csa-ccm 0.1.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -0,0 +1,32 @@
1
+ module Csa::Ccm
2
+
3
+ class Question
4
+
5
+ ATTRIBS = %i(
6
+ id content
7
+ )
8
+
9
+ attr_accessor *ATTRIBS
10
+
11
+ def initialize(options={})
12
+ options.each_pair do |k, v|
13
+ self.send("#{k}=", v)
14
+ end
15
+
16
+ self
17
+ end
18
+
19
+ def to_hash
20
+ ATTRIBS.inject({}) do |acc, attrib|
21
+ value = self.send(attrib)
22
+ unless value.nil?
23
+ acc.merge(attrib.to_s => value)
24
+ else
25
+ acc
26
+ end
27
+ end
28
+ end
29
+
30
+ end
31
+
32
+ end
@@ -0,0 +1,7 @@
1
+ class String
2
+ def to_xls_col
3
+ return -1 if self.length > 1
4
+
5
+ self.upcase[0].ord - 'A'.ord
6
+ end
7
+ end
@@ -0,0 +1,16 @@
1
+ ---
2
+ ccm:
3
+ metadata:
4
+ version: 3.0.1
5
+ title: CONSENSUS ASSESSMENTS INITIATIVE QUESTIONNAIRE v3.0.1
6
+ source-file: "CAIQ_v3.0.1-09-01-2017_FINAL.xlsx"
7
+ answers:
8
+ - control-id: AIS-01
9
+ answer: yes # or `no` or `NA`
10
+ notes: The control is satisfied.
11
+ - question-id: AIS-01.1
12
+ answer: yes # or `no` or `NA`
13
+ notes: Design and implementation adheres to industry acceptance standards.
14
+ - question-id: AIS-01.2
15
+ answer: NA # or `no` or `NA`
16
+ notes: This control does not apply to this organization.
@@ -0,0 +1,34 @@
1
+ ---
2
+ ccm:
3
+ metadata:
4
+ version: 3.0.1
5
+ title: CONSENSUS ASSESSMENTS INITIATIVE QUESTIONNAIRE v3.0.1
6
+ source-file: "CAIQ_v3.0.1-09-01-2017_FINAL.xlsx"
7
+ control-domains:
8
+ - id: AIS
9
+ name: Application & Interface Security
10
+ controls:
11
+ - id: AIS-01
12
+ name: Application Security
13
+ specification: "Applications and programming interfaces (APIs) shall be designed, developed, deployed, and tested in accordance with leading industry standards (e.g., OWASP for web applications) and adhere to applicable legal, statutory, or regulatory compliance obligations."
14
+ questions:
15
+ - id: AIS-01.1
16
+ content: "Do you use industry standards (Build Security in Maturity Model [BSIMM] benchmarks, Open Group ACS Trusted Technology Provider Framework, NIST, etc.) to build in security for your Systems/Software Development Lifecycle (SDLC)?"
17
+ - id: AIS-01.2
18
+ content: "Do you use an automated source code analysis tool to detect security defects in code prior to production?"
19
+ - id: AIS-01.3
20
+ content: "Do you use manual source-code analysis to detect security defects in code prior to production?"
21
+ - id: AIS-01.4
22
+ content: "Do you verify that all of your software suppliers adhere to industry standards for Systems/Software Development Lifecycle (SDLC) security?"
23
+ - id: AIS-01.5
24
+ content: "(SaaS only) Do you review your applications for security vulnerabilities and address any issues prior to deployment to production?"
25
+ - id: AIS-02
26
+ name: Customer Access Requirements
27
+ specification: "Prior to granting customers access to data, assets, and information systems, identified security, contractual, and regulatory requirements for customer access shall be addressed."
28
+ questions:
29
+ - id: AIS-02.1
30
+ content: "Are all identified security, contractual, and regulatory requirements for customer access contractually addressed and remediated prior to granting customers access to data, assets, and information systems?"
31
+ - id: AIS-02.1
32
+ content: "Are all requirements and trust levels for customers’ access defined and documented?"
33
+
34
+
@@ -0,0 +1,2029 @@
1
+ ---
2
+ ccm:
3
+ metadata:
4
+ version: 3.0.1
5
+ title: CONSENSUS ASSESSMENTS INITIATIVE QUESTIONNAIRE v3.0.1
6
+ source_file: csa-caiq-v3.0.1-12-05-2016.xlsx
7
+ control_domains:
8
+ - id: AIS
9
+ name: Application & Interface Security
10
+ controls:
11
+ - id: AIS-01
12
+ name: Application Security
13
+ specification: Applications and programming interfaces (APIs) shall be designed,
14
+ developed, deployed, and tested in accordance with leading industry standards
15
+ (e.g., OWASP for web applications) and adhere to applicable legal, statutory,
16
+ or regulatory compliance obligations.
17
+ questions:
18
+ - id: AIS-01.1
19
+ content: Do you use industry standards (Build Security in Maturity Model [BSIMM]
20
+ benchmarks, Open Group ACS Trusted Technology Provider Framework, NIST,
21
+ etc.) to build in security for your Systems/Software Development Lifecycle
22
+ (SDLC)?
23
+ - id: AIS-01.2
24
+ content: Do you use an automated source code analysis tool to detect security
25
+ defects in code prior to production?
26
+ - id: AIS-01.3
27
+ content: Do you use manual source-code analysis to detect security defects
28
+ in code prior to production?
29
+ - id: AIS-01.4
30
+ content: Do you verify that all of your software suppliers adhere to industry
31
+ standards for Systems/Software Development Lifecycle (SDLC) security?
32
+ - id: AIS-01.5
33
+ content: "(SaaS only) Do you review your applications for security vulnerabilities
34
+ and address any issues prior to deployment to production?"
35
+ - id: AIS-02
36
+ name: Customer Access Requirements
37
+ specification: 'Prior to granting customers access to data, assets, and information
38
+ systems, identified security, contractual, and regulatory requirements for
39
+ customer access shall be addressed. '
40
+ questions:
41
+ - id: AIS-02.1
42
+ content: Are all identified security, contractual, and regulatory requirements
43
+ for customer access contractually addressed and remediated prior to granting
44
+ customers access to data, assets, and information systems?
45
+ - id: AIS- 02
46
+ questions:
47
+ - id: AIS- 02.2
48
+ content: Are all requirements and trust levels for customers’ access defined
49
+ and documented?
50
+ - id: AIS-03
51
+ name: Data Integrity
52
+ specification: Data input and output integrity routines (i.e., reconciliation
53
+ and edit checks) shall be implemented for application interfaces and databases
54
+ to prevent manual or systematic processing errors, corruption of data, or
55
+ misuse.
56
+ questions:
57
+ - id: AIS-03.1
58
+ content: Are data input and output integrity routines (i.e., reconciliation
59
+ and edit checks) implemented for application interfaces and databases to
60
+ prevent manual or systematic processing errors or corruption of data?
61
+ - id: AIS-04
62
+ name: Data Security / Integrity
63
+ specification: Policies and procedures shall be established and maintained in
64
+ support of data security to include (confidentiality, integrity, and availability)
65
+ across multiple system interfaces, jurisdictions, and business functions to
66
+ prevent improper disclosure, alternation, or destruction.
67
+ questions:
68
+ - id: AIS-04.1
69
+ content: Is your Data Security Architecture designed using an industry standard
70
+ (e.g., CDSA, MULITSAFE, CSA Trusted Cloud Architectural Standard, FedRAMP,
71
+ CAESARS)?
72
+ - id: AAC
73
+ name: Audit Assurance & Compliance
74
+ controls:
75
+ - id: AAC-01
76
+ name: Audit Planning
77
+ specification: Audit plans shall be developed and maintained to address business
78
+ process disruptions. Auditing plans shall focus on reviewing the effectiveness
79
+ of the implementation of security operations. All audit activities must be
80
+ agreed upon prior to executing any audits.
81
+ questions:
82
+ - id: AAC-01.1
83
+ content: Do you produce audit assertions using a structured, industry accepted
84
+ format (e.g., CloudAudit/A6 URI Ontology, CloudTrust, SCAP/CYBEX, GRC XML,
85
+ ISACA's Cloud Computing Management Audit/Assurance Program, etc.)?
86
+ - id: AAC-02
87
+ name: Independent Audits
88
+ specification: Independent reviews and assessments shall be performed at least
89
+ annually to ensure that the organization addresses nonconformities of established
90
+ policies, standards, procedures, and compliance obligations.
91
+ questions:
92
+ - id: AAC-02.1
93
+ content: Do you allow tenants to view your SOC2/ISO 27001 or similar third-party
94
+ audit or certification reports?
95
+ - id: AAC-02.2
96
+ content: Do you conduct network penetration tests of your cloud service infrastructure
97
+ regularly as prescribed by industry best practices and guidance?
98
+ - id: AAC-02.3
99
+ content: Do you conduct application penetration tests of your cloud infrastructure
100
+ regularly as prescribed by industry best practices and guidance?
101
+ - id: AAC-02.4
102
+ content: Do you conduct internal audits regularly as prescribed by industry
103
+ best practices and guidance?
104
+ - id: AAC-02.5
105
+ content: Do you conduct external audits regularly as prescribed by industry
106
+ best practices and guidance?
107
+ - id: AAC-02.6
108
+ content: Are the results of the penetration tests available to tenants at
109
+ their request?
110
+ - id: AAC-02.7
111
+ content: Are the results of internal and external audits available to tenants
112
+ at their request?
113
+ - id: AAC-02.8
114
+ content: Do you have an internal audit program that allows for cross-functional
115
+ audit of assessments?
116
+ - id: AAC-03
117
+ name: Information System Regulatory Mapping
118
+ specification: Organizations shall create and maintain a control framework which
119
+ captures standards, regulatory, legal, and statutory requirements relevant
120
+ for their business needs. The control framework shall be reviewed at least
121
+ annually to ensure changes that could affect the business processes are reflected.
122
+ questions:
123
+ - id: AAC-03.1
124
+ content: Do you have the ability to logically segment or encrypt customer
125
+ data such that data may be produced for a single tenant only, without inadvertently
126
+ accessing another tenant's data?
127
+ - id: AAC-03.2
128
+ content: Do you have the capability to recover data for a specific customer
129
+ in the case of a failure or data loss?
130
+ - id: AAC-03.3
131
+ content: Do you have the capability to restrict the storage of customer data
132
+ to specific countries or geographic locations?
133
+ - id: AAC-03.4
134
+ content: Do you have a program in place that includes the ability to monitor
135
+ changes to the regulatory requirements in relevant jurisdictions, adjust
136
+ your security program for changes to legal requirements, and ensure compliance
137
+ with relevant regulatory requirements?
138
+ - id: BCR
139
+ name: Business Continuity Management & Operational Resilience
140
+ controls:
141
+ - id: BCR-01
142
+ name: Business Continuity Planning
143
+ specification: |-
144
+ A consistent unified framework for business continuity planning and plan development shall be established, documented, and adopted to ensure all business continuity plans are consistent in addressing priorities for testing, maintenance, and information security requirements. Requirements for business continuity plans include the following:
145
+ • Defined purpose and scope, aligned with relevant dependencies
146
+ • Accessible to and understood by those who will use them
147
+ • Owned by a named person(s) who is responsible for their review, update, and approval
148
+ • Defined lines of communication, roles, and responsibilities
149
+ • Detailed recovery procedures, manual work-around, and reference information
150
+ • Method for plan invocation
151
+ questions:
152
+ - id: BCR-01.1
153
+ content: Do you provide tenants with geographically resilient hosting options?
154
+ - id: BCR-01.2
155
+ content: Do you provide tenants with infrastructure service failover capability
156
+ to other providers?
157
+ - id: BCR-02
158
+ name: Business Continuity Testing
159
+ specification: Business continuity and security incident response plans shall
160
+ be subject to testing at planned intervals or upon significant organizational
161
+ or environmental changes. Incident response plans shall involve impacted customers
162
+ (tenant) and other business relationships that represent critical intra-supply
163
+ chain business process dependencies.
164
+ questions:
165
+ - id: BCR-02.1
166
+ content: Are business continuity plans subject to testing at planned intervals
167
+ or upon significant organizational or environmental changes to ensure continuing
168
+ effectiveness?
169
+ - id: BCR-03
170
+ name: Power / Telecommunications
171
+ specification: Data center utilities services and environmental conditions (e.g.,
172
+ water, power, temperature and humidity controls, telecommunications, and internet
173
+ connectivity) shall be secured, monitored, maintained, and tested for continual
174
+ effectiveness at planned intervals to ensure protection from unauthorized
175
+ interception or damage, and designed with automated fail-over or other redundancies
176
+ in the event of planned or unplanned disruptions.
177
+ questions:
178
+ - id: BCR-03.1
179
+ content: Do you provide tenants with documentation showing the transport route
180
+ of their data between your systems?
181
+ - id: BCR-03.2
182
+ content: Can tenants define how their data is transported and through which
183
+ legal jurisdictions?
184
+ - id: BCR-04
185
+ name: Documentation
186
+ specification: |-
187
+ Information system documentation (e.g., administrator and user guides, and architecture diagrams) shall be made available to authorized personnel to ensure the following:
188
+ • Configuring, installing, and operating the information system
189
+ • Effectively using the system’s security features
190
+ questions:
191
+ - id: BCR-04.1
192
+ content: Are information system documents (e.g., administrator and user guides,
193
+ architecture diagrams, etc.) made available to authorized personnel to ensure
194
+ configuration, installation and operation of the information system?
