},{"objectives":[],"description":"The BYOD policy and supporting awareness training clearly states the approved applications, application stores, and application extensions and plugins that may be used for BYOD usage.","uuid":"99bfaa2d-f010-4fec-be83-69a77eda535e","family":"Mobile Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"MOS-04 Mobile Security\nApproved Software for BYOD","ccis":[],"assessmentPlan":"\n \n
MOS-04.1Does your BYOD\n policy and training clearly state which applications and applications stores\n are approved for use on BYOD devices?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"MOS-04"},{"objectives":[],"description":"The provider shall have a documented mobile device policy that includes a documented definition for mobile devices and the acceptable usage and requirements for all mobile devices. The provider shall post and communicate the policy and requirements through the company's security awareness and training program.","uuid":"35a0af47-b4ac-4b3f-933e-0aa24dab300b","family":"Mobile Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"MOS-05 Mobile Security\nAwareness and Training","ccis":[],"assessmentPlan":"\n \n
MOS-05.1Do you have a\n documented mobile device policy in your employee training that clearly\n defines mobile devices and the accepted usage and requirements for mobile\n devices?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"MOS-05"},{"objectives":[],"description":"A documented list of approved application stores has been defined as acceptable for mobile devices accessing or storing provider managed data.","uuid":"325c1518-3cd0-4d7f-af57-e60148271699","family":"Mobile Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"MOS-02 Mobile Security\nApplication Stores","ccis":[],"assessmentPlan":"\n \n
MOS-02.1Do you document\n and make available lists of approved application stores for mobile devices\n accessing or storing company data and/or company systems?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"MOS-02"},{"objectives":[],"description":"Anti-malware awareness training, specific to mobile devices, shall be included in the provider's information security awareness training.","uuid":"9fbdea0d-8d22-4e78-8496-0971a1438786","family":"Mobile Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"MOS-01 Mobile Security Anti-Malware","ccis":[],"assessmentPlan":"\n \n
MOS-01.1Do you provide\n anti-malware training specific to mobile devices as part of your information\n security awareness training?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"MOS-01"},{"objectives":[],"description":"The company shall have a documented policy prohibiting the installation of non-approved applications or approved applications not obtained through a pre-identified application store.","uuid":"50f57608-1037-4d37-852b-6d378cf7a31f","family":"Mobile Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"MOS-03 Mobile Security\nApproved Applications","ccis":[],"assessmentPlan":"\n \n
MOS-03.1Do you have a\n policy enforcement capability (e.g., XACML) to ensure that only approved\n applications and those from approved application stores can be loaded onto a\n mobile device?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"MOS-03"},{"objectives":[],"description":"All cloud-based services used by the company's mobile devices or BYOD shall be pre-approved for usage and the storage of company business data.","uuid":"08379fa4-1507-4c53-8bd5-0e8f2a3c9c66","family":"Mobile Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"MOS-06 Mobile Security\nCloud Based Services","ccis":[],"assessmentPlan":"\n \n
MOS-06.1Do you have a\n documented list of pre-approved cloud based services that are allowed to be\n used for use and storage of company business data via a mobile device?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"MOS-06"},{"objectives":[],"description":"The company shall have a documented application validation process to test for mobile device, operating system, and application compatibility issues.","uuid":"a3e864c6-964c-4b11-ab6c-6bf568f68b3b","family":"Mobile Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"MOS-07 Mobile Security\nCompatibility","ccis":[],"assessmentPlan":"\n \n
MOS-07.1Do you have a\n documented application validation process for testing device, operating\n system, and application compatibility issues?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"MOS-07"},{"objectives":[],"description":"The BYOD policy shall define the device and eligibility requirements to allow for BYOD usage.","uuid":"85095e1c-5553-400e-8d8b-bfa434f6a9d3","family":"Mobile Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"MOS-08 Mobile Security\nDevice Eligibility","ccis":[],"assessmentPlan":"\n \n
MOS-08.1Do you have a\n BYOD policy that defines the device(s) and eligibility requirements allowed\n for BYOD usage?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"MOS-08"},{"objectives":[],"description":"An inventory of all mobile devices used to store and access company data shall be kept and maintained. All changes to the status of these devices (i.e., operating system and patch levels, lost or decommissioned status, and to whom the device is assigned or approved for usage (BYOD)) will be included for each device in the inventory.","uuid":"aea3045c-c4ab-4561-b083-ace70f328157","family":"Mobile Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"MOS-09 Mobile Security\nDevice Inventory","ccis":[],"assessmentPlan":"\n \n
MOS-09.1Do you maintain\n an inventory of all mobile devices storing and accessing company data which\n includes device status (e.g., operating system and patch levels, lost or\n decommissioned, device assignee)?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"MOS-09"},{"objectives":[],"description":"The mobile device policy shall prohibit the circumvention of built-in security controls on mobile devices (e.g., jailbreaking or rooting) and shall enforce the prohibition through detective and preventative controls on the device or through a centralized device management system (e.g., mobile device management).","uuid":"90dffad9-63c5-4329-983b-752abddb9354","family":"Mobile Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"MOS-12 Mobile Security\nJailbreaking and Rooting","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
MOS-12.1Does your\n mobile device policy prohibit the circumvention of built-in security controls\n on mobile devices (e.g., jailbreaking or rooting)?
