CCM v4.0 Implementation Guidelines 090921
CCM v4.0 Implementation Guidelines 090921
CCM v4.0 Implementation Guidelines 090921
0 Implementation
Guidelines
F G
E H
C
D
v4 I
J
B K
DC
A S L
A
A&
01
R
BC DS
P
02
AIS GR
C
03
K
CE
04 IAM
IPY HR
CC
C SEF S
05
M
TV
06
LO M
G IVS UE
STA
Acknowledgments
Lead Authors: CCM Leadership:
John Britton Daniele Catteddu (CSA)
Bobbie-Lynn Burton Sean Cordero
Daniele Catteddu Sean Estrada
Aradhna Chetal Shawn Harris
Peter Dickman Harry Lu
Angell Duran Lefteris Skoutaris (CSA)
Rajeev Gupta
Shawn Harris
Roberto Hernandez
CSA GLobal Staff:
Matthew Hoerig
Claire Lehnert (Design)
Erik Johnson
Stephen Lumpe (Cover)
Harry Lu
Claus Matzke
Vani Murthy
Johan Olivier
Bala Kaundinya
Nancy Kramer
Surinder Singh Rait
Michael Roza
Agnidipta Sarkar
Lefteris Skoutaris
Ashish Vashishtha
Contributors:
Sandra Ackland
Geoff Bird
Madhav Chablani
Ramon Codina
Mamane Ibrahim
Joel John
Giovanni Massard
Jean-Sebastien Mine
Chirag Sheth
The CCM v4.0 and its implementation guidelines stem from collective work built on group experience
and feedback. As a result, it provides the community with one of its best vendor-neutral cloud
security and privacy control frameworks.
Co-chairs supervise the WG activities. These individuals are highly experienced professionals
representing three roles in the cloud industry: cloud service providers (CSPs), cloud service
consumers (CSCs), and cloud auditors.
All contributions are personal and shall not constitute a commitment or opinion by the contributor or
the contributor’s organization.
The permanent and official location for Software Defined Perimeter Working Group is
https://cloudsecurityalliance.org/research/working-groups/software-defined-perimeter/
© 2021-2022 Cloud Security Alliance. All rights reserved. You may download, store, display on
your computer, view, print, and link to the Cloud Security Alliance at https://cloudsecurityalliance.
org, subject to the following: (a) the implementation guidelines may be used solely for your
personal, informational, non-commercial use; (b) the implementation guidelines may not be
modified or altered in any way; (c) the implementation guidelines may not be redistributed; and
(d) the trademark, copyright or other notices may not be removed. You may quote portions of the
implementation guidelines as permitted by the Fair Use provisions of the United States Copyright
Act, provided that you attribute the portions to Cloud Security Alliance.
The Cloud Security Alliance’s Cloud Controls Matrix Version 4 (CCM v4.0), published in 2021, includes
core security and privacy controls and additional components. These include CCM Implementation
Guidelines (included in this document), the Consensus Assessment Initiative Questionnaire
(CAIQ), and the CCM Controls Auditing Guidelines2. The CCM v4.0 also includes useful supporting
information for CCM controls. This information includes typical SSRM control ownership assignments
and control scope and applicability information, such as: architectural relevance and mappings to
other industry-accepted security frameworks (e.g., ISO/IEC, AICPA, NIST, FedRAMP). These works
are regularly reviewed and enhanced by the CSA team.
The CCM Implementation Guidelines constitute a new addition to CCM v4.0. These guidelines strive
to support the application of CCM controls and provide further guidance and recommendations
related to CCM control specifications. This document also provides structured guidance for
navigating the CCM (spreadsheet format) framework and interpreting and implementing CCM control
specifications to use the CCM effectively.
However, this document is not meant to be a “how-to” manual for the CCM controls implementation.
Given the nature of CCM controls, their operationalization will largely depend on the IT/service
architecture, the type of technology used, risks faced, applicable regulations, organizational policies,
and other significant factors. Therefore, the CSA cannot provide detailed, prescriptive guidance
pertinent to every organization and cloud service implementation.
The CCM Implementation Guidelines are a collaborative product of the volunteer CCM Working Group
based on shared CSP and CSC experiences in implementing and securing cloud services and using
CCM controls. Workgroup insight covers myriad topics and queries, including how can organizations:
1
https://cloudsecurityalliance.org/research/guidance/, accessed on 8/12/2021.