195
+ - id: BCR-05
196
+ name: Environmental Risks
197
+ specification: Physical protection against damage from natural causes and disasters,
198
+ as well as deliberate attacks, including fire, flood, atmospheric electrical
199
+ discharge, solar induced geomagnetic storm, wind, earthquake, tsunami, explosion,
200
+ nuclear accident, volcanic activity, biological hazard, civil unrest, mudslide,
201
+ tectonic activity, and other forms of natural or man-made disaster shall be
202
+ anticipated, designed, and have countermeasures applied.
203
+ questions:
204
+ - id: BCR-05.1
205
+ content: Is physical protection against damage (e.g., natural causes, natural
206
+ disasters, deliberate attacks) anticipated and designed with countermeasures
207
+ applied?
208
+ - id: BCR-06
209
+ name: Equipment Location
210
+ specification: To reduce the risks from environmental threats, hazards, and
211
+ opportunities for unauthorized access, equipment shall be kept away from locations
212
+ subject to high probability environmental risks and supplemented by redundant
213
+ equipment located at a reasonable distance.
214
+ questions:
215
+ - id: BCR-06.1
216
+ content: Are any of your data centers located in places that have a high probability/occurrence
217
+ of high-impact environmental risks (floods, tornadoes, earthquakes, hurricanes,
218
+ etc.)?
219
+ - id: BCR-07
220
+ name: Equipment Maintenance
221
+ specification: Policies and procedures shall be established, and supporting
222
+ business processes and technical measures implemented, for equipment maintenance
223
+ ensuring continuity and availability of operations and support personnel.
224
+ questions:
225
+ - id: BCR-07.1
226
+ content: If using virtual infrastructure, does your cloud solution include
227
+ independent hardware restore and recovery capabilities?
228
+ - id: BCR-07.2
229
+ content: If using virtual infrastructure, do you provide tenants with a capability
230
+ to restore a Virtual Machine to a previous state in time?
231
+ - id: BCR-07.3
232
+ content: If using virtual infrastructure, do you allow virtual machine images
233
+ to be downloaded and ported to a new cloud provider?
234
+ - id: BCR-07.4
235
+ content: If using virtual infrastructure, are machine images made available
236
+ to the customer in a way that would allow the customer to replicate those
237
+ images in their own off-site storage location?
238
+ - id: BCR-07.5
239
+ content: Does your cloud solution include software/provider independent restore
240
+ and recovery capabilities?
241
+ - id: BCR-08
242
+ name: Equipment Power Failures
243
+ specification: Protection measures shall be put into place to react to natural
244
+ and man-made threats based upon a geographically-specific business impact
245
+ assessment.
246
+ questions:
247
+ - id: BCR-08.1
248
+ content: Are security mechanisms and redundancies implemented to protect equipment
249
+ from utility service outages (e.g., power failures, network disruptions,
250
+ etc.)?
251
+ - id: BCR-09
252
+ name: Impact Analysis
253
+ specification: |-
254
+ There shall be a defined and documented method for determining the impact of any disruption to the organization (cloud provider, cloud consumer) that must incorporate the following:
255
+ • Identify critical products and services
256
+ • Identify all dependencies, including processes, applications, business partners, and third party service providers
257
+ • Understand threats to critical products and services
258
+ • Determine impacts resulting from planned or unplanned disruptions and how these vary over time
259
+ • Establish the maximum tolerable period for disruption
260
+ • Establish priorities for recovery
261
+ • Establish recovery time objectives for resumption of critical products and services within their maximum tolerable period of disruption
262
+ • Estimate the resources required for resumption
263
+ questions:
264
+ - id: BCR-09.1
265
+ content: Do you provide tenants with ongoing visibility and reporting of your
266
+ operational Service Level Agreement (SLA) performance?
267
+ - id: BCR-09.2
268
+ content: Do you make standards-based information security metrics (CSA, CAMM,
269
+ etc.) available to your tenants?
270
+ - id: BCR-09.3
271
+ content: Do you provide customers with ongoing visibility and reporting of
272
+ your SLA performance?
273
+ - id: BCR-10
274
+ name: Policy
275
+ specification: Policies and procedures shall be established, and supporting
276
+ business processes and technical measures implemented, for appropriate IT
277
+ governance and service management to ensure appropriate planning, delivery
278
+ and support of the organization's IT capabilities supporting business functions,
279
+ workforce, and/or customers based on industry acceptable standards (i.e.,
280
+ ITIL v4 and COBIT 5). Additionally, policies and procedures shall include
281
+ defined roles and responsibilities supported by regular workforce training.
282
+ questions:
283
+ - id: BCR-10.1
284
+ content: Are policies and procedures established and made available for all
285
+ personnel to adequately support services operations’ roles?
286
+ - id: BCR-11
287
+ name: Retention Policy
288
+ specification: Policies and procedures shall be established, and supporting
289
+ business processes and technical measures implemented, for defining and adhering
290
+ to the retention period of any critical asset as per established policies
291
+ and procedures, as well as applicable legal, statutory, or regulatory compliance
292
+ obligations. Backup and recovery measures shall be incorporated as part of
293
+ business continuity planning and tested accordingly for effectiveness.
294
+ questions:
295
+ - id: BCR-11.1
296
+ content: Do you have technical control capabilities to enforce tenant data
297
+ retention policies?
298
+ - id: BCR-11.2
299
+ content: Do you have a documented procedure for responding to requests for
300
+ tenant data from governments or third parties?
301
+ - id: BCR-11.4
302
+ content: Have you implemented backup or redundancy mechanisms to ensure compliance
303
+ with regulatory, statutory, contractual or business requirements?
304
+ - id: BCR-11.5
305
+ content: Do you test your backup or redundancy mechanisms at least annually?
306
+ - id: CCC
307
+ name: Change Control & Configuration Management
308
+ controls:
309
+ - id: CCC-01
310
+ name: New Development / Acquisition
311
+ specification: Policies and procedures shall be established, and supporting
312
+ business processes and technical measures implemented, to ensure the development
313
+ and/or acquisition of new data, physical or virtual applications, infrastructure
314
+ network and systems components, or any corporate, operations and/or data center
315
+ facilities have been pre-authorized by the organization's business leadership
316
+ or other accountable business role or function.
317
+ questions:
318
+ - id: CCC-01.1
319
+ content: Are policies and procedures established for management authorization
320
+ for development or acquisition of new applications, systems, databases,
321
+ infrastructure, services, operations and facilities?
322
+ - id: CCC-01.2
323
+ content: Is documentation available that describes the installation, configuration,
324
+ and use of products/services/features?
325
+ - id: CCC-02
326
+ name: Outsourced Development
327
+ specification: External business partners shall adhere to the same policies
328
+ and procedures for change management, release, and testing as internal developers
329
+ within the organization (e.g., ITIL service management processes).
330
+ questions:
331
+ - id: CCC-02.1
332
+ content: Do you have controls in place to ensure that standards of quality
333
+ are being met for all software development?
334
+ - id: CCC-02.2
335
+ content: Do you have controls in place to detect source code security defects
336
+ for any outsourced software development activities?
337
+ - id: CCC-03
338
+ name: Quality Testing
339
+ specification: Organizations shall follow a defined quality change control and
340
+ testing process (e.g., ITIL Service Management) with established baselines,
341
+ testing, and release standards which focus on system availability, confidentiality,
342
+ and integrity of systems and services.
343
+ questions:
344
+ - id: CCC-03.1
345
+ content: Do you provide your tenants with documentation that describes your
346
+ quality assurance process?
347
+ - id: CCC-03.2
348
+ content: Is documentation describing known issues with certain products/services
349
+ available?
350
+ - id: CCC-03.3
351
+ content: Are there policies and procedures in place to triage and remedy reported
352
+ bugs and security vulnerabilities for product and service offerings?
353
+ - id: CCC-03.4
354
+ content: Are mechanisms in place to ensure that all debugging and test code
355
+ elements are removed from released software versions?
356
+ - id: CCC-04
357
+ name: Unauthorized Software Installations
358
+ specification: Policies and procedures shall be established, and supporting
359
+ business processes and technical measures implemented, to restrict the installation
360
+ of unauthorized software on organizationally-owned or managed user end-point
361
+ devices (e.g., issued workstations, laptops, and mobile devices) and IT infrastructure
362
+ network and systems components.
363
+ questions:
364
+ - id: CCC-04.1
365
+ content: Do you have controls in place to restrict and monitor the installation
366
+ of unauthorized software onto your systems?
367
+ - id: CCC-05
368
+ name: Production Changes
369
+ specification: |-
370
+ Policies and procedures shall be established for managing the risks associated with applying changes to:
371
+ • Business-critical or customer (tenant)-impacting (physical and virtual) applications and system-system interface (API) designs and configurations.
372
+ • Infrastructure network and systems components.
373
+ Technical measures shall be implemented to provide assurance that all changes directly correspond to a registered change request, business-critical or customer (tenant), and/or authorization by, the customer (tenant) as per agreement (SLA) prior to deployment.
374
+ questions:
375
+ - id: CCC-05.1
376
+ content: Do you provide tenants with documentation that describes your production
377
+ change management procedures and their roles/rights/responsibilities within
378
+ it?
379
+ - id: DSI
380
+ name: Data Security & Information Lifecycle Management
381
+ controls:
382
+ - id: DSI-01
383
+ name: Classification
384
+ specification: Data and objects containing data shall be assigned a classification
385
+ by the data owner based on data type, value, sensitivity, and criticality
386
+ to the organization.
387
+ questions:
388
+ - id: DSI-01.1
389
+ content: Do you provide a capability to identify virtual machines via policy
390
+ tags/metadata (e.g., tags can be used to limit guest operating systems from
391
+ booting/instantiating/transporting data in the wrong country)?
392
+ - id: DSI-01.2
393
+ content: Do you provide a capability to identify hardware via policy tags/metadata/hardware
394
+ tags (e.g., TXT/TPM, VN-Tag, etc.)?
395
+ - id: DSI-01.3
396
+ content: Do you have a capability to use system geographic location as an
397
+ authentication factor?
398
+ - id: DSI-01.4
399
+ content: Can you provide the physical location/geography of storage of a tenant’s
400
+ data upon request?
401
+ - id: DSI-01.5
402
+ content: Can you provide the physical location/geography of storage of a tenant's
403
+ data in advance?
404
+ - id: DSI-01.6
405
+ content: Do you follow a structured data-labeling standard (e.g., ISO 15489,
406
+ Oasis XML Catalog Specification, CSA data type guidance)?
407
+ - id: DSI-01.7
408
+ content: Do you allow tenants to define acceptable geographical locations
409
+ for data routing or resource instantiation?
410
+ - id: DSI-02
411
+ name: Data Inventory / Flows
412
+ specification: Policies and procedures shall be established, and supporting
413
+ business processes and technical measures implemented, to inventory, document,
414
+ and maintain data flows for data that is resident (permanently or temporarily)
415
+ within the service's geographically distributed (physical and virtual) applications
416
+ and infrastructure network and systems components and/or shared with other
417
+ third parties to ascertain any regulatory, statutory, or supply chain agreement
418
+ (SLA) compliance impact, and to address any other business risks associated
419
+ with the data. Upon request, provider shall inform customer (tenant) of compliance
420
+ impact and risk, especially if customer data is used as part of the services.
421
+ questions:
422
+ - id: DSI-02.1
423
+ content: Do you inventory, document, and maintain data flows for data that
424
+ is resident (permanent or temporary) within the services' applications and
425
+ infrastructure network and systems?
426
+ - id: DSI-02.2
427
+ content: Can you ensure that data does not migrate beyond a defined geographical
428
+ residency?
429
+ - id: DSI-03
430
+ name: E-commerce Transactions
431
+ specification: Data related to electronic commerce (e-commerce) that traverses
432
+ public networks shall be appropriately classified and protected from fraudulent
433
+ activity, unauthorized disclosure, or modification in such a manner to prevent
434
+ contract dispute and compromise of data.
435
+ questions:
436
+ - id: DSI-03.1
437
+ content: Do you provide open encryption methodologies (3.4ES, AES, etc.) to
438
+ tenants in order for them to protect their data if it is required to move
439
+ through public networks (e.g., the Internet)?
440
+ - id: DSI-03.2
441
+ content: Do you utilize open encryption methodologies any time your infrastructure
442
+ components need to communicate with each other via public networks (e.g.,
443
+ Internet-based replication of data from one environment to another)?
444
+ - id: DSI-04
445
+ name: Handling / Labeling / Security Policy
446
+ specification: Policies and procedures shall be established for labeling, handling,
447
+ and the security of data and objects which contain data. Mechanisms for label
448
+ inheritance shall be implemented for objects that act as aggregate containers
449
+ for data.
450
+ questions:
451
+ - id: DSI-04.1
452
+ content: Are policies and procedures established for labeling, handling and
453
+ the security of data and objects that contain data?
454
+ - id: DSI-04.2
455
+ content: Are mechanisms for label inheritance implemented for objects that
456
+ act as aggregate containers for data?
457
+ - id: DSI-05
458
+ name: Nonproduction Data
459
+ specification: Production data shall not be replicated or used in non-production
460
+ environments. Any use of customer data in non-production environments requires
461
+ explicit, documented approval from all customers whose data is affected, and
462
+ must comply with all legal and regulatory requirements for scrubbing of sensitive
463
+ data elements.