MOS-12.2Do\n you have detective and preventative controls on the device or via a\n centralized device management system which prohibit the circumvention of\n built-in security controls?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"MOS-12"},{"objectives":[],"description":"The mobile device policy shall require the use of encryption either for the entire device or for data identified as sensitive on all mobile devices, and shall be enforced through technology controls.","uuid":"fcc13935-27e7-41c8-9886-078bc89a1e36","family":"Mobile Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"MOS-11 Mobile Security\nEncryption","ccis":[],"assessmentPlan":"\n \n
MOS-11.1Does your\n mobile device policy require the use of encryption for either the entire\n device or for data identified as sensitive enforceable through technology\n controls for all mobile devices?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"MOS-11"},{"objectives":[],"description":"The BYOD policy includes clarifying language for the expectation of privacy, requirements for litigation, e-discovery, and legal holds. The BYOD policy shall clearly state the expectations regarding the loss of non-company data in the case that a wipe of the device is required.","uuid":"faa9b7b7-a6eb-4a7d-a54b-e4ae1761b118","family":"Mobile Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"MOS-13 Mobile Security\nLegal","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
MOS-13.1Does your BYOD\n policy clearly define the expectation of privacy, requirements for\n litigation, e-discovery, and legal holds?
MOS-13.2Does\n the BYOD policy clearly state the expectations over the loss of non-company\n data in case a wipe of the device is required?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"MOS-13"},{"objectives":[],"description":"BYOD and/or company-owned devices are configured to require an automatic lockout screen, and the requirement shall be enforced through technical controls.","uuid":"13f3af4a-12dc-42cc-9a7e-df30b4a0df2c","family":"Mobile Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"MOS-14 Mobile Security\nLockout Screen","ccis":[],"assessmentPlan":"\n \n
MOS-14.1Do you require\n and enforce via technical controls an automatic lockout screen for BYOD and\n company owned devices?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"MOS-14"},{"objectives":[],"description":"A centralized, mobile device management solution shall be deployed to all mobile devices permitted to store, transmit, or process customer data.","uuid":"61958492-aa80-44a6-a912-fcf47784e557","family":"Mobile Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"MOS-10 Mobile Security\nDevice Management","ccis":[],"assessmentPlan":"\n \n
MOS-10.1Do you have a\n centralized mobile device management solution deployed to all mobile devices\n that are permitted to store, transmit, or process company data?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"MOS-10"},{"objectives":[],"description":"Changes to mobile device operating systems, patch levels, and/or applications shall be managed through the company's change management processes.","uuid":"7d794c10-e347-42aa-b3dc-d3432026ff85","family":"Mobile Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"MOS-15 Mobile Security\nOperating Systems","ccis":[],"assessmentPlan":"\n \n
MOS-15.1Do you manage\n all changes to mobile device operating systems, patch levels, and\n applications via your company's change management processes?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"MOS-15"},{"objectives":[],"description":"Password policies, applicable to mobile devices, shall be documented and enforced through technical controls on all company devices or devices approved for BYOD usage, and shall prohibit the changing of password/PIN lengths and authentication requirements.","uuid":"1a074252-e5a0-4eb4-bd3e-ab43c41a49c1","family":"Mobile Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"MOS-16 Mobile Security\nPasswords","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n
MOS-16.1Do you have\n password policies for enterprise issued mobile devices and/or BYOD mobile\n devices?