2
currently in peer review and to be released in November 2021.
For CSPs, the CCM means to establish best practices to support the secure implementation of
cloud infrastructure and services. For cloud customers, the CCM enables them to better evaluate
and assess CSPs.
The CCM includes detailed security concepts and principles aligned with CSA Security Guidance v4,
which guides “how” security principles should be implemented in a cloud architecture. Conversely,
the CCM recommends “what” should be done. The CSA encourages organizations to use the CCM as
a companion to the CSA Security Guidance because it allows users to identify security controls and
understand how they should be applied.
Regardless of organizational types (CSPs vs. CSCs), the nature of an enterprise, organizational
sizes (i.e., large corporation vs. small company), or cloud delivery models, IaaS vs. PaaS vs. SaaS,
the CCM can be used to define, implement and enforce security requirements and monitor their
implementation. The CCM assists companies in translating their internal organizational, operational,
and legal stipulations into a standardized set of cloud-relevant policies, procedures, and technical
control objectives.
The CCM is also a tool for internal and external assessments or audits. It is designed to be used
in alignment with the CAIQ, which provides a set of “yes” or “no” questions that can be answered
to determine if the CCM controls are being met. Both documents help auditors understand if an
organization follows its internal governance policies and fulfills its legal and regulatory obligations.
For example, based on an internal risk assessment, an organization might identify the need to
protect the confidentiality, integrity, and availability of information related to a manufacturing
process. The datasets have varying levels of sensitivity and criticality, as they are stored in a cloud
database and processed by several cloud-based applications. The organization can use the CCM to
identify specific policy, procedural and technical requirements and define control objectives that
will be included in the organizational security program. It uses those control objectives to enforce
mandates related to internal users, business partners, and CSPs and monitor adherence to internal
policies and external compliance requirements.
The CCM v4.0 is structured into 17 security domains and 197 controls. The 17 domains were based
on CSA’s security guidance document and inspired by major frameworks, such as ISO/IEC 27001 and
ISO/IEC 27002. Each CCM domain defines what category a control falls under. CCM was deliberately
designed like existing non-cloud leading information security frameworks to leverage familiarity with
those existing frameworks.
The CCM v4.0 includes 17 cloud security domains. These domains are listed below, along with a
description of each one’s unique purpose and use.
The Audit and Assurance (A&A) domain consists of six (6) control specifications. This domain is
designed to support the CSP and CSC in defining and implementing an audit management process
to support audit planning, risk analysis, security control assessment, conclusion, remediation, report
generation, and reviews of past reports and supporting evidence.
Having a clear understanding of the level of assurance expected by customers along with industry
compliance standards and self-imposed business requirements is of paramount importance for
CSPs. Failing to execute an auditing plan can have substantial negative impacts regarding loss
of control and governance, compliance shortcomings, and ultimately financial, operational, and
reputational damages.
The Audit and Assurance domain utilizes six controls that support CSPs. The domain:
The Application and Interface Security (AIS) domain involves seven (7) control specifications to help
cloud organizations migrate towards secure design, development, deployment, and operations of
applications and their interfaces in the cloud. The AIS controls assist organizations in identifying
risks to cloud landscapes and mitigates these risks in the application’s design and development
phase. It is also vital that organizations test cyber resilience to threats with remediation of
vulnerabilities by complementary automation and manual code review in the deployment and
operations phase. The controls also help organizations align their AIS security goals with business
objectives and regulatory compliance.
The Business Continuity and Operational Resilience (BCR) domain helps CSPs and CSCs ensure
that cloud services they provide or use are dependable. The domain guides resiliency strategies—
including the development of mitigation planning and implementation efforts—to enable
organizations to continue business when faced with foreseen and unforeseen disruptions. The
domain consists of eleven (11) control specifications. The first three specifications aid businesses in
defining business continuity and operational resilience policies, assess the impact of unavailability
and associated risks and determine strategies to reduce disruption impacts. The next four
specifications support actions to create business continuity plans and related documentation,
exercise the documented continuity plans, and establish a formal communications capability. The
final four specifications help establish backup capabilities, an official disaster response plan, exercise
the disaster recovery (DR), and install relevant equipment redundancy. The BCR domain should help
establish assurances about the ability to respond to, withstand, and recover from disruptions.