464
+ questions:
465
+ - id: DSI-05.1
466
+ content: Do you have procedures in place to ensure production data shall not
467
+ be replicated or used in non-production environments?
468
+ - id: DSI-06
469
+ name: Ownership / Stewardship
470
+ specification: All data shall be designated with stewardship, with assigned
471
+ responsibilities defined, documented, and communicated.
472
+ questions:
473
+ - id: DSI-06.1
474
+ content: Are the responsibilities regarding data stewardship defined, assigned,
475
+ documented, and communicated?
476
+ - id: DSI-07
477
+ name: Secure Disposal
478
+ specification: Policies and procedures shall be established with supporting
479
+ business processes and technical measures implemented for the secure disposal
480
+ and complete removal of data from all storage media, ensuring data is not
481
+ recoverable by any computer forensic means.
482
+ questions:
483
+ - id: DSI-07.1
484
+ content: Do you support secure deletion (e.g., degaussing/cryptographic wiping)
485
+ of archived and backed-up data as determined by the tenant?
486
+ - id: DSI-07.2
487
+ content: Can you provide a published procedure for exiting the service arrangement,
488
+ including assurance to sanitize all computing resources of tenant data once
489
+ a customer has exited your environment or has vacated a resource?
490
+ - id: DCS
491
+ name: Datacenter Security
492
+ controls:
493
+ - id: DCS-01
494
+ name: Asset Management
495
+ specification: Assets must be classified in terms of business criticality, service-level
496
+ expectations, and operational continuity requirements. A complete inventory
497
+ of business-critical assets located at all sites and/or geographical locations
498
+ and their usage over time shall be maintained and updated regularly, and assigned
499
+ ownership by defined roles and responsibilities.
500
+ questions:
501
+ - id: DCS-01.1
502
+ content: Do you maintain a complete inventory of all of your critical assets
503
+ that includes ownership of the asset?
504
+ - id: DCS-01.2
505
+ content: Do you maintain a complete inventory of all of your critical supplier
506
+ relationships?
507
+ - id: DCS-02
508
+ name: Controlled Access Points
509
+ specification: Physical security perimeters (e.g., fences, walls, barriers,
510
+ guards, gates, electronic surveillance, physical authentication mechanisms,
511
+ reception desks, and security patrols) shall be implemented to safeguard sensitive
512
+ data and information systems.
513
+ questions:
514
+ - id: DCS-02.1
515
+ content: Are physical security perimeters (e.g., fences, walls, barriers,
516
+ guards, gates, electronic surveillance, physical authentication mechanisms,
517
+ reception desks, and security patrols) implemented?
518
+ - id: DCS-03
519
+ name: Equipment Identification
520
+ specification: Automated equipment identification shall be used as a method
521
+ of connection authentication. Location-aware technologies may be used to validate
522
+ connection authentication integrity based on known equipment location.
523
+ questions:
524
+ - id: DCS-03.1
525
+ content: Is automated equipment identification used as a method to validate
526
+ connection authentication integrity based on known equipment location?
527
+ - id: DCS-04
528
+ name: Offsite Authorization
529
+ specification: Authorization must be obtained prior to relocation or transfer
530
+ of hardware, software, or data to an offsite premises.
531
+ questions:
532
+ - id: DCS-04.1
533
+ content: Do you provide tenants with documentation that describes scenarios
534
+ in which data may be moved from one physical location to another (e.g.,
535
+ offsite backups, business continuity failovers, replication)?
536
+ - id: DCS-05
537
+ name: Offsite Equipment
538
+ specification: Policies and procedures shall be established for the secure disposal
539
+ of equipment (by asset type) used outside the organization's premise. This
540
+ shall include a wiping solution or destruction process that renders recovery
541
+ of information impossible. The erasure shall consist of a full write of the
542
+ drive to ensure that the erased drive is released to inventory for reuse and
543
+ deployment or securely stored until it can be destroyed.
544
+ questions:
545
+ - id: DCS-05.1
546
+ content: Can you provide tenants with evidence documenting your policies and
547
+ procedures governing asset management and repurposing of equipment?
548
+ - id: DCS-06
549
+ name: Policy
550
+ specification: Policies and procedures shall be established, and supporting
551
+ business processes implemented, for maintaining a safe and secure working
552
+ environment in offices, rooms, facilities, and secure areas storing sensitive
553
+ information.
554
+ questions:
555
+ - id: DCS-06.1
556
+ content: Can you provide evidence that policies, standards, and procedures
557
+ have been established for maintaining a safe and secure working environment
558
+ in offices, rooms, facilities, and secure areas?
559
+ - id: DCS-06.2
560
+ content: Can you provide evidence that your personnel and involved third parties
561
+ have been trained regarding your documented policies, standards, and procedures?
562
+ - id: DCS-07
563
+ name: Secure Area Authorization
564
+ specification: Ingress and egress to secure areas shall be constrained and monitored
565
+ by physical access control mechanisms to ensure that only authorized personnel
566
+ are allowed access.
567
+ questions:
568
+ - id: DCS-07.1
569
+ content: Do you allow tenants to specify which of your geographic locations
570
+ their data is allowed to move into/out of (to address legal jurisdictional
571
+ considerations based on where data is stored vs. accessed)?
572
+ - id: DCS-08
573
+ name: Unauthorized Persons Entry
574
+ specification: Ingress and egress points such as service areas and other points
575
+ where unauthorized personnel may enter the premises shall be monitored, controlled
576
+ and, if possible, isolated from data storage and processing facilities to
577
+ prevent unauthorized data corruption, compromise, and loss.
578
+ questions:
579
+ - id: DCS-08.1
580
+ content: Are ingress and egress points, such as service areas and other points
581
+ where unauthorized personnel may enter the premises, monitored, controlled
582
+ and isolated from data storage and process?
583
+ - id: DCS-09
584
+ name: User Access
585
+ specification: Physical access to information assets and functions by users
586
+ and support personnel shall be restricted.
587
+ questions:
588
+ - id: DCS-09.1
589
+ content: Do you restrict physical access to information assets and functions
590
+ by users and support personnel?
591
+ - id: EKM
592
+ name: Encryption & Key Management
593
+ controls:
594
+ - id: EKM-01
595
+ name: Entitlement
596
+ specification: Keys must have identifiable owners (binding keys to identities)
597
+ and there shall be key management policies.
598
+ questions:
599
+ - id: EKM-01.1
600
+ content: Do you have key management policies binding keys to identifiable
601
+ owners?
602
+ - id: EKM-02
603
+ name: Key Generation
604
+ specification: Policies and procedures shall be established for the management
605
+ of cryptographic keys in the service's cryptosystem (e.g., lifecycle management
606
+ from key generation to revocation and replacement, public key infrastructure,
607
+ cryptographic protocol design and algorithms used, access controls in place
608
+ for secure key generation, and exchange and storage including segregation
609
+ of keys used for encrypted data or sessions). Upon request, provider shall
610
+ inform the customer (tenant) of changes within the cryptosystem, especially
611
+ if the customer (tenant) data is used as part of the service, and/or the customer
612
+ (tenant) has some shared responsibility over implementation of the control.
613
+ questions:
614
+ - id: EKM-02.1
615
+ content: Do you have a capability to allow creation of unique encryption keys
616
+ per tenant?
617
+ - id: EKM-02.2
618
+ content: Do you have a capability to manage encryption keys on behalf of tenants?
619
+ - id: EKM-02.3
620
+ content: Do you maintain key management procedures?
621
+ - id: EKM-02.4
622
+ content: Do you have documented ownership for each stage of the lifecycle
623
+ of encryption keys?
624
+ - id: EKM-02.5
625
+ content: Do you utilize any third party/open source/proprietary frameworks
626
+ to manage encryption keys?
627
+ - id: EKM-03
628
+ name: Encryption
629
+ specification: Policies and procedures shall be established, and supporting
630
+ business processes and technical measures implemented, for the use of encryption
631
+ protocols for protection of sensitive data in storage (e.g., file servers,
632
+ databases, and end-user workstations) and data in transmission (e.g., system
633
+ interfaces, over public networks, and electronic messaging) as per applicable
634
+ legal, statutory, and regulatory compliance obligations.
635
+ questions:
636
+ - id: EKM-03.1
637
+ content: Do you encrypt tenant data at rest (on disk/storage) within your
638
+ environment?
639
+ - id: EKM-03.2
640
+ content: Do you leverage encryption to protect data and virtual machine images
641
+ during transport across and between networks and hypervisor instances?
642
+ - id: EKM-03.3
643
+ content: Do you support tenant-generated encryption keys or permit tenants
644
+ to encrypt data to an identity without access to a public key certificate
645
+ (e.g., identity-based encryption)?
646
+ - id: EKM-03.4
647
+ content: Do you have documentation establishing and defining your encryption
648
+ management policies, procedures, and guidelines?
649
+ - id: EKM-04
650
+ name: Storage and Access
651
+ specification: Platform and data appropriate encryption (e.g., AES-256) in open/validated
652
+ formats and standard algorithms shall be required. Keys shall not be stored
653
+ in the cloud (i.e. at the cloud provider in question), but maintained by the
654
+ cloud consumer or trusted key management provider. Key management and key
655
+ usage shall be separated duties.
656
+ questions:
657
+ - id: EKM-04.1
658
+ content: Do you have platform and data appropriate encryption that uses open/validated
659
+ formats and standard algorithms?
660
+ - id: EKM-04.2
661
+ content: Are your encryption keys maintained by the cloud consumer or a trusted
662
+ key management provider?
663
+ - id: EKM-04.3
664
+ content: Do you store encryption keys in the cloud?
665
+ - id: EKM-04.4
666
+ content: Do you have separate key management and key usage duties?
667
+ - id: GRM
668
+ name: Governance and Risk Management
669
+ controls:
670
+ - id: GRM-01
671
+ name: Baseline Requirements
672
+ specification: Baseline security requirements shall be established for developed
673
+ or acquired, organizationally-owned or managed, physical or virtual, applications
674
+ and infrastructure system, and network components that comply with applicable
675
+ legal, statutory, and regulatory compliance obligations. Deviations from standard
676
+ baseline configurations must be authorized following change management policies
677
+ and procedures prior to deployment, provisioning, or use. Compliance with
678
+ security baseline requirements must be reassessed at least annually unless
679
+ an alternate frequency has been established and authorized based on business
680
+ needs.
681
+ questions:
682
+ - id: GRM-01.1
683
+ content: Do you have documented information security baselines for every component
684
+ of your infrastructure (e.g., hypervisors, operating systems, routers, DNS
685
+ servers, etc.)?
686
+ - id: GRM-01.2
687
+ content: Do you have the capability to continuously monitor and report the
688
+ compliance of your infrastructure against your information security baselines?
689
+ - id: GRM-01.3
690
+ content: Do you allow your clients to provide their own trusted virtual machine
691
+ image to ensure conformance to their own internal standards?
692
+ - id: GRM-02
693
+ name: Risk Assessments
694
+ specification: |-
695
+ Risk assessments associated with data governance requirements shall be conducted at planned intervals and shall consider the following:
696
+ • Awareness of where sensitive data is stored and transmitted across applications, databases, servers, and network infrastructure
697
+ • Compliance with defined retention periods and end-of-life disposal requirements
698
+ • Data classification and protection from unauthorized use, access, loss, destruction, and falsification
699
+ questions:
700
+ - id: GRM-02.1
701
+ content: Do you provide security control health data in order to allow tenants
702
+ to implement industry standard Continuous Monitoring (which allows continual
703
+ tenant validation of your physical and logical control status)?
704
+ - id: GRM-02.2
705
+ content: Do you conduct risk assessments associated with data governance requirements
706
+ at least once a year?
707
+ - id: GRM-03
708
+ name: Management Oversight
709
+ specification: Managers are responsible for maintaining awareness of, and complying
710
+ with, security policies, procedures, and standards that are relevant to their
711
+ area of responsibility.
712
+ questions:
713
+ - id: GRM-03.1
714
+ content: Are your technical, business, and executive managers responsible
715
+ for maintaining awareness of and compliance with security policies, procedures,
716
+ and standards for both themselves and their employees as they pertain to
717
+ the manager and employees' area of responsibility?
718
+ - id: GRM-04
719
+ name: Management Program
720
+ specification: |-
721
+ An Information Security Management Program (ISMP) shall be developed, documented, approved, and implemented that includes administrative, technical, and physical safeguards to protect assets and data from loss, misuse, unauthorized access, disclosure, alteration, and destruction. The security program shall include, but not be limited to, the following areas insofar as they relate to the characteristics of the business:
722
+ • Risk management
723
+ • Security policy
724
+ • Organization of information security
725
+ • Asset management
726
+ • Human resources security
727
+ • Physical and environmental security
728
+ • Communications and operations management
729
+ • Access control
730
+ • Information systems acquisition, development, and maintenance
731
+ questions:
732
+ - id: GRM-04.1
733
+ content: Do you provide tenants with documentation describing your Information
734
+ Security Management Program (ISMP)?
735
+ - id: GRM-04.2
736
+ content: Do you review your Information Security Management Program (ISMP)
737
+ at least once a year?
738
+ - id: GRM-05
739
+ name: Management Support / Involvement
740
+ specification: Executive and line management shall take formal action to support
741
+ information security through clearly-documented direction and commitment,
742
+ and shall ensure the action has been assigned.
743
+ questions:
744
+ - id: GRM-05.1
745
+ content: Do you ensure your providers adhere to your information security
746
+ and privacy policies?