MOS-16.2Are\n your password policies enforced through technical controls (i.e. MDM)?
MOS-16.3Do\n your password policies prohibit the changing of authentication requirements\n (i.e. password/PIN length) via a mobile device?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"MOS-16"},{"objectives":[],"description":"The mobile device policy shall require the BYOD user to perform backups of data, prohibit the usage of unapproved application stores, and require the use of anti-malware software (where supported).","uuid":"9f24b586-03e5-4c2a-afeb-359c1c4c2b1c","family":"Mobile Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"MOS-17 Mobile Security\nPolicy","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n
MOS-17.1Do you have a\n policy that requires BYOD users to perform backups of specified corporate\n data?
MOS-17.2Do\n you have a policy that requires BYOD users to prohibit the usage of\n unapproved application stores?
MOS-17.3Do\n you have a policy that requires BYOD users to use anti-malware software\n (where supported)?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"MOS-17"},{"objectives":[],"description":"The BYOD policy shall clarify the systems and servers allowed for use or access on a BYOD-enabled device.","uuid":"20a6db6c-ee64-4300-908a-4dd9a8f29827","family":"Mobile Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"MOS-20 Mobile Security\nUsers","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
MOS-20.1Does your BYOD\n policy clarify the systems and servers allowed for use or access on the\n BYOD-enabled device?
MOS-20.2Does\n your BYOD policy specify the user roles that are allowed access via a\n BYOD-enabled device?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"MOS-20"},{"objectives":[],"description":"All mobile devices permitted for use through the company BYOD program or a company-assigned mobile device shall allow for remote wipe by the company's corporate IT or shall have all company-provided data wiped by the company's corporate IT.","uuid":"3d673ef9-33f9-4a40-acdc-0db90156fd5e","family":"Mobile Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"MOS-18 Mobile Security Remote Wipe","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
MOS-18.1Does your IT\n provide remote wipe or corporate data wipe for all company-accepted BYOD\n devices?
MOS-18.2Does\n your IT provide remote wipe or corporate data wipe for all company-assigned\n mobile devices?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"MOS-18"},{"objectives":[],"description":"Mobile devices connecting to corporate networks, or storing and accessing company information, shall allow for remote software version/patch validation. All mobile devices shall have the latest available security-related patches installed upon general release by the device manufacturer or carrier and authorized IT personnel shall be able to perform these updates remotely.","uuid":"cce81f59-236a-4446-b87b-bee90b73ee22","family":"Mobile Security","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"MOS-19 Mobile Security Security Patches","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
MOS-19.1Do your mobile\n devices have the latest available security-related patches installed upon\n general release by the device manufacturer or carrier?
MOS-19.2Do\n your mobile devices allow for remote validation to download the latest\n security patches by company IT personnel?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"MOS-19"},{"objectives":[],"description":"Points of contact for applicable regulation authorities, national and local law enforcement, and other legal jurisdictional authorities shall be maintained and regularly updated (e.g., change in impacted-scope and/or a change in any compliance obligation) to ensure direct compliance liaisons have been established and to be prepared for a forensic investigation requiring rapid engagement with law enforcement.","uuid":"a4a9b0a3-d912-4313-bee2-5c17b4ed82c8","family":"Security Incident Management, E-Discovery, & Cloud Forensics","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"SEF-01 Security Incident Management, E-Discovery, & Cloud Forensics\nContact / Authority Maintenance","ccis":[],"assessmentPlan":"\n \n
SEF-01.1Do you maintain\n liaisons and points of contact with local authorities in accordance with\n contracts and appropriate regulations?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"SEF-01"},{"objectives":[],"description":"Policies and procedures shall be established, and supporting business processes and technical measures implemented, to triage security-related events and ensure timely and thorough incident management, as per established IT service management policies and procedures.","uuid":"101621b5-fa2d-4ef6-bae9-374b94a0537c","family":"Security Incident Management, E-Discovery, & Cloud Forensics","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"SEF-02 Security Incident Management, E-Discovery, & Cloud Forensics\nIncident Management","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
SEF-02.1Do you have a\n documented security incident response plan?