The Change Control and Configuration Management domain incorporates nine (9) controls. These
controls are designed to mitigate risks associated with configuration changes to information
technology (IT) assets by adherence to a robust change management process—regardless of
whether IT assets are managed internally or externally.
This domain ensures IT asset configurations are only modified to an approved baseline after the
change management authority authorizes planned changes.
The Cryptography, Encryption and Key Management (CEK) domain consists of twenty-one
(21) control specifications designed to ensure that data and keys are employed to protect and
properly secure data. The CEK controls span the Governance, Risk management, and Compliance
(GRC) spectrum. They are applicable for governing policies and procedures, risk management,
the processing of key lifecycle activities, and cryptographic key management systems (CKMS).
Additionally, CEK controls’ implementation is a shared responsibility. Generally, the provider is
responsible for the security “of” the cloud, while the customer is responsible for the security “in”
the cloud. The detailed implementation and allocation of these responsibilities are dependent on
the model (i.e., on-premises, in the cloud, hybrid, etc.), services used (IaaS, PaaS, SaaS), and the
applicability of any laws and regulations.
Datacenter Security
This domain consists of fifteen (15) control specifications that aid organizations providing data center
hosting services, referred to as “Cloud Service Providers”. These CSPs are expected to implement
these specifications to protect cloud service customers› data hosted in the data center. The controls
cover a wide range of topics on data center security, with one control per control title. All controls in
this domain are expected to be implemented, and each control is of equal importance. This is true in
the rest of the domains as well.
The Data Security and Privacy Lifecycle Management domain is a new domain introduced in CCM
v4.0. It features nineteen (19) controls on privacy and data security. These controls are not industry
or sector-specific and not focused on a particular country or regulation. However, these controls
have been developed by considering the common elements and requirements of major privacy
regulations. They are generally applicable to organizations worldwide and are expected to serve as
a valuable baseline—with the caveat that some organizations operating in some locations or sectors
may have to implement supplemental data protection controls. Lastly, as with other domains, these
controls have been developed after several rounds of analysis by an international team of subject
matter experts (SMEs).
The Governance, Risk Management, and Compliance (GRC) domain uses eight (8) control
specifications to support, define, and direct organizational security and compliance efforts
(specifically corporate and IT governance). Governance controls help manage confidentiality, integrity,
and availability (CIA) by providing guidance, tools, and solutions for ensuring a secure environment.
The GRC domain’s objective is to provide direction for all levels of security commonly managed by a
governance committee or board of directors. This domain is structured to develop, implement, and
document security policies (regulatory, advisory, and informative), governance and enterprise risk
programs, standards, baselines, guidelines, and procedures to meet compliance while reducing risks
and vulnerabilities with the implementation of security controls.
The Human Resources (HRS) domain is pivotal to the success of an organization’s compliance
structure. Human Resources is the conduit between IT security and personnel and encompasses
personnel interaction with systems, technology, assets, and data. The domain utilizes thirteen (13)
controls to support the organization in ensuring personnel comply with security policies designed
to protect the organization, clients, and workforce. Key elements of the Human Resources domain
include, but are not limited to, personnel background screening, employment agreement content,
employee onboarding, communicating roles and responsibilities, security awareness training, code of
conduct and the acceptable use of technology, remote work procedures, compliance responsibilities,
role-change procedures, employee offboarding, and the return of organizational assets.
The Human Resources domain also includes controls necessary for ensuring that information
security policies are correctly presented, documented, communicated, and enforced.
The Identity and Access Management (IAM) domain features sixteen (16) control specifications and
addresses the mission-critical need to ensure appropriate access to resources across increasingly
heterogeneous technology cloud environments. The principles of least privileges and role-based
access control are enabled by fulfilling IAM requirements. In addition, the IAM domain covers technical
and organizational requirements to ensure that appropriate individual network entities—such as users
and devices—have access to the relevant resources at the right times for the right reasons.
In the cloud context, users are employees and business partners of CSPs and CSCs. Domain
requirements cover processes and technical best practices to securely manage and implement
privileged and non-privileged access rights to cloud assets.
The CCM’s Interoperability and Portability (IPY) domain has four (4) control specifications to address
interoperability and portability in the cloud environment. Interoperability is the requirement that a
processing system’s components work together to achieve their intended result. Furthermore, it
should be possible for the system to continue to work if elements are replaced with new or different
parts from other providers. Portability allows application and data components to continue to
work the same way when moved from one cloud environment to another without being changed.