747
+ - id: GRM-06
748
+ name: Policy
749
+ specification: Information security policies and procedures shall be established
750
+ and made readily available for review by all impacted personnel and external
751
+ business relationships. Information security policies must be authorized by
752
+ the organization's business leadership (or other accountable business role
753
+ or function) and supported by a strategic business plan and an information
754
+ security management program inclusive of defined information security roles
755
+ and responsibilities for business leadership.
756
+ questions:
757
+ - id: GRM-06.1
758
+ content: Do your information security and privacy policies align with industry
759
+ standards (ISO-27001, ISO-22307, CoBIT, etc.)?
760
+ - id: GRM-06.2
761
+ content: Do you have agreements to ensure your providers adhere to your information
762
+ security and privacy policies?
763
+ - id: GRM-06.3
764
+ content: Can you provide evidence of due diligence mapping of your controls,
765
+ architecture, and processes to regulations and/or standards?
766
+ - id: GRM-06.4
767
+ content: Do you disclose which controls, standards, certifications, and/or
768
+ regulations you comply with?
769
+ - id: GRM-07
770
+ name: Policy Enforcement
771
+ specification: A formal disciplinary or sanction policy shall be established
772
+ for employees who have violated security policies and procedures. Employees
773
+ shall be made aware of what action might be taken in the event of a violation,
774
+ and disciplinary measures must be stated in the policies and procedures.
775
+ questions:
776
+ - id: GRM-07.1
777
+ content: Is a formal disciplinary or sanction policy established for employees
778
+ who have violated security policies and procedures?
779
+ - id: GRM-07.2
780
+ content: Are employees made aware of what actions could be taken in the event
781
+ of a violation via their policies and procedures?
782
+ - id: GRM-08
783
+ name: Business / Policy Change Impacts
784
+ specification: Risk assessment results shall include updates to security policies,
785
+ procedures, standards, and controls to ensure that they remain relevant and
786
+ effective.
787
+ questions:
788
+ - id: GRM-08.1
789
+ content: Do risk assessment results include updates to security policies,
790
+ procedures, standards, and controls to ensure they remain relevant and effective?
791
+ - id: GRM-09
792
+ name: Policy Reviews
793
+ specification: The organization's business leadership (or other accountable
794
+ business role or function) shall review the information security policy at
795
+ planned intervals or as a result of changes to the organization to ensure
796
+ its continuing alignment with the security strategy, effectiveness, accuracy,
797
+ relevance, and applicability to legal, statutory, or regulatory compliance
798
+ obligations.
799
+ questions:
800
+ - id: GRM-09.1
801
+ content: Do you notify your tenants when you make material changes to your
802
+ information security and/or privacy policies?
803
+ - id: GRM-09.2
804
+ content: Do you perform, at minimum, annual reviews to your privacy and security
805
+ policies?
806
+ - id: GRM-10
807
+ name: Assessments
808
+ specification: Aligned with the enterprise-wide framework, formal risk assessments
809
+ shall be performed at least annually or at planned intervals, (and in conjunction
810
+ with any changes to information systems) to determine the likelihood and impact
811
+ of all identified risks using qualitative and quantitative methods. The likelihood
812
+ and impact associated with inherent and residual risk shall be determined
813
+ independently, considering all risk categories (e.g., audit results, threat
814
+ and vulnerability analysis, and regulatory compliance).
815
+ questions:
816
+ - id: GRM-10.1
817
+ content: Are formal risk assessments aligned with the enterprise-wide framework
818
+ and performed at least annually, or at planned intervals, determining the
819
+ likelihood and impact of all identified risks, using qualitative and quantitative
820
+ methods?
821
+ - id: GRM-10.2
822
+ content: Is the likelihood and impact associated with inherent and residual
823
+ risk determined independently, considering all risk categories (e.g., audit
824
+ results, threat and vulnerability analysis, and regulatory compliance)?
825
+ - id: GRM-11
826
+ name: Program
827
+ specification: Risks shall be mitigated to an acceptable level. Acceptance levels
828
+ based on risk criteria shall be established and documented in accordance with
829
+ reasonable resolution time frames and stakeholder approval.
830
+ questions:
831
+ - id: GRM-11.1
832
+ content: Do you have a documented, organization-wide program in place to manage
833
+ risk?
834
+ - id: GRM-11.2
835
+ content: Do you make available documentation of your organization-wide risk
836
+ management program?
837
+ - id: HRS
838
+ name: Human Resources
839
+ controls:
840
+ - id: HRS-01
841
+ name: Asset Returns
842
+ specification: Upon termination of workforce personnel and/or expiration of
843
+ external business relationships, all organizationally-owned assets shall be
844
+ returned within an established period.
845
+ questions:
846
+ - id: HRS-01.1
847
+ content: Are systems in place to monitor for privacy breaches and notify tenants
848
+ expeditiously if a privacy event may have impacted their data?
849
+ - id: HRS-01.2
850
+ content: Is your Privacy Policy aligned with industry standards?
851
+ - id: HRS-02
852
+ name: Background Screening
853
+ specification: Pursuant to local laws, regulations, ethics, and contractual
854
+ constraints, all employment candidates, contractors, and third parties shall
855
+ be subject to background verification proportional to the data classification
856
+ to be accessed, the business requirements, and acceptable risk.
857
+ questions:
858
+ - id: HRS-02.1
859
+ content: Pursuant to local laws, regulations, ethics, and contractual constraints,
860
+ are all employment candidates, contractors, and involved third parties subject
861
+ to background verification?
862
+ - id: HRS-03
863
+ name: Employment Agreements
864
+ specification: Employment agreements shall incorporate provisions and/or terms
865
+ for adherence to established information governance and security policies
866
+ and must be signed by newly hired or on-boarded workforce personnel (e.g.,
867
+ full or part-time employee or contingent staff) prior to granting workforce
868
+ personnel user access to corporate facilities, resources, and assets.
869
+ questions:
870
+ - id: HRS-03.1
871
+ content: Do you specifically train your employees regarding their specific
872
+ role and the information security controls they must fulfill?
873
+ - id: HRS-03.2
874
+ content: Do you document employee acknowledgment of training they have completed?
875
+ - id: HRS-03.3
876
+ content: Are all personnel required to sign NDA or Confidentiality Agreements
877
+ as a condition of employment to protect customer/tenant information?
878
+ - id: HRS-03.4
879
+ content: Is successful and timed completion of the training program considered
880
+ a prerequisite for acquiring and maintaining access to sensitive systems?
881
+ - id: HRS-03.5
882
+ content: Are personnel trained and provided with awareness programs at least
883
+ once a year?
884
+ - id: HRS-04
885
+ name: Employment Termination
886
+ specification: Roles and responsibilities for performing employment termination
887
+ or change in employment procedures shall be assigned, documented, and communicated.
888
+ questions:
889
+ - id: HRS-04.1
890
+ content: Are documented policies, procedures, and guidelines in place to govern
891
+ change in employment and/or termination?
892
+ - id: HRS-04.2
893
+ content: Do the above procedures and guidelines account for timely revocation
894
+ of access and return of assets?
895
+ - id: HRS-05
896
+ name: Portable / Mobile Devices
897
+ specification: Policies and procedures shall be established, and supporting
898
+ business processes and technical measures implemented, to manage business
899
+ risks associated with permitting mobile device access to corporate resources
900
+ and may require the implementation of higher assurance compensating controls
901
+ and acceptable-use policies and procedures (e.g., mandated security training,
902
+ stronger identity, entitlement and access controls, and device monitoring).
903
+ questions:
904
+ - id: HRS-05.1
905
+ content: Are policies and procedures established and measures implemented
906
+ to strictly limit access to your sensitive data and tenant data from portable
907
+ and mobile devices (e.g., laptops, cell phones, and personal digital assistants
908
+ (PDAs)), which are generally higher-risk than non-portable devices (e.g.,
909
+ desktop computers at the provider organization’s facilities)?
910
+ - id: HRS-06
911
+ name: Non-Disclosure Agreements
912
+ specification: Requirements for non-disclosure or confidentiality agreements
913
+ reflecting the organization's needs for the protection of data and operational
914
+ details shall be identified, documented, and reviewed at planned intervals.
915
+ questions:
916
+ - id: HRS-06.1
917
+ content: Are requirements for non-disclosure or confidentiality agreements
918
+ reflecting the organization's needs for the protection of data and operational
919
+ details identified, documented, and reviewed at planned intervals?
920
+ - id: HRS-07
921
+ name: Roles / Responsibilities
922
+ specification: Roles and responsibilities of contractors, employees, and third-party
923
+ users shall be documented as they relate to information assets and security.
924
+ questions:
925
+ - id: HRS-07.1
926
+ content: Do you provide tenants with a role definition document clarifying
927
+ your administrative responsibilities versus those of the tenant?
928
+ - id: HRS-08
929
+ name: Acceptable Use
930
+ specification: Policies and procedures shall be established, and supporting
931
+ business processes and technical measures implemented, for defining allowances
932
+ and conditions for permitting usage of organizationally-owned or managed user
933
+ end-point devices (e.g., issued workstations, laptops, and mobile devices)
934
+ and IT infrastructure network and systems components. Additionally, defining
935
+ allowances and conditions to permit usage of personal mobile devices and associated
936
+ applications with access to corporate resources (i.e., BYOD) shall be considered
937
+ and incorporated as appropriate.
938
+ questions:
939
+ - id: HRS-08.1
940
+ content: Do you provide documentation regarding how you may access tenant
941
+ data and metadata?
942
+ - id: HRS-08.2
943
+ content: Do you collect or create metadata about tenant data usage through
944
+ inspection technologies (e.g., search engines, etc.)?
945
+ - id: HRS-08.3
946
+ content: Do you allow tenants to opt out of having their data/metadata accessed
947
+ via inspection technologies?
948
+ - id: HRS-09
949
+ name: Training / Awareness
950
+ specification: A security awareness training program shall be established for
951
+ all contractors, third-party users, and employees of the organization and
952
+ mandated when appropriate. All individuals with access to organizational data
953
+ shall receive appropriate awareness training and regular updates in organizational
954
+ procedures, processes, and policies relating to their professional function
955
+ relative to the organization.
956
+ questions:
957
+ - id: HRS-09.1
958
+ content: Do you provide a formal, role-based, security awareness training
959
+ program for cloud-related access and data management issues (e.g., multi-tenancy,
960
+ nationality, cloud delivery model, segregation of duties implications, and
961
+ conflicts of interest) for all persons with access to tenant data?
962
+ - id: HRS-09.2
963
+ content: Are administrators and data stewards properly educated on their legal
964
+ responsibilities with regard to security and data integrity?
965
+ - id: HRS-10
966
+ name: User Responsibility
967
+ specification: |-
968
+ All personnel shall be made aware of their roles and responsibilities for:
969
+ • Maintaining awareness and compliance with established policies and procedures and applicable legal, statutory, or regulatory compliance obligations.
970
+ • Maintaining a safe and secure working environment
971
+ questions:
972
+ - id: HRS-10.1
973
+ content: Are users made aware of their responsibilities for maintaining awareness
974
+ and compliance with published security policies, procedures, standards,
975
+ and applicable regulatory requirements?
976
+ - id: HRS-10.2
977
+ content: Are users made aware of their responsibilities for maintaining a
978
+ safe and secure working environment?
979
+ - id: HRS-10.3
980
+ content: Are users made aware of their responsibilities for leaving unattended
981
+ equipment in a secure manner?
982
+ - id: HRS-11
983
+ name: Workspace
984
+ specification: Policies and procedures shall be established to require that
985
+ unattended workspaces do not have openly visible (e.g., on a desktop) sensitive
986
+ documents and user computing sessions had been disabled after an established
987
+ period of inactivity.
988
+ questions:
989
+ - id: HRS-11.1
990
+ content: Do your data management policies and procedures address tenant and
991
+ service level conflicts of interests?
992
+ - id: HRS-11.2
993
+ content: Do your data management policies and procedures include a tamper
994
+ audit or software integrity function for unauthorized access to tenant data?
995
+ - id: HRS-11.3
996
+ content: Does the virtual machine management infrastructure include a tamper
997
+ audit or software integrity function to detect changes to the build/configuration
998
+ of the virtual machine?
999
+ - id: IAM
1000
+ name: Identity & Access Management
1001
+ controls:
1002
+ - id: IAM-01
1003
+ name: Audit Tools Access
1004
+ specification: Access to, and use of, audit tools that interact with the organization's
1005
+ information systems shall be appropriately segmented and restricted to prevent
1006
+ compromise and misuse of log data.
1007
+ questions:
1008
+ - id: IAM-01.1
1009
+ content: Do you restrict, log, and monitor access to your information security
1010
+ management systems (e.g., hypervisors, firewalls, vulnerability scanners,
1011
+ network sniffers, APIs, etc.)?
1012
+ - id: IAM-01.2
1013
+ content: Do you monitor and log privileged access (e.g., administrator level)
1014
+ to information security management systems?