SEF-02.2Do\n you integrate customized tenant requirements into your security incident\n response plans?
SEF-02.3Do\n you publish a roles and responsibilities document specifying what you vs.\n your tenants are responsible for during security incidents?
SEF-02.4Have\n you tested your security incident response plans in the last year?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"SEF-02"},{"objectives":[],"description":"Workforce personnel and external business relationships shall be informed of their responsibilities and, if required, shall consent and/or contractually agree to report all information security events in a timely manner. Information security events shall be reported through predefined communications channels in a timely manner adhering to applicable legal, statutory, or regulatory compliance obligations.","uuid":"2d746602-3044-4073-88ef-21752ff692d6","family":"Security Incident Management, E-Discovery, & Cloud Forensics","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"SEF-03 Security Incident Management, E-Discovery, & Cloud Forensics\nIncident Reporting","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
SEF-03.1Are workforce\n personnel and external business relationships adequately informed of their\n responsibility, and, if required, consent and/or contractually required to\n report all information security events in a timely manner?
SEF-03.2Do\n you have predefined communication channels for workforce personnel and\n external business partners to report incidents in a timely manner adhering to\n applicable legal, statutory, or regulatory compliance obligations?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"SEF-03"},{"objectives":[],"description":"Proper forensic procedures, including chain of custody, are required for the presentation of evidence to support potential legal action subject to the relevant jurisdiction after an information security incident. Upon notification, customers and/or other external business partners impacted by a security breach shall be given the opportunity to participate as is legally permissible in the forensic investigation.","uuid":"a3e1719e-378f-4dd0-82d1-d89cbe47edaa","family":"Security Incident Management, E-Discovery, & Cloud Forensics","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"SEF-04 Security Incident Management, E-Discovery, & Cloud Forensics\nIncident Response Legal Preparation","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
SEF-04.1Does your\n incident response plan comply with industry standards for legally admissible\n chain-of-custody management processes and controls?
SEF-04.2Does\n your incident response capability include the use of legally admissible\n forensic data collection and analysis techniques?
SEF-04.3Are\n you capable of supporting litigation holds (freeze of data from a specific\n point in time) for a specific tenant without freezing other tenant data?
SEF-04.4Do\n you enforce and attest to tenant data separation when producing data in\n response to legal subpoenas?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"SEF-04"},{"objectives":[],"description":"The provider shall make security incident information available to all affected customers and providers periodically through electronic methods (e.g., portals).","uuid":"0d2181de-810e-42c1-bcc6-7a9ea7ed6918","family":"Supply Chain Management, Transparency, and Accountability","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"STA-02 Supply Chain Management, Transparency, and Accountability\nIncident Reporting","ccis":[],"assessmentPlan":"\n \n
STA-02.1Do you make\n security incident information available to all affected customers and\n providers periodically through electronic methods (e.g., portals)?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"STA-02"},{"objectives":[],"description":"The provider shall perform annual internal assessments of conformance to, and effectiveness of, its policies, procedures, and supporting measures and metrics.","uuid":"776b0672-e90c-4dde-b5dc-4c3f3f4376b4","family":"Supply Chain Management, Transparency, and Accountability","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"STA-04 Supply Chain Management, Transparency, and Accountability\nProvider Internal Assessments","ccis":[],"assessmentPlan":"\n \n
STA-04.1Do you perform\n annual internal assessments of conformance and effectiveness of your\n policies, procedures, and supporting measures and metrics?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"STA-04"},{"objectives":[],"description":"Providers shall inspect, account for, and work with their cloud supply-chain partners to correct data quality errors and associated risks. Providers shall design and implement controls to mitigate and contain data security risks through proper separation of duties, role-based access, and least-privilege access for all personnel within their supply chain.","uuid":"ed00d838-77c3-4ce9-87b3-a1f600264286","family":"Supply Chain Management, Transparency, and Accountability","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"STA-01 Supply Chain Management, Transparency, and Accountability\nData Quality and Integrity","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
STA-01.1Do you inspect\n and account for data quality errors and associated risks, and work with your\n cloud supply-chain partners to correct them?