Portability is achieved by removing dependencies on the underlying environment. A portable feature
can be moved easily and reused regardless of the provider, platform, operating system, location,
storage, or other elements of the surrounding environment.
Lack of interoperability and portability can expose both cloud customers and CSPs to various risks,
such as:
Organizations should have measures to mitigate risks related to the lack of interoperability and
portability, which justifies control specifications. Examples of such actions include:
The Infrastructure and Virtualization Security (IVS) domain guides CSPs and CSCs in implementing
controls to secure infrastructure and virtualization technologies.
Infrastructure encompasses all hardware, software, networks, facilities, etc., required to deliver
IT services. Virtualization technologies use software to create an abstraction layer over computer
hardware that allows the hardware elements (such as processors, memory, storage, etc.) to be
divided into virtual computers.
In on-premises operations, virtualization technologies are used for virtual desktops. Virtualization is
also one of the vital elements of IaaS cloud offerings and private clouds.
The nine (9) controls in the IVS domain promote the implementation and maintenance of policies and
procedures to effectively plan, secure, and improve infrastructure resilience and utilize virtualization
technologies. These include:
• Planning: Accurate resource planning ensures availability, quality, and adequate resource
capacity to deliver the required system performance (as determined by the business).
• Security: Network security measures, such as host operating systems hardening,
monitoring, segmenting environments, and encrypting and restricting communications
between environments to only authenticated and authorized connections.
• Resilience: Implementing best practices for migration to cloud environments, identifying
high-risk environments and maintaining network architecture documentation, and defining
and implementing defense-in-depth techniques for protection, detection, and timely
responses to network-based attacks.
Logging and Monitoring is a critical process of security operations. The thirteen (13) controls in this
domain emphasize governance and process to empower organizations with cloud-based business
with the means to realize efficient logging and monitoring.
Logs from operating systems, services, and applications play a crucial part in incident management
and response, digital forensics, and the formation of a holistic view of business processes and
assets. Organizations with standardized processes can leverage information being collected and
correlated by logging and monitoring tools. These controls can help organizations govern the
technical implementation of logging and monitoring tools.
Logging is necessary for non-repudiation, and monitoring and alerting help form timely responses to
security incidents.
The Security Incident Management, E-Discovery, and Cloud Forensics (SEF) domain has eight (8)
control specifications designed to ensure that established policies and tested procedures are
enacted to appropriately respond to security incidents to mitigate business risks (including any
requirements for security breach notifications).
The Supply Chain Management Transparency and Accountability (STA) domain delineates a broad set
of supply chain risk management controls, including requirements for:
• Defining and managing the SSRM between the CSP and the CSC.
• Third-party providers employ appropriate security measures to protect the confidentiality,
integrity, and availability of information, applications, and services across the full
technology stack.
• Policies and procedures for monitoring and managing security and compliance across the
supply chain.
The Threat and Vulnerability Management (TVM) domain consists of ten (10) control specifications
that address a wide range of concerns that could develop into ongoing issues to the security
architecture and engineering of an organization’s infrastructure. The domain focuses on assessing
and mitigating vulnerabilities that may evolve and impact assets, security architectures, designs, and
solution components. A management and risk mitigation strategy includes parameters to:
A vulnerability management plan should address internal and external event data clearly defined and
documented, even with accepted risks. An organization’s risk posture should include the following
guidance measures in its threat and vulnerability risk management strategy:
• Establish, implement, enforce and maintain policies, procedures, and technical measures to
prevent the execution of malware on enterprise-owned or managed assets.
• Implement technical measures and supporting processes for vulnerability detection and use
a risk-based model to prioritize the remediation of identified vulnerabilities.
• Implement a strategy for tracking and reporting vulnerability identification and remediation
activities.
• Provide stakeholders with a summary of identified weaknesses if the system owner shares
responsibility for the remediation and inform stakeholders of the policies and procedures for
threat and vulnerability management.
• Update detection tools, threat signatures, and indicators of compromise.
• Perform periodic penetration testing.
• Establish metrics for vulnerability identification and remediation at defined intervals.
Additional domain elements may include vulnerability responses dependent upon other domains—
including BCR, CEK, SEF, IVS, and SEF. This holistic vulnerability management appraisal assures that
organizations identify and understand weaknesses and can plan accordingly.
The Universal Endpoint Management (UEM) domain focuses on implementing controls to mitigate
the risks associated with using a computer while outside the corporate office, including mobile
devices and endpoint devices in general.