1015
+ - id: IAM-02
1016
+ name: User Access Policy
1017
+ specification: |-
1018
+ User access policies and procedures shall be established, and supporting business processes and technical measures implemented, for ensuring appropriate identity, entitlement, and access management for all internal corporate and customer (tenant) users with access to data and organizationally-owned or managed (physical and virtual) application interfaces and infrastructure network and systems components. These policies, procedures, processes, and measures must incorporate the following:
1019
+ • Procedures, supporting roles, and responsibilities for provisioning and de-provisioning user account entitlements following the rule of least privilege based on job function (e.g., internal employee and contingent staff personnel changes, customer-controlled access, suppliers' business relationships, or other third-party business relationships)
1020
+ • Business case considerations for higher levels of assurance and multi-factor authentication secrets (e.g., management interfaces, key generation, remote access, segregation of duties, emergency access, large-scale provisioning or geographically-distributed deployments, and personnel redundancy for critical systems)
1021
+ • Access segmentation to sessions and data in multi-tenant architectures by any third party (e.g., provider and/or other customer (tenant))
1022
+ • Identity trust verification and service-to-service application (API) and information processing interoperability (e.g., SSO and federation)
1023
+ • Account credential lifecycle management from instantiation through revocation
1024
+ • Account credential and/or identity store minimization or re-use when feasible
1025
+ • Authentication, authorization, and accounting (AAA) rules for access to data and sessions (e.g., encryption and strong/multi-factor, expireable, non-shared authentication secrets)
1026
+ • Permissions and supporting capabilities for customer (tenant) controls over authentication, authorization, and accounting (AAA) rules for access to data and sessions
1027
+ • Adherence to applicable legal, statutory, or regulatory compliance requirements
1028
+ questions:
1029
+ - id: IAM-02.1
1030
+ content: Do you have controls in place ensuring timely removal of systems
1031
+ access that is no longer required for business purposes?
1032
+ - id: IAM-02.2
1033
+ content: Do you provide metrics to track the speed with which you are able
1034
+ to remove systems access that is no longer required for business purposes?
1035
+ - id: IAM-03
1036
+ name: Diagnostic / Configuration Ports Access
1037
+ specification: User access to diagnostic and configuration ports shall be restricted
1038
+ to authorized individuals and applications.
1039
+ questions:
1040
+ - id: IAM-03.1
1041
+ content: Do you use dedicated secure networks to provide management access
1042
+ to your cloud service infrastructure?
1043
+ - id: IAM-04
1044
+ name: Policies and Procedures
1045
+ specification: Policies and procedures shall be established to store and manage
1046
+ identity information about every person who accesses IT infrastructure and
1047
+ to determine their level of access. Policies shall also be developed to control
1048
+ access to network resources based on user identity.
1049
+ questions:
1050
+ - id: IAM-04.1
1051
+ content: Do you manage and store the identity of all personnel who have access
1052
+ to the IT infrastructure, including their level of access?
1053
+ - id: IAM-04.2
1054
+ content: Do you manage and store the user identity of all personnel who have
1055
+ network access, including their level of access?
1056
+ - id: IAM-05
1057
+ name: Segregation of Duties
1058
+ specification: User access policies and procedures shall be established, and
1059
+ supporting business processes and technical measures implemented, for restricting
1060
+ user access as per defined segregation of duties to address business risks
1061
+ associated with a user-role conflict of interest.
1062
+ questions:
1063
+ - id: IAM-05.1
1064
+ content: Do you provide tenants with documentation on how you maintain segregation
1065
+ of duties within your cloud service offering?
1066
+ - id: IAM-06
1067
+ name: Source Code Access Restriction
1068
+ specification: Access to the organization's own developed applications, program,
1069
+ or object source code, or any other form of intellectual property (IP), and
1070
+ use of proprietary software shall be appropriately restricted following the
1071
+ rule of least privilege based on job function as per established user access
1072
+ policies and procedures.
1073
+ questions:
1074
+ - id: IAM-06.1
1075
+ content: Are controls in place to prevent unauthorized access to your application,
1076
+ program, or object source code, and assure it is restricted to authorized
1077
+ personnel only?
1078
+ - id: IAM-06.2
1079
+ content: Are controls in place to prevent unauthorized access to tenant application,
1080
+ program, or object source code, and assure it is restricted to authorized
1081
+ personnel only?
1082
+ - id: IAM-07
1083
+ name: Third Party Access
1084
+ specification: The identification, assessment, and prioritization of risks posed
1085
+ by business processes requiring third-party access to the organization's information
1086
+ systems and data shall be followed by coordinated application of resources
1087
+ to minimize, monitor, and measure likelihood and impact of unauthorized or
1088
+ inappropriate access. Compensating controls derived from the risk analysis
1089
+ shall be implemented prior to provisioning access.
1090
+ questions:
1091
+ - id: IAM-07.1
1092
+ content: Do you provide multi-failure disaster recovery capability?
1093
+ - id: IAM-07.2
1094
+ content: Do you monitor service continuity with upstream providers in the
1095
+ event of provider failure?
1096
+ - id: IAM-07.3
1097
+ content: Do you have more than one provider for each service you depend on?
1098
+ - id: IAM-07.4
1099
+ content: Do you provide access to operational redundancy and continuity summaries,
1100
+ including the services you depend on?
1101
+ - id: IAM-07.5
1102
+ content: Do you provide the tenant the ability to declare a disaster?
1103
+ - id: IAM-07.6
1104
+ content: Do you provide a tenant-triggered failover option?
1105
+ - id: IAM-07.7
1106
+ content: Do you share your business continuity and redundancy plans with your
1107
+ tenants?
1108
+ - id: IAM-08
1109
+ name: User Access Restriction / Authorization
1110
+ specification: Policies and procedures are established for permissible storage
1111
+ and access of identities used for authentication to ensure identities are
1112
+ only accessible based on rules of least privilege and replication limitation
1113
+ only to users explicitly defined as business necessary.
1114
+ questions:
1115
+ - id: IAM-08.1
1116
+ content: Do you document how you grant and approve access to tenant data?
1117
+ - id: IAM-08.2
1118
+ content: Do you have a method of aligning provider and tenant data classification
1119
+ methodologies for access control purposes?
1120
+ - id: IAM-09
1121
+ name: User Access Authorization
1122
+ specification: Provisioning user access (e.g., employees, contractors, customers
1123
+ (tenants), business partners and/or supplier relationships) to data and organizationally-owned
1124
+ or managed (physical and virtual) applications, infrastructure systems, and
1125
+ network components shall be authorized by the organization's management prior
1126
+ to access being granted and appropriately restricted as per established policies
1127
+ and procedures. Upon request, provider shall inform customer (tenant) of this
1128
+ user access, especially if customer (tenant) data is used as part of the service
1129
+ and/or customer (tenant) has some shared responsibility over implementation
1130
+ of control.
1131
+ questions:
1132
+ - id: IAM-09.1
1133
+ content: Does your management provision the authorization and restrictions
1134
+ for user access (e.g., employees, contractors, customers (tenants), business
1135
+ partners, and/or suppliers) prior to their access to data and any owned
1136
+ or managed (physical and virtual) applications, infrastructure systems,
1137
+ and network components?
1138
+ - id: IAM-09.2
1139
+ content: Do you provide upon request user access (e.g., employees, contractors,
1140
+ customers (tenants), business partners and/or suppliers) to data and any
1141
+ owned or managed (physical and virtual) applications, infrastructure systems
1142
+ and network components?
1143
+ - id: IAM-10
1144
+ name: User Access Reviews
1145
+ specification: User access shall be authorized and revalidated for entitlement
1146
+ appropriateness, at planned intervals, by the organization's business leadership
1147
+ or other accountable business role or function supported by evidence to demonstrate
1148
+ the organization is adhering to the rule of least privilege based on job function.
1149
+ For identified access violations, remediation must follow established user
1150
+ access policies and procedures.
1151
+ questions:
1152
+ - id: IAM-10.1
1153
+ content: Do you require at least annual certification of entitlements for
1154
+ all system users and administrators (exclusive of users maintained by your
1155
+ tenants)?
1156
+ - id: IAM-10.2
1157
+ content: If users are found to have inappropriate entitlements, are all remediation
1158
+ and certification actions recorded?
1159
+ - id: IAM-10.3
1160
+ content: Will you share user entitlement remediation and certification reports
1161
+ with your tenants, if inappropriate access may have been allowed to tenant
1162
+ data?
1163
+ - id: IAM-11
1164
+ name: User Access Revocation
1165
+ specification: Timely de-provisioning (revocation or modification) of user access
1166
+ to data and organizationally-owned or managed (physical and virtual) applications,
1167
+ infrastructure systems, and network components, shall be implemented as per
1168
+ established policies and procedures and based on user's change in status (e.g.,
1169
+ termination of employment or other business relationship, job change, or transfer).
1170
+ Upon request, provider shall inform customer (tenant) of these changes, especially
1171
+ if customer (tenant) data is used as part the service and/or customer (tenant)
1172
+ has some shared responsibility over implementation of control.
1173
+ questions:
1174
+ - id: IAM-11.1
1175
+ content: Is timely deprovisioning, revocation, or modification of user access
1176
+ to the organizations systems, information assets, and data implemented upon
1177
+ any change in status of employees, contractors, customers, business partners,
1178
+ or involved third parties?
1179
+ - id: IAM-11.2
1180
+ content: Is any change in user access status intended to include termination
1181
+ of employment, contract or agreement, change of employment or transfer within
1182
+ the organization?
1183
+ - id: IAM-12
1184
+ name: User ID Credentials
1185
+ specification: |-
1186
+ Internal corporate or customer (tenant) user account credentials shall be restricted as per the following, ensuring appropriate identity, entitlement, and access management and in accordance with established policies and procedures:
1187
+ • Identity trust verification and service-to-service application (API) and information processing interoperability (e.g., SSO and Federation)
1188
+ • Account credential lifecycle management from instantiation through revocation
1189
+ • Account credential and/or identity store minimization or re-use when feasible
1190
+ • Adherence to industry acceptable and/or regulatory compliant authentication, authorization, and accounting (AAA) rules (e.g., strong/multi-factor, expireable, non-shared authentication secrets)
1191
+ questions:
1192
+ - id: IAM-12.1
1193
+ content: Do you support use of, or integration with, existing customer-based
1194
+ Single Sign On (SSO) solutions to your service?
1195
+ - id: IAM-12.2
1196
+ content: Do you use open standards to delegate authentication capabilities
1197
+ to your tenants?
1198
+ - id: IAM-12.3
1199
+ content: Do you support identity federation standards (e.g., SAML, SPML, WS-Federation,
1200
+ etc.) as a means of authenticating/authorizing users?
1201
+ - id: IAM-12.4
1202
+ content: Do you have a Policy Enforcement Point capability (e.g., XACML) to
1203
+ enforce regional legal and policy constraints on user access?
1204
+ - id: IAM-12.5
1205
+ content: Do you have an identity management system (enabling classification
1206
+ of data for a tenant) in place to enable both role-based and context-based
1207
+ entitlement to data?
1208
+ - id: IAM-12.6
1209
+ content: Do you provide tenants with strong (multifactor) authentication options
1210
+ (e.g., digital certs, tokens, biometrics, etc.) for user access?
1211
+ - id: IAM-12.7
1212
+ content: Do you allow tenants to use third-party identity assurance services?
1213
+ - id: IAM-12.8
1214
+ content: Do you support password (e.g., minimum length, age, history, complexity)
1215
+ and account lockout (e.g., lockout threshold, lockout duration) policy enforcement?
1216
+ - id: IAM-12.9
1217
+ content: Do you allow tenants/customers to define password and account lockout
1218
+ policies for their accounts?
1219
+ - id: IAM-12.10
1220
+ content: Do you support the ability to force password changes upon first logon?
1221
+ - id: IAM-12.11
1222
+ content: Do you have mechanisms in place for unlocking accounts that have
1223
+ been locked out (e.g., self-service via email, defined challenge questions,
1224
+ manual unlock)?
1225
+ - id: IAM-13
1226
+ name: Utility Programs Access
1227
+ specification: Utility programs capable of potentially overriding system, object,
1228
+ network, virtual machine, and application controls shall be restricted.
1229
+ questions:
1230
+ - id: IAM-13.1
1231
+ content: Are utilities that can significantly manage virtualized partitions
1232
+ (e.g., shutdown, clone, etc.) appropriately restricted and monitored?
1233
+ - id: IAM-13.2
1234
+ content: Do you have the capability to detect attacks that target the virtual
1235
+ infrastructure directly (e.g., shimming, Blue Pill, Hyper jumping, etc.)?
1236
+ - id: IAM-13.3
1237
+ content: Are attacks that target the virtual infrastructure prevented with
1238
+ technical controls?
1239
+ - id: IVS
1240
+ name: Infrastructure & Virtualization Security
1241
+ controls:
1242
+ - id: IVS-01
1243
+ name: Audit Logging / Intrusion Detection
1244
+ specification: Higher levels of assurance are required for protection, retention,
1245
+ and lifecycle management of audit logs, adhering to applicable legal, statutory,
1246
+ or regulatory compliance obligations and providing unique user access accountability
1247
+ to detect potentially suspicious network behaviors and/or file integrity anomalies,
1248
+ and to support forensic investigative capabilities in the event of a security
1249
+ breach.
1250
+ questions:
1251
+ - id: IVS-01.1
1252
+ content: Are file integrity (host) and network intrusion detection (IDS) tools
1253
+ implemented to help facilitate timely detection, investigation by root cause
1254
+ analysis, and response to incidents?
1255
+ - id: IVS-01.2
1256
+ content: Is physical and logical user access to audit logs restricted to authorized
1257
+ personnel?
1258
+ - id: IVS-01.3
1259
+ content: Can you provide evidence that due diligence mapping of regulations
1260
+ and standards to your controls/architecture/processes has been done?