STA-01.2Do\n you design and implement controls to mitigate and contain data security risks\n through proper separation of duties, role-based access, and least-privileged\n access for all personnel within your supply chain?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"STA-01"},{"objectives":[],"description":"Business-critical or customer (tenant) impacting (physical and virtual) application and system-system interface (API) designs and configurations, and infrastructure network and systems components, shall be designed, developed, and deployed in accordance with mutually agreed-upon service and capacity-level expectations, as well as IT governance and service management policies and procedures.","uuid":"0b7fb7b4-2489-4023-8cd7-c73baf05fa21","family":"Supply Chain Management, Transparency, and Accountability","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"STA-03 Supply Chain Management, Transparency, and Accountability\nNetwork / Infrastructure Services","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
STA-03.1Do you collect\n capacity and use data for all relevant components of your cloud service\n offering?
STA-03.2Do\n you provide tenants with capacity planning and use reports?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"STA-03"},{"objectives":[],"description":"Mechanisms shall be put in place to monitor and quantify the types, volumes, and costs of information security incidents.","uuid":"f3d6f84e-503a-4ee5-9c69-c3abf339afb0","family":"Security Incident Management, E-Discovery, & Cloud Forensics","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"SEF-05 Security Incident Management, E-Discovery, & Cloud Forensics\nIncident Response Metrics","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
SEF-05.1Do you monitor\n and quantify the types, volumes, and impacts on all information security\n incidents?
SEF-05.2Will\n you share statistical information for security incident data with your\n tenants upon request?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"SEF-05"},{"objectives":[],"description":"Providers shall review the risk management and governance processes of their partners so that practices are consistent and aligned to account for risks inherited from other members of that partner's cloud supply chain.","uuid":"90245c81-07c4-485c-9fd7-8862351f2088","family":"Supply Chain Management, Transparency, and Accountability","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"STA-06 Supply Chain Management, Transparency, and Accountability\nSupply Chain Governance Reviews","ccis":[],"assessmentPlan":"\n \n
STA-06.1Do you review\n the risk management and governance processes of partners to account for risks\n inherited from other members of that partner's supply chain?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"STA-06"},{"objectives":[],"description":"Policies and procedures shall be implemented to ensure the consistent review of service agreements (e.g., SLAs) between providers and customers (tenants) across the relevant supply chain (upstream/downstream). Reviews shall be performed at least annually and identify any non-conformance to established agreements. The reviews should result in actions to address service-level conflicts or inconsistencies resulting from disparate supplier relationships.","uuid":"2a0fecf4-bf43-4f85-a0c1-6d40dc3a0bda","family":"Supply Chain Management, Transparency, and Accountability","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"STA-07 Supply Chain Management, Transparency, and Accountability\nSupply Chain Metrics","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
STA-07.1Are policies\n and procedures established, and supporting business processes and technical\n measures implemented, for maintaining complete, accurate, and relevant\n agreements (e.g., SLAs) between providers and customers (tenants)?
STA-07.2Do\n you have the ability to measure and address non-conformance of provisions\n and/or terms across the entire supply chain (upstream/downstream)?
STA-07.3Can\n you manage service-level conflicts or inconsistencies resulting from\n disparate supplier relationships?
STA-07.4Do\n you provide tenants with ongoing visibility and reporting of your operational\n Service Level Agreement (SLA) performance?
STA-07.5Do\n you make standards-based information security metrics (CSA, CAMM, etc.)\n available to your tenants?
STA-07.6Do\n you provide customers with ongoing visibility and reporting of your SLA\n performance?
STA-07.7Do\n your data management policies and procedures address tenant and service level\n conflicts of interests?