The risk with mobile computing and endpoint security mainly relates to user behavior and the
awareness (or lack of awareness) of a company’s approach to acceptable use of devices and
technologies (e.g., managed vs. unmanaged, enterprise-owned vs. personal).
The UEM domain supports organizations in effectively implementing fourteen (14) control
specifications such as maintaining an inventory of all endpoints, approving services and applications
acceptable for use by endpoints, implementing security measures like automatic lock screens,
firewalls, and anti-malware detection, and utilizing prevention technologies, storage encryption, and
data loss prevention technologies.
The domain also supports aligning endpoint-specific policies and procedures with overall
organizational security standards. These include:
Internet of Things (IoT) technologies are not included in the scope of this domain.
1.1.4 Components
Along with the core 197 security and privacy controls, the CCM v4.0 includes additional tools, such as:
The CCM control specifications are mapped to the controls applicability matrix, which is comprised
of three main groups:
The typical control applicability and ownership matrix describes standard SSRM control ownership
and applicability for all controls for the three main cloud service models: IaaS, PaaS, and SaaS.
Common SSRM ownership designations allocate responsibilities typical for implementing a given
CCM control between a CSP and a CSC, as required by control STA-04. Some controls are clearly the
province of IaaS providers (e.g., data center security controls), whereas other controls are applicable
across all service models (e.g., identity and access management). This CCM matrix describes the
applicability of each control to the three cloud service models, helping users understand what is
relevant in specific cases.
The architectural relevance group indicates the architectural relevance of each CCM control per
cloud stack component from the perspective of the CSA Cloud Reference Model. The section focuses
on numerous elements, including physical, network, compute, storage, application, and data. In
addition, because the CCM is mapped to existing security controls specifications from various legal
and regulatory frameworks—and that same matrix is mapped to the security capabilities of the
architecture—enterprises can easily assess which capabilities comply with applicable regulations and
best-practice frameworks.
An important CCM aspect is that it maps to other security standards, regulations, and frameworks.
When the CCM was created, there were already many different information security standards, best
practices, and regulations in existence (e.g., ISO/IEC 27001 and 27002, PCI DSS, NERC CIP, BITS ,
BSI). Many companies already had their internal structures and frameworks set up and aligned with
those standards.
The CSA wanted to provide cloud sector-specific controls while ensuring that organizations had clear
paths to connect their existing control frameworks and programs with the cloud-relevant controls
included in the CCM. Therefore, the CSA built all the controls created in the CCM as an extension of
existing framework controls. The CSA constructed a mapping, or a linkage, between a framework
control (e.g., ISO 27001) and the CCM to realize this ambition. The CCM then builds on the framework
to provide a control specific to the cloud sector—and then takes it one step further by ensuring
controls link to a particular area within a cloud architecture. Then, the CCM helps identify if a specific
control is relevant for IaaS, PaaS, or SaaS. Because the CCM makes links through mapping, it provides
an initial internal controls system that identifies which controls organizations should enact to further
a cloud journey and implementation processes.
The CAIQ provides cloud customers and auditors with questions for CSPs about security posture,
adherence to CSA best practices (CCM and the CSA Security Guidance) and customer SSRM
responsibilities. The CAIQ is a companion document designed to support better adoption of the
CCM. While the CCM defines the control specification and implementation guidelines, the CAIQ
defines questions to evaluate and inform implementation. In addition, the CAIQ (and the CSA STAR
Registry) should be used by CSPs to provide SSRM ownership and customer security responsibility
guidance to current and prospective CSCs per CCM controls STA-01 through STA-06.
The relationship between a CCM control and CAIQ questions is often one to many. This is by design
because the CCM is based on 197 controls, whereas the latest version of the CAIQ (version 4) has
261 questions. Depending on the nature and the complexity of the CCM control, there may be one or
several questions posed to verify the implementation of a certain control.
The CAIQ, similar to the CCM, comes in a spreadsheet format with a structure similar to the CCM. The
CAIQ includes columns for CSPs to respond to CAIQ questions (“Yes,” “No,” or “NA”) while specifying
SSRM ownership of CCM controls the CAIQ question pertains to. The CAIQ also includes columns for
CSPs to describe how they meet their portions of the controls and any associated customer security
responsibilities. Cloud service providers should delineate SSRM ownership, explain how they meet
control requirements, and clarify customer security responsibilities at the question level.