1261
+ - id: IVS-01.4
1262
+ content: Are audit logs centrally stored and retained?
1263
+ - id: IVS-01.5
1264
+ content: Are audit logs reviewed on a regular basis for security events (e.g.,
1265
+ with automated tools)?
1266
+ - id: IVS-02
1267
+ name: Change Detection
1268
+ specification: The provider shall ensure the integrity of all virtual machine
1269
+ images at all times. Any changes made to virtual machine images must be logged
1270
+ and an alert raised regardless of their running state (e.g., dormant, off,
1271
+ or running). The results of a change or move of an image and the subsequent
1272
+ validation of the image's integrity must be immediately available to customers
1273
+ through electronic methods (e.g., portals or alerts).
1274
+ questions:
1275
+ - id: IVS-02.1
1276
+ content: Do you log and alert any changes made to virtual machine images regardless
1277
+ of their running state (e.g., dormant, off or running)?
1278
+ - id: IVS-02.2
1279
+ content: Are changes made to virtual machines, or moving of an image and subsequent
1280
+ validation of the image's integrity, made immediately available to customers
1281
+ through electronic methods (e.g., portals or alerts)?
1282
+ - id: IVS-03
1283
+ name: Clock Synchronization
1284
+ specification: A reliable and mutually agreed upon external time source shall
1285
+ be used to synchronize the system clocks of all relevant information processing
1286
+ systems to facilitate tracing and reconstitution of activity timelines.
1287
+ questions:
1288
+ - id: IVS-03.1
1289
+ content: Do you use a synchronized time-service protocol (e.g., NTP) to ensure
1290
+ all systems have a common time reference?
1291
+ - id: IVS-04
1292
+ name: Capacity / Resource Planning
1293
+ specification: The availability, quality, and adequate capacity and resources
1294
+ shall be planned, prepared, and measured to deliver the required system performance
1295
+ in accordance with legal, statutory, and regulatory compliance obligations.
1296
+ Projections of future capacity requirements shall be made to mitigate the
1297
+ risk of system overload.
1298
+ questions:
1299
+ - id: IVS-04.1
1300
+ content: Do you provide documentation regarding what levels of system (e.g.,
1301
+ network, storage, memory, I/O, etc.) oversubscription you maintain and under
1302
+ what circumstances/scenarios?
1303
+ - id: IVS-04.2
1304
+ content: Do you restrict use of the memory oversubscription capabilities present
1305
+ in the hypervisor?
1306
+ - id: IVS-04.3
1307
+ content: Do your system capacity requirements take into account current, projected,
1308
+ and anticipated capacity needs for all systems used to provide services
1309
+ to the tenants?
1310
+ - id: IVS-04.4
1311
+ content: Is system performance monitored and tuned in order to continuously
1312
+ meet regulatory, contractual, and business requirements for all the systems
1313
+ used to provide services to the tenants?
1314
+ - id: IVS-05
1315
+ name: Management - Vulnerability Management
1316
+ specification: Implementers shall ensure that the security vulnerability assessment
1317
+ tools or services accommodate the virtualization technologies used (e.g.,
1318
+ virtualization aware).
1319
+ questions:
1320
+ - id: IVS-05.1
1321
+ content: Do security vulnerability assessment tools or services accommodate
1322
+ the virtualization technologies being used (e.g., virtualization aware)?
1323
+ - id: IVS-06
1324
+ name: Network Security
1325
+ specification: Network environments and virtual instances shall be designed
1326
+ and configured to restrict and monitor traffic between trusted and untrusted
1327
+ connections. These configurations shall be reviewed at least annually, and
1328
+ supported by a documented justification for use for all allowed services,
1329
+ protocols, ports, and compensating controls.
1330
+ questions:
1331
+ - id: IVS-06.1
1332
+ content: For your IaaS offering, do you provide customers with guidance on
1333
+ how to create a layered security architecture equivalence using your virtualized
1334
+ solution?
1335
+ - id: IVS-06.2
1336
+ content: Do you regularly update network architecture diagrams that include
1337
+ data flows between security domains/zones?
1338
+ - id: IVS-06.3
1339
+ content: Do you regularly review for appropriateness the allowed access/connectivity
1340
+ (e.g., firewall rules) between security domains/zones within the network?
1341
+ - id: IVS-06.4
1342
+ content: Are all firewall access control lists documented with business justification?
1343
+ - id: IVS-07
1344
+ name: OS Hardening and Base Controls
1345
+ specification: 'Each operating system shall be hardened to provide only necessary
1346
+ ports, protocols, and services to meet business needs and have in place supporting
1347
+ technical controls such as: antivirus, file integrity monitoring, and logging
1348
+ as part of their baseline operating build standard or template.'
1349
+ questions:
1350
+ - id: IVS-07.1
1351
+ content: Are operating systems hardened to provide only the necessary ports,
1352
+ protocols, and services to meet business needs using technical controls
1353
+ (e.g., antivirus, file integrity monitoring, and logging) as part of their
1354
+ baseline build standard or template?
1355
+ - id: IVS-08
1356
+ name: Production / Non-Production Environments
1357
+ specification: 'Production and non-production environments shall be separated
1358
+ to prevent unauthorized access or changes to information assets. Separation
1359
+ of the environments may include: stateful inspection firewalls, domain/realm
1360
+ authentication sources, and clear segregation of duties for personnel accessing
1361
+ these environments as part of their job duties.'
1362
+ questions:
1363
+ - id: IVS-08.1
1364
+ content: For your SaaS or PaaS offering, do you provide tenants with separate
1365
+ environments for production and test processes?
1366
+ - id: IVS-08.2
1367
+ content: For your IaaS offering, do you provide tenants with guidance on how
1368
+ to create suitable production and test environments?
1369
+ - id: IVS-08.3
1370
+ content: Do you logically and physically segregate production and non-production
1371
+ environments?
1372
+ - id: IVS-09
1373
+ name: Segmentation
1374
+ specification: |-
1375
+ Multi-tenant organizationally-owned or managed (physical and virtual) applications, and infrastructure system and network components, shall be designed, developed, deployed, and configured such that provider and customer (tenant) user access is appropriately segmented from other tenant users, based on the following considerations:
1376
+ • Established policies and procedures
1377
+ • Isolation of business critical assets and/or sensitive user data and sessions that mandate stronger internal controls and high levels of assurance
1378
+ • Compliance with legal, statutory, and regulatory compliance obligations
1379
+ questions:
1380
+ - id: IVS-09.1
1381
+ content: Are system and network environments protected by a firewall or virtual
1382
+ firewall to ensure business and customer security requirements?
1383
+ - id: IVS-09.2
1384
+ content: Are system and network environments protected by a firewall or virtual
1385
+ firewall to ensure compliance with legislative, regulatory, and contractual
1386
+ requirements?
1387
+ - id: IVS-09.3
1388
+ content: Are system and network environments protected by a firewall or virtual
1389
+ firewall to ensure separation of production and non-production environments?
1390
+ - id: IVS-09.4
1391
+ content: Are system and network environments protected by a firewall or virtual
1392
+ firewall to ensure protection and isolation of sensitive data?
1393
+ - id: IVS-10
1394
+ name: VM Security - Data Protection
1395
+ specification: Secured and encrypted communication channels shall be used when
1396
+ migrating physical servers, applications, or data to virtualized servers and,
1397
+ where possible, shall use a network segregated from production-level networks
1398
+ for such migrations.
1399
+ questions:
1400
+ - id: IVS-10.1
1401
+ content: Are secured and encrypted communication channels used when migrating
1402
+ physical servers, applications, or data to virtual servers?
1403
+ - id: IVS-10.2
1404
+ content: Do you use a network segregated from production-level networks when
1405
+ migrating physical servers, applications, or data to virtual servers?
1406
+ - id: IVS-11
1407
+ name: VMM Security - Hypervisor Hardening
1408
+ specification: Access to all hypervisor management functions or administrative
1409
+ consoles for systems hosting virtualized systems shall be restricted to personnel
1410
+ based upon the principle of least privilege and supported through technical
1411
+ controls (e.g., two-factor authentication, audit trails, IP address filtering,
1412
+ firewalls, and TLS encapsulated communications to the administrative consoles).
1413
+ questions:
1414
+ - id: IVS-11.1
1415
+ content: Do you restrict personnel access to all hypervisor management functions
1416
+ or administrative consoles for systems hosting virtualized systems based
1417
+ on the principle of least privilege and supported through technical controls
1418
+ (e.g., two-factor authentication, audit trails, IP address filtering, firewalls
1419
+ and TLS-encapsulated communications to the administrative consoles)?
1420
+ - id: IVS-12
1421
+ name: Wireless Security
1422
+ specification: |-
1423
+ Policies and procedures shall be established, and supporting business processes and technical measures implemented, to protect wireless network environments, including the following:
1424
+ • Perimeter firewalls implemented and configured to restrict unauthorized traffic
1425
+ • Security settings enabled with strong encryption for authentication and transmission, replacing vendor default settings (e.g., encryption keys, passwords, and SNMP community strings)
1426
+ • User access to wireless network devices restricted to authorized personnel
1427
+ • The capability to detect the presence of unauthorized (rogue) wireless network devices for a timely disconnect from the network
1428
+ questions:
1429
+ - id: IVS-12.1
1430
+ content: Are policies and procedures established and mechanisms configured
1431
+ and implemented to protect the wireless network environment perimeter and
1432
+ to restrict unauthorized wireless traffic?
1433
+ - id: IVS-12.2
1434
+ content: Are policies and procedures established and mechanisms implemented
1435
+ to ensure wireless security settings are enabled with strong encryption
1436
+ for authentication and transmission, replacing vendor default settings (e.g.,
1437
+ encryption keys, passwords, SNMP community strings)?
1438
+ - id: IVS-12.3
1439
+ content: Are policies and procedures established and mechanisms implemented
1440
+ to protect wireless network environments and detect the presence of unauthorized
1441
+ (rogue) network devices for a timely disconnect from the network?
1442
+ - id: IVS-13
1443
+ name: Network Architecture
1444
+ specification: Network architecture diagrams shall clearly identify high-risk
1445
+ environments and data flows that may have legal compliance impacts. Technical
1446
+ measures shall be implemented and shall apply defense-in-depth techniques
1447
+ (e.g., deep packet analysis, traffic throttling, and black-holing) for detection
1448
+ and timely response to network-based attacks associated with anomalous ingress
1449
+ or egress traffic patterns (e.g., MAC spoofing and ARP poisoning attacks)
1450
+ and/or distributed denial-of-service (DDoS) attacks.
1451
+ questions:
1452
+ - id: IVS-13.1
1453
+ content: Do your network architecture diagrams clearly identify high-risk
1454
+ environments and data flows that may have legal compliance impacts?
1455
+ - id: IVS-13.2
1456
+ content: Do you implement technical measures and apply defense-in-depth techniques
1457
+ (e.g., deep packet analysis, traffic throttling and black-holing) for detection
1458
+ and timely response to network-based attacks associated with anomalous ingress
1459
+ or egress traffic patterns (e.g., MAC spoofing and ARP poisoning attacks)
1460
+ and/or distributed denial-of-service (DDoS) attacks?
1461
+ - id: IPY
1462
+ name: Interoperability & Portability
1463
+ controls:
1464
+ - id: IPY-01
1465
+ name: APIs
1466
+ specification: The provider shall use open and published APIs to ensure support
1467
+ for interoperability between components and to facilitate migrating applications.
1468
+ questions:
1469
+ - id: IPY-01.1
1470
+ content: Do you publish a list of all APIs available in the service and indicate
1471
+ which are standard and which are customized?
1472
+ - id: IPY-02
1473
+ name: Data Request
1474
+ specification: All structured and unstructured data shall be available to the
1475
+ customer and provided to them upon request in an industry-standard format
1476
+ (e.g., .doc, .xls, .pdf, logs, and flat files).
1477
+ questions:
1478
+ - id: IPY-02.1
1479
+ content: Is unstructured customer data available on request in an industry-standard
1480
+ format (e.g., .doc, .xls, or .pdf)?
1481
+ - id: IPY-03
1482
+ name: Policy & Legal
1483
+ specification: Policies, procedures, and mutually-agreed upon provisions and/or
1484
+ terms shall be established to satisfy customer (tenant) requirements for service-to-service
1485
+ application (API) and information processing interoperability, and portability
1486
+ for application development and information exchange, usage, and integrity
1487
+ persistence.
1488
+ questions:
1489
+ - id: IPY-03.1
1490
+ content: Do you provide policies and procedures (i.e. service level agreements)
1491
+ governing the use of APIs for interoperability between your service and
1492
+ third-party applications?
1493
+ - id: IPY-03.2
1494
+ content: Do you provide policies and procedures (i.e. service level agreements)
1495
+ governing the migration of application data to and from your service?
1496
+ - id: IPY-04
1497
+ name: Standardized Network Protocols
1498
+ specification: The provider shall use secure (e.g., non-clear text and authenticated)
1499
+ standardized network protocols for the import and export of data and to manage
1500
+ the service, and shall make available a document to consumers (tenants) detailing
1501
+ the relevant interoperability and portability standards that are involved.
1502
+ questions:
1503
+ - id: IPY-04.1
1504
+ content: Can data import, data export, and service management be conducted
1505
+ over secure (e.g., non-clear text and authenticated), industry accepted
1506
+ standardized network protocols?