STA-07.8Do\n you review all service level agreements at least annually?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"STA-07"},{"objectives":[],"description":"Providers shall assure reasonable information security across their information supply chain by performing an annual review. The review shall include all partners/third party-providers upon which their information supply chain depends on.","uuid":"e6a5d61a-9c06-4257-97d6-4fb8f4ee4b6e","family":"Supply Chain Management, Transparency, and Accountability","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"STA-08 Supply Chain Management, Transparency, and Accountability\nThird Party Assessment","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
STA-08.1Do you assure\n reasonable information security across your information supply chain by\n performing an annual review?
STA-08.2Does\n your annual review include all partners/third-party providers upon which your\n information supply chain depends?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"STA-08"},{"objectives":[],"description":"Supply chain agreements (e.g., SLAs) between providers and customers (tenants) shall incorporate at least the following mutually-agreed upon provisions and/or terms:

Scope of business relationship and services offered (e.g., customer (tenant) data acquisition, exchange and usage, feature sets and functionality, personnel and infrastructure network and systems components for service delivery and support, roles and responsibilities of provider and customer (tenant) and any subcontracted or outsourced business relationships, physical geographical location of hosted services, and any known regulatory compliance considerations)

Information security requirements, provider and customer (tenant) primary points of contact for the duration of the business relationship, and references to detailed supporting and relevant business processes and technical measures implemented to enable effectively governance, risk management, assurance and legal, statutory and regulatory compliance obligations by all impacted business relationships

Notification and/or pre-authorization of any changes controlled by the provider with customer (tenant) impacts

Timely notification of a security incident (or confirmed breach) to all customers (tenants) and other business relationships impacted (i.e., up- and down-stream impacted supply chain)

Assessment and independent verification of compliance with agreement provisions and/or terms (e.g., industry-acceptable certification, attestation audit report, or equivalent forms of assurance) without posing an unacceptable business risk of exposure to the organization being assessed

Expiration of the business relationship and treatment of customer (tenant) data impacted

Customer (tenant) service-to-service application (API) and data interoperability and portability requirements for application development and information exchange, usage, and integrity persistence","uuid":"cf22fe09-b456-4754-8387-1e0f6671eb1a","family":"Supply Chain Management, Transparency, and Accountability","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"STA-05 Supply Chain Management, Transparency, and Accountability\nSupply Chain Agreements","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
STA-05.1Do you select\n and monitor outsourced providers in compliance with laws in the country where\n the data is processed, stored, and transmitted?
STA-05.2Do\n you select and monitor outsourced providers to ensure that they are in\n compliance with applicable legislation?
\n
STA-05.3Does\n legal counsel review all third-party agreements?
STA-05.4Do\n third-party agreements include provision for the security and protection of\n information and assets?
STA-05.5Do\n you have the capability to recover data for a specific customer in the case\n of a failure or data loss?
STA-05.6Do\n you have the capability to restrict the storage of customer data to specific\n countries or geographic locations?
STA-05.7Can\n you provide the physical location/geography of storage of a tenant’s data\n upon request?
STA-05.8Can\n you provide the physical location/geography of storage of a tenant's data in\n advance?
STA-05.9Do\n you allow tenants to define acceptable geographical locations for data\n routing or resource instantiation?
STA-05.10Are\n systems in place to monitor for privacy breaches and notify tenants\n expeditiously if a privacy event may have impacted their data?
STA-05.11Do\n you allow tenants to opt out of having their data/metadata accessed via\n inspection technologies?
STA-05.12Do\n you provide the client with a list and copies of all subprocessing agreements\n and keep this updated?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"STA-05"},{"objectives":[],"description":"Third-party service providers shall demonstrate compliance with information security and confidentiality, access control, service definitions, and delivery level agreements included in third-party contracts. Third-party reports, records, and services shall undergo audit and review at least annually to govern and maintain compliance with the service delivery agreements.","uuid":"c080fe99-0d43-4694-8942-6f0070c7f1ac","family":"Supply Chain Management, Transparency, and Accountability","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"STA-09 Supply Chain Management, Transparency, and Accountability Third Party Audits","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
STA-09.1Do you mandate\n annual information security reviews and audits of your third party providers\n to ensure that all agreed upon security requirements are met?
STA-09.2Do\n you have external third party services conduct vulnerability scans and\n periodic penetration tests on your applications and networks?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"STA-09"},{"objectives":[],"description":"Policies and procedures shall be established, and supporting business processes and technical measures implemented, to prevent the execution of malware on organizationally-owned or managed user end-point devices (i.e., issued workstations, laptops, and mobile devices) and IT infrastructure network and systems components.","uuid":"22fb0666-edeb-42ad-ab58-44dbdf8520c8","family":"Threat and Vulnerability Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"TVM-01 Threat and Vulnerability Management\nAnti-Virus / Malicious Software","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
TVM-01.1Do you have\n anti-malware programs that support or connect to your cloud service offerings\n installed on all of your IT infrastructure network and systems components?
TVM-01.2Do\n you ensure that security threat detection systems using signatures, lists, or\n behavioral patterns are updated across all infrastructure components as\n prescribed by industry best practices?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"TVM-01"},{"objectives":[],"description":"Policies and procedures shall be established, and supporting processes and technical measures implemented, for timely detection of vulnerabilities within organizationally-owned or managed applications, infrastructure network and system components (e.g., network vulnerability assessment, penetration testing) to ensure the efficiency of implemented security controls. A risk-based model for prioritizing remediation of identified vulnerabilities shall be used. Changes shall be managed through a change management process for all vendor-supplied patches, configuration changes, or changes to the organization's internally developed software. Upon request, the provider informs customer (tenant) of policies and procedures and identified weaknesses especially if customer (tenant) data is used as part the service and/or customer (tenant) has some shared responsibility over implementation of control.","uuid":"6b1be7b9-41b7-4eeb-a8e0-80cdd6f116b0","family":"Threat and Vulnerability Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"TVM-02 Threat and Vulnerability Management Vulnerability / Patch Management","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
TVM-02.1Do you conduct\n network-layer vulnerability scans regularly as prescribed by industry best\n practices?
TVM-02.2Do\n you conduct application-layer vulnerability scans regularly as prescribed by\n industry best practices?
TVM-02.3Do\n you conduct local operating system-layer vulnerability scans regularly as\n prescribed by industry best practices?
TVM-02.4Will\n you make the results of vulnerability scans available to tenants at their\n request?
TVM-02.5Do\n you have a capability to patch vulnerabilities across all of your computing\n devices, applications, and systems?
TVM-02.6Do\n you inform customers (tenant) of policies and procedures and identified\n weaknesses if customer (tenant) data is used as part the service and/or\n customer (tenant) has some shared responsibility over implementation of\n control?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"TVM-02"},{"objectives":[],"description":"Policies and procedures shall be established, and supporting business processes and technical measures implemented, to prevent the execution of unauthorized mobile code, defined as software transferred between systems over a trusted or untrusted network and executed on a local system without explicit installation or execution by the recipient, on organizationally-owned or managed user end-point devices (e.g., issued workstations, laptops, and mobile devices) and IT infrastructure network and systems components.","uuid":"d8fb840c-0a33-4e5d-8f3a-348f7f99fe25","family":"Threat and Vulnerability Management","parameters":[],"subControls":"","tests":[],"weight":0,"isPublic":true,"enhancements":"","sortId":null,"title":"TVM-03 Threat and Vulnerability Management\nMobile Code","ccis":[],"assessmentPlan":"\n \n \n \n \n \n \n \n \n \n
TVM-03.1Is mobile code\n authorized before its installation and use, and the code configuration\n checked, to ensure that the authorized mobile code operates according to a\n clearly defined security policy?
TVM-03.2Is\n all unauthorized mobile code prevented from executing?
","practiceLevel":null,"references":"","mappings":"
Architectural Relevance
PhysicalNetworkComputeStorageAppData


Cloud Service Delivery Model Applicability
IaaSPaaSSaaS


Supplier Relationship
Service ProviderTenant/Consumer


Corporate Governance Relevance


","controlId":"TVM-03"}]}}