1507
+ - id: IPY-04.2
1508
+ content: Do you provide consumers (tenants) with documentation detailing the
1509
+ relevant interoperability and portability network protocol standards that
1510
+ are involved?
1511
+ - id: IPY-05
1512
+ name: Virtualization
1513
+ specification: The provider shall use an industry-recognized virtualization
1514
+ platform and standard virtualization formats (e.g., OVF) to help ensure interoperability,
1515
+ and shall have documented custom changes made to any hypervisor in use, and
1516
+ all solution-specific virtualization hooks, available for customer review.
1517
+ questions:
1518
+ - id: IPY-05.1
1519
+ content: Do you use an industry-recognized virtualization platform and standard
1520
+ virtualization formats (e.g., OVF) to help ensure interoperability?
1521
+ - id: IPY-05.2
1522
+ content: Do you have documented custom changes made to any hypervisor in use,
1523
+ and all solution-specific virtualization hooks available for customer review?
1524
+ - id: MOS
1525
+ name: Mobile Security
1526
+ controls:
1527
+ - id: MOS-01
1528
+ name: Anti-Malware
1529
+ specification: Anti-malware awareness training, specific to mobile devices,
1530
+ shall be included in the provider's information security awareness training.
1531
+ questions:
1532
+ - id: MOS-01.1
1533
+ content: Do you provide anti-malware training specific to mobile devices as
1534
+ part of your information security awareness training?
1535
+ - id: MOS-02
1536
+ name: Application Stores
1537
+ specification: A documented list of approved application stores has been communicated
1538
+ as acceptable for mobile devices accessing or storing provider managed data.
1539
+ questions:
1540
+ - id: MOS-02.1
1541
+ content: Do you document and make available lists of approved application
1542
+ stores for mobile devices accessing or storing company data and/or company
1543
+ systems?
1544
+ - id: MOS-03
1545
+ name: Approved Applications
1546
+ specification: The company shall have a documented policy prohibiting the installation
1547
+ of non-approved applications or approved applications not obtained through
1548
+ a pre-identified application store.
1549
+ questions:
1550
+ - id: MOS-03.1
1551
+ content: Do you have a policy enforcement capability (e.g., XACML) to ensure
1552
+ that only approved applications and those from approved application stores
1553
+ can be loaded onto a mobile device?
1554
+ - id: MOS-04
1555
+ name: Approved Software for BYOD
1556
+ specification: The BYOD policy and supporting awareness training clearly states
1557
+ the approved applications, application stores, and application extensions
1558
+ and plugins that may be used for BYOD usage.
1559
+ questions:
1560
+ - id: MOS-04.1
1561
+ content: Does your BYOD policy and training clearly state which applications
1562
+ and applications stores are approved for use on BYOD devices?
1563
+ - id: MOS-05
1564
+ name: Awareness and Training
1565
+ specification: The provider shall have a documented mobile device policy that
1566
+ includes a documented definition for mobile devices and the acceptable usage
1567
+ and requirements for all mobile devices. The provider shall post and communicate
1568
+ the policy and requirements through the company's security awareness and training
1569
+ program.
1570
+ questions:
1571
+ - id: MOS-05.1
1572
+ content: Do you have a documented mobile device policy in your employee training
1573
+ that clearly defines mobile devices and the accepted usage and requirements
1574
+ for mobile devices?
1575
+ - id: MOS-06
1576
+ name: Cloud Based Services
1577
+ specification: All cloud-based services used by the company's mobile devices
1578
+ or BYOD shall be pre-approved for usage and the storage of company business
1579
+ data.
1580
+ questions:
1581
+ - id: MOS-06.1
1582
+ content: Do you have a documented list of pre-approved cloud based services
1583
+ that are allowed to be used for use and storage of company business data
1584
+ via a mobile device?
1585
+ - id: MOS-07
1586
+ name: Compatibility
1587
+ specification: The company shall have a documented application validation process
1588
+ to test for mobile device, operating system, and application compatibility
1589
+ issues.
1590
+ questions:
1591
+ - id: MOS-07.1
1592
+ content: Do you have a documented application validation process for testing
1593
+ device, operating system, and application compatibility issues?
1594
+ - id: MOS-08
1595
+ name: Device Eligibility
1596
+ specification: The BYOD policy shall define the device and eligibility requirements
1597
+ to allow for BYOD usage.
1598
+ questions:
1599
+ - id: MOS-08.1
1600
+ content: Do you have a BYOD policy that defines the device(s) and eligibility
1601
+ requirements allowed for BYOD usage?
1602
+ - id: MOS-09
1603
+ name: Device Inventory
1604
+ specification: An inventory of all mobile devices used to store and access company
1605
+ data shall be kept and maintained. All changes to the status of these devices,
1606
+ (i.e., operating system and patch levels, lost or decommissioned status, and
1607
+ to whom the device is assigned or approved for usage (BYOD)), will be included
1608
+ for each device in the inventory.
1609
+ questions:
1610
+ - id: MOS-09.1
1611
+ content: Do you maintain an inventory of all mobile devices storing and accessing
1612
+ company data which includes device status (e.g., operating system and patch
1613
+ levels, lost or decommissioned, device assignee)?
1614
+ - id: MOS-10
1615
+ name: Device Management
1616
+ specification: A centralized, mobile device management solution shall be deployed
1617
+ to all mobile devices permitted to store, transmit, or process customer data.
1618
+ questions:
1619
+ - id: MOS-10.1
1620
+ content: Do you have a centralized mobile device management solution deployed
1621
+ to all mobile devices that are permitted to store, transmit, or process
1622
+ company data?
1623
+ - id: MOS-11
1624
+ name: Encryption
1625
+ specification: The mobile device policy shall require the use of encryption
1626
+ either for the entire device or for data identified as sensitive on all mobile
1627
+ devices and shall be enforced through technology controls.
1628
+ questions:
1629
+ - id: MOS-11.1
1630
+ content: Does your mobile device policy require the use of encryption for
1631
+ either the entire device or for data identified as sensitive enforceable
1632
+ through technology controls for all mobile devices?
1633
+ - id: MOS-12
1634
+ name: Jailbreaking and Rooting
1635
+ specification: The mobile device policy shall prohibit the circumvention of
1636
+ built-in security controls on mobile devices (e.g., jailbreaking or rooting)
1637
+ and is enforced through detective and preventative controls on the device
1638
+ or through a centralized device management system (e.g., mobile device management).
1639
+ questions:
1640
+ - id: MOS-12.1
1641
+ content: Does your mobile device policy prohibit the circumvention of built-in
1642
+ security controls on mobile devices (e.g., jailbreaking or rooting)?
1643
+ - id: MOS-12.2
1644
+ content: Do you have detective and preventative controls on the device or
1645
+ via a centralized device management system which prohibit the circumvention
1646
+ of built-in security controls?
1647
+ - id: MOS-13
1648
+ name: Legal
1649
+ specification: The BYOD policy includes clarifying language for the expectation
1650
+ of privacy, requirements for litigation, e-discovery, and legal holds. The
1651
+ BYOD policy shall clearly state the expectations over the loss of non-company
1652
+ data in the case that a wipe of the device is required.
1653
+ questions:
1654
+ - id: MOS-13.1
1655
+ content: Does your BYOD policy clearly define the expectation of privacy,
1656
+ requirements for litigation, e-discovery, and legal holds?
1657
+ - id: MOS-13.2
1658
+ content: Do you have detective and preventative controls on the device or
1659
+ via a centralized device management system which prohibit the circumvention
1660
+ of built-in security controls?
1661
+ - id: MOS-14
1662
+ name: Lockout Screen
1663
+ specification: BYOD and/or company owned devices are configured to require an
1664
+ automatic lockout screen, and the requirement shall be enforced through technical
1665
+ controls.
1666
+ questions:
1667
+ - id: MOS-14.1
1668
+ content: Do you require and enforce via technical controls an automatic lockout
1669
+ screen for BYOD and company owned devices?
1670
+ - id: MOS-15
1671
+ name: Operating Systems
1672
+ specification: Changes to mobile device operating systems, patch levels, and/or
1673
+ applications shall be managed through the company's change management processes.
1674
+ questions:
1675
+ - id: MOS-15.1
1676
+ content: Do you manage all changes to mobile device operating systems, patch
1677
+ levels, and applications via your company's change management processes?
1678
+ - id: MOS-16
1679
+ name: Passwords
1680
+ specification: Password policies, applicable to mobile devices, shall be documented
1681
+ and enforced through technical controls on all company devices or devices
1682
+ approved for BYOD usage, and shall prohibit the changing of password/PIN lengths
1683
+ and authentication requirements.
1684
+ questions:
1685
+ - id: MOS-16.1
1686
+ content: Do you have password policies for enterprise issued mobile devices
1687
+ and/or BYOD mobile devices?
1688
+ - id: MOS-16.2
1689
+ content: Are your password policies enforced through technical controls (i.e.
1690
+ MDM)?
1691
+ - id: MOS-16.3
1692
+ content: Do your password policies prohibit the changing of authentication
1693
+ requirements (i.e. password/PIN length) via a mobile device?
1694
+ - id: MOS-17
1695
+ name: Policy
1696
+ specification: The mobile device policy shall require the BYOD user to perform
1697
+ backups of data, prohibit the usage of unapproved application stores, and
1698
+ require the use of anti-malware software (where supported).
1699
+ questions:
1700
+ - id: MOS-17.1
1701
+ content: Do you have a policy that requires BYOD users to perform backups
1702
+ of specified corporate data?
1703
+ - id: MOS-17.2
1704
+ content: Do you have a policy that requires BYOD users to prohibit the usage
1705
+ of unapproved application stores?
1706
+ - id: MOS-17.3
1707
+ content: Do you have a policy that requires BYOD users to use anti-malware
1708
+ software (where supported)?
1709
+ - id: MOS-18
1710
+ name: Remote Wipe
1711
+ specification: All mobile devices permitted for use through the company BYOD
1712
+ program or a company-assigned mobile device shall allow for remote wipe by
1713
+ the company's corporate IT or shall have all company-provided data wiped by
1714
+ the company's corporate IT.
1715
+ questions:
1716
+ - id: MOS-18.1
1717
+ content: Does your IT provide remote wipe or corporate data wipe for all company-accepted
1718
+ BYOD devices?
1719
+ - id: MOS-18.2
1720
+ content: Does your IT provide remote wipe or corporate data wipe for all company-assigned
1721
+ mobile devices?
1722
+ - id: MOS-19
1723
+ name: Security Patches
1724
+ specification: Mobile devices connecting to corporate networks or storing and
1725
+ accessing company information shall allow for remote software version/patch
1726
+ validation. All mobile devices shall have the latest available security-related
1727
+ patches installed upon general release by the device manufacturer or carrier
1728
+ and authorized IT personnel shall be able to perform these updates remotely.
1729
+ questions:
1730
+ - id: MOS-19.1
1731
+ content: Do your mobile devices have the latest available security-related
1732
+ patches installed upon general release by the device manufacturer or carrier?
1733
+ - id: MOS-19.2
1734
+ content: Do your mobile devices allow for remote validation to download the
1735
+ latest security patches by company IT personnel?
1736
+ - id: MOS-20
1737
+ name: Users
1738
+ specification: The BYOD policy shall clarify the systems and servers allowed
1739
+ for use or access on a BYOD-enabled device.
1740
+ questions:
1741
+ - id: MOS-20.1
1742
+ content: Does your BYOD policy clarify the systems and servers allowed for
1743
+ use or access on the BYOD-enabled device?
1744
+ - id: MOS-20.2
1745
+ content: Does your BYOD policy specify the user roles that are allowed access
1746
+ via a BYOD-enabled device?
1747
+ - id: SEF
1748
+ name: Security Incident Management, E-Discovery, & Cloud Forensics
1749
+ controls:
1750
+ - id: SEF-01
1751
+ name: Contact / Authority Maintenance
1752
+ specification: Points of contact for applicable regulation authorities, national
1753
+ and local law enforcement, and other legal jurisdictional authorities shall
1754
+ be maintained and regularly updated (e.g., change in impacted-scope and/or
1755
+ a change in any compliance obligation) to ensure direct compliance liaisons
1756
+ have been established and to be prepared for a forensic investigation requiring
1757
+ rapid engagement with law enforcement.
1758
+ questions:
1759
+ - id: SEF-01.1
1760
+ content: Do you maintain liaisons and points of contact with local authorities
1761
+ in accordance with contracts and appropriate regulations?
1762
+ - id: SEF-02
1763
+ name: Incident Management
1764
+ specification: Policies and procedures shall be established, and supporting
1765
+ business processes and technical measures implemented, to triage security-related
1766
+ events and ensure timely and thorough incident management, as per established
1767
+ IT service management policies and procedures.
1768
+ questions:
1769
+ - id: SEF-02.1
1770
+ content: Do you have a documented security incident response plan?
1771
+ - id: SEF-02.2
1772
+ content: Do you integrate customized tenant requirements into your security
1773
+ incident response plans?
1774
+ - id: SEF-02.3
1775
+ content: Do you publish a roles and responsibilities document specifying what
1776
+ you vs. your tenants are responsible for during security incidents?
1777
+ - id: SEF-02.4
1778
+ content: Have you tested your security incident response plans in the last
1779
+ year?
1780
+ - id: SEF-03
1781
+ name: Incident Reporting
1782
+ specification: Workforce personnel and external business relationships shall
1783
+ be informed of their responsibility and, if required, shall consent and/or
1784
+ contractually agree to report all information security events in a timely
1785
+ manner. Information security events shall be reported through predefined communications
1786
+ channels in a timely manner adhering to applicable legal, statutory, or regulatory
1787
+ compliance obligations.
1788
+ questions:
1789
+ - id: SEF-03.1
1790
+ content: Does your security information and event management (SIEM) system
1791
+ merge data sources (e.g., app logs, firewall logs, IDS logs, physical access
1792
+ logs, etc.) for granular analysis and alerting?
1793
+ - id: SEF-03.2
1794
+ content: Does your logging and monitoring framework allow isolation of an
1795
+ incident to specific tenants?
1796
+ - id: SEF-04
1797
+ name: Incident Response Legal Preparation
1798
+ specification: Proper forensic procedures, including chain of custody, are required
1799
+ for the presentation of evidence to support potential legal action subject
1800
+ to the relevant jurisdiction after an information security incident. Upon
1801
+ notification, customers and/or other external business partners impacted by
1802
+ a security breach shall be given the opportunity to participate as is legally
1803
+ permissible in the forensic investigation.
1804
+ questions:
1805
+ - id: SEF-04.1
1806
+ content: Does your incident response plan comply with industry standards for
1807
+ legally admissible chain-of-custody management processes and controls?
1808
+ - id: SEF-04.2
1809
+ content: Does your incident response capability include the use of legally
1810
+ admissible forensic data collection and analysis techniques?
1811
+ - id: SEF-04.3
1812
+ content: Are you capable of supporting litigation holds (freeze of data from
1813
+ a specific point in time) for a specific tenant without freezing other tenant
1814
+ data?
1815
+ - id: SEF-04.4
1816
+ content: Do you enforce and attest to tenant data separation when producing
1817
+ data in response to legal subpoenas?
1818
+ - id: SEF-05
1819
+ name: Incident Response Metrics
1820
+ specification: Mechanisms shall be put in place to monitor and quantify the
1821
+ types, volumes, and costs of information security incidents.
1822
+ questions:
1823
+ - id: SEF-05.1
1824
+ content: Do you monitor and quantify the types, volumes, and impacts on all
1825
+ information security incidents?
1826
+ - id: SEF-05.2
1827
+ content: Will you share statistical information for security incident data
1828
+ with your tenants upon request?
1829
+ - id: STA
1830
+ name: Supply Chain Management, Transparency, and Accountability
1831
+ controls:
1832
+ - id: STA-01
1833
+ name: Data Quality and Integrity
1834
+ specification: Providers shall inspect, account for, and work with their cloud
1835
+ supply-chain partners to correct data quality errors and associated risks.
1836
+ Providers shall design and implement controls to mitigate and contain data
1837
+ security risks through proper separation of duties, role-based access, and
1838
+ least-privilege access for all personnel within their supply chain.
1839
+ questions:
1840
+ - id: STA-01.1
1841
+ content: Do you inspect and account for data quality errors and associated
1842
+ risks, and work with your cloud supply-chain partners to correct them?
1843
+ - id: STA-01.2
1844
+ content: Do you design and implement controls to mitigate and contain data
1845
+ security risks through proper separation of duties, role-based access, and
1846
+ least-privileged access for all personnel within your supply chain?
1847
+ - id: STA-02
1848
+ name: Incident Reporting
1849
+ specification: The provider shall make security incident information available
1850
+ to all affected customers and providers periodically through electronic methods
1851
+ (e.g., portals).
1852
+ questions:
1853
+ - id: STA-02.1
1854
+ content: Do you make security incident information available to all affected
1855
+ customers and providers periodically through electronic methods (e.g., portals)?
1856
+ - id: STA-03
1857
+ name: Network / Infrastructure Services
1858
+ specification: Business-critical or customer (tenant) impacting (physical and
1859
+ virtual) application and system-system interface (API) designs and configurations,
1860
+ and infrastructure network and systems components, shall be designed, developed,
1861
+ and deployed in accordance with mutually agreed-upon service and capacity-level
1862
+ expectations, as well as IT governance and service management policies and
1863
+ procedures.
1864
+ questions:
1865
+ - id: STA-03.1
1866
+ content: Do you collect capacity and use data for all relevant components
1867
+ of your cloud service offering?
1868
+ - id: STA-03.2
1869
+ content: Do you provide tenants with capacity planning and use reports?
1870
+ - id: STA-04
1871
+ name: Provider Internal Assessments
1872
+ specification: The provider shall perform annual internal assessments of conformance
1873
+ and effectiveness of its policies, procedures, and supporting measures and
1874
+ metrics.
1875
+ questions:
1876
+ - id: STA-04.1
1877
+ content: Do you perform annual internal assessments of conformance and effectiveness
1878
+ of your policies, procedures, and supporting measures and metrics?
1879
+ - id: STA-05
1880
+ name: Third Party Agreements
1881
+ specification: |-
1882
+ Supply chain agreements (e.g., SLAs) between providers and customers (tenants) shall incorporate at least the following mutually-agreed upon provisions and/or terms:
1883
+ • Scope of business relationship and services offered (e.g., customer (tenant) data acquisition, exchange and usage, feature sets and functionality, personnel and infrastructure network and systems components for service delivery and support, roles and responsibilities of provider and customer (tenant) and any subcontracted or outsourced business relationships, physical geographical location of hosted services, and any known regulatory compliance considerations)
1884
+ • Information security requirements, provider and customer (tenant) primary points of contact for the duration of the business relationship, and references to detailed supporting and relevant business processes and technical measures implemented to enable effectively governance, risk management, assurance and legal, statutory and regulatory compliance obligations by all impacted business relationships
1885
+ • Notification and/or pre-authorization of any changes controlled by the provider with customer (tenant) impacts
1886
+ • Timely notification of a security incident (or confirmed breach) to all customers (tenants) and other business relationships impacted (i.e., up- and down-stream impacted supply chain)
1887
+ • Assessment and independent verification of compliance with agreement provisions and/or terms (e.g., industry-acceptable certification, attestation audit report, or equivalent forms of assurance) without posing an unacceptable business risk of exposure to the organization being assessed
1888
+ • Expiration of the business relationship and treatment of customer (tenant) data impacted
1889
+ • Customer (tenant) service-to-service application (API) and data interoperability and portability requirements for application development and information exchange, usage, and integrity persistence
1890
+ questions:
1891
+ - id: STA-05.1
1892
+ content: Do you select and monitor outsourced providers in compliance with
1893
+ laws in the country where the data is processed, stored, and transmitted?
1894
+ - id: STA-05.2
1895
+ content: Do you select and monitor outsourced providers in compliance with
1896
+ laws in the country where the data originates?
1897
+ - id: STA-05.3
1898
+ content: Does legal counsel review all third-party agreements?
1899
+ - id: STA-05.4
1900
+ content: Do third-party agreements include provision for the security and
1901
+ protection of information and assets?
1902
+ - id: STA-05.5
1903
+ content: Do you provide the client with a list and copies of all subprocessing
1904
+ agreements and keep this updated?
1905
+ - id: STA-06
1906
+ name: Supply Chain Governance Reviews
1907
+ specification: Providers shall review the risk management and governance processes
1908
+ of their partners so that practices are consistent and aligned to account
1909
+ for risks inherited from other members of that partner's cloud supply chain.
1910
+ questions:
1911
+ - id: STA-06.1
1912
+ content: Do you review the risk management and governanced processes of partners
1913
+ to account for risks inherited from other members of that partner's supply
1914
+ chain?
1915
+ - id: STA-07
1916
+ name: Supply Chain Metrics
1917
+ specification: Policies and procedures shall be implemented to ensure the consistent
1918
+ review of service agreements (e.g., SLAs) between providers and customers
1919
+ (tenants) across the relevant supply chain (upstream/downstream). Reviews
1920
+ shall be performed at least annually and identify non-conformance to established
1921
+ agreements. The reviews should result in actions to address service-level
1922
+ conflicts or inconsistencies resulting from disparate supplier relationships.
1923
+ questions:
1924
+ - id: STA-07.1
1925
+ content: Are policies and procedures established, and supporting business
1926
+ processes and technical measures implemented, for maintaining complete,
1927
+ accurate, and relevant agreements (e.g., SLAs) between providers and customers
1928
+ (tenants)?
1929
+ - id: STA-07.2
1930
+ content: Do you have the ability to measure and address non-conformance of
1931
+ provisions and/or terms across the entire supply chain (upstream/downstream)?
1932
+ - id: STA-07.3
1933
+ content: Can you manage service-level conflicts or inconsistencies resulting
1934
+ from disparate supplier relationships?
1935
+ - id: STA-07.4
1936
+ content: Do you review all agreements, policies, and processes at least annually?
1937
+ - id: STA-08
1938
+ name: Third Party Assessment
1939
+ specification: Providers shall assure reasonable information security across
1940
+ their information supply chain by performing an annual review. The review
1941
+ shall include all partners/third party providers upon which their information
1942
+ supply chain depends on.
1943
+ questions:
1944
+ - id: STA-08.1
1945
+ content: Do you assure reasonable information security across your information
1946
+ supply chain by performing an annual review?
1947
+ - id: STA-08.2
1948
+ content: Does your annual review include all partners/third-party providers
1949
+ upon which your information supply chain depends?
1950
+ - id: STA-09
1951
+ name: Third Party Audits
1952
+ specification: Third-party service providers shall demonstrate compliance with
1953
+ information security and confidentiality, access control, service definitions,
1954
+ and delivery level agreements included in third-party contracts. Third-party
1955
+ reports, records, and services shall undergo audit and review at least annually
1956
+ to govern and maintain compliance with the service delivery agreements.
1957
+ questions:
1958
+ - id: STA-09.1
1959
+ content: Do you permit tenants to perform independent vulnerability assessments?
1960
+ - id: STA-09.2
1961
+ content: Do you have external third party services conduct vulnerability scans
1962
+ and periodic penetration tests on your applications and networks?
1963
+ - id: TVM
1964
+ name: Threat and Vulnerability Management
1965
+ controls:
1966
+ - id: TVM-01
1967
+ name: Antivirus / Malicious Software
1968
+ specification: Policies and procedures shall be established, and supporting
1969
+ business processes and technical measures implemented, to prevent the execution
1970
+ of malware on organizationally-owned or managed user end-point devices (i.e.,
1971
+ issued workstations, laptops, and mobile devices) and IT infrastructure network
1972
+ and systems components.
1973
+ questions:
1974
+ - id: TVM-01.1
1975
+ content: Do you have anti-malware programs that support or connect to your
1976
+ cloud service offerings installed on all of your systems?
1977
+ - id: TVM-01.2
1978
+ content: Do you ensure that security threat detection systems using signatures,
1979
+ lists, or behavioral patterns are updated across all infrastructure components
1980
+ within industry accepted time frames?
1981
+ - id: TVM-02
1982
+ name: Vulnerability / Patch Management
1983
+ specification: Policies and procedures shall be established, and supporting
1984
+ processes and technical measures implemented, for timely detection of vulnerabilities
1985
+ within organizationally-owned or managed applications, infrastructure network
1986
+ and system components (e.g., network vulnerability assessment, penetration
1987
+ testing) to ensure the efficiency of implemented security controls. A risk-based
1988
+ model for prioritizing remediation of identified vulnerabilities shall be
1989
+ used. Changes shall be managed through a change management process for all
1990
+ vendor-supplied patches, configuration changes, or changes to the organization's
1991
+ internally developed software. Upon request, the provider informs customer
1992
+ (tenant) of policies and procedures and identified weaknesses especially if
1993
+ customer (tenant) data is used as part the service and/or customer (tenant)
1994
+ has some shared responsibility over implementation of control.
1995
+ questions:
1996
+ - id: TVM-02.1
1997
+ content: Do you conduct network-layer vulnerability scans regularly as prescribed
1998
+ by industry best practices?
1999
+ - id: TVM-02.2
2000
+ content: Do you conduct application-layer vulnerability scans regularly as
2001
+ prescribed by industry best practices?
2002
+ - id: TVM-02.3
2003
+ content: Do you conduct local operating system-layer vulnerability scans regularly
2004
+ as prescribed by industry best practices?
2005
+ - id: TVM-02.4
2006
+ content: Will you make the results of vulnerability scans available to tenants
2007
+ at their request?
2008
+ - id: TVM-02.5
2009
+ content: Do you have a capability to rapidly patch vulnerabilities across
2010
+ all of your computing devices, applications, and systems?
2011
+ - id: TVM-02.6
2012
+ content: Will you provide your risk-based systems patching time frames to
2013
+ your tenants upon request?
2014
+ - id: TVM-03
2015
+ name: Mobile Code
2016
+ specification: Policies and procedures shall be established, and supporting
2017
+ business processes and technical measures implemented, to prevent the execution
2018
+ of unauthorized mobile code, defined as software transferred between systems
2019
+ over a trusted or untrusted network and executed on a local system without
2020
+ explicit installation or execution by the recipient, on organizationally-owned
2021
+ or managed user end-point devices (e.g., issued workstations, laptops, and
2022
+ mobile devices) and IT infrastructure network and systems components.
2023
+ questions:
2024
+ - id: TVM-03.1
2025
+ content: Is mobile code authorized before its installation and use, and the
2026
+ code configuration checked, to ensure that the authorized mobile code operates
2027
+ according to a clearly defined security policy?
2028
+ - id: TVM-03.2
2029
+ content: Is all unauthorized mobile code prevented from executing?