Implementation Guidelines
The CCM Implementation Guidelines constitute a new addition to CCM v4.0. The guidelines’
main goal is to support the implementation of CCM controls and provide further guidance and
recommendations on CCM control specifications. The guidelines included in this document provide
structured guidance on interpreting and implementing the CCM control specifications.
Sections 1.2 and 2 in this document introduce the CCM Implementation Guidelines and their
contents. The CCM Implementation Guidelines are a collaborative product based on CSP and CSC
experiences implementing and securing cloud services while using CCM controls under the SSRM.
However, the guidelines are not meant to be a “how-to” manual for CCM control implementation.
Given the comprehensive nature of the CCM controls, their operationalization largely depends on the
nature of the cloud service and its architecture, the types of technology used, applicable risks and
regulations, organizational policies, the threat environment, and other significant factors. Therefore,
CSA cannot provide detailed, prescriptive guidance applicable to every organization and cloud service
controls’ implementation.
Auditing Guidelines
The CCM v4.0 Auditing Guidelines (AGs) are tailored to the control specifications of each of the 17
cloud security domains of the Cloud Control Matrix version 4 (CCM v4.0). The guidelines represent a
new component of CCM v4.0 that did not exist previously in CCM v3.0.1.
The AGs aim to facilitate and guide a CCM audit. Auditors are provided with a set of assessment
guidelines per CCM v4.0 control specifications. These guidelines seek to improve the controls’
auditability and help organizations more efficiently achieve compliance (with either internal or
external third-party cloud security audits).
The auditing guidelines are not exhaustive or prescriptive by nature. Rather, they represent a generic
guide through recommendations for assessment. Auditors must customize the descriptions,
procedures, risks, controls, and documentation. These elements must conform to organizational-
specific audit work programs and service(s) in the scope of the assessment to address the specific
audit objectives.
The CSA auditing guidelines are slated for official release in December 2021.
A metric is a standard for measurement that defines the rules for performing the measurement and
understanding the results of a measurement (ISO/IEC 19086-1). In the context of cloud computing,
there is a growing interest in defining metrics that can be used to evaluate the security of an
information system, potentially in real-time.
The CCM metrics catalog is the product of the work conducted by industry experts in the CSA
Continuous Audit Metrics Working Group. The catalog does not aim to be exhaustive or complete;
and the initial release aims to offer support for those organizations seeking for a more systematic
evaluation of the efficiency and effectiveness of the CCM controls implementation.
The proposed metrics aim to support internal CSP governance, risk, and compliance (GRC)
activities and provide a helpful baseline for service-level agreement transparency. Additionally,
these metrics might be integrated within the STAR Program in the future, providing a foundation for
continuous certification.
The CCM Implementation Guidelines presented in this document suggest the use of metrics to
ascertain the correct implementation of several controls. Moreover, CSA is leading an effort to
define a catalog of cloud security metrics3 that are mapped to the Cloud Control Matrix version 4
(CCM v4.0).
3
https://docs.google.com/document/d/14J0qV3N5LY2IeuZ2aZLdSst-mMbegdb-fUMLmC4Kclk/edit,
accessed on 24/8/21.
• Introduction.
• CCM Controls.
• Implementation Guidelines.
• CCM Scope Applicability (Mappings).
• Consensus Assessments Initiative Questionnaire (CAIQ).
• Acknowledgments.
a. CCM Controls
This is the core of the CCM V4. It includes 197 controls structured in 17 domains.
• Control Domain: the name of the domain each control pertains to.
• Control Title: The control’s title.
• Control ID: The control’s identifier.
• Control Specification: The control’s requirement(s) description.
• The Typical Control Applicability and Ownership matrix. These columns describe the
standard SSRM control ownership and applicability for all controls for the three main cloud
delivery models: IaaS, PaaS, and SaaS. Common SSRM ownership designations allocate
responsibilities typical for implementing a given CCM control between a CSP and a CSC. The
matrix indicates whether a control’s responsibility is usually “CSP-Owned”, “CSC-Owned”,
or “Shared” between the CSP and CSC (as required by control STA-04). The SSRM control
ownership varies from service to service, depending on the cloud service model and the
implementation of each specific cloud service. Accordingly, CSPs should provide detailed,
service-specific SSRM guidance to facilitate secure customer service implementations.
Version No. 4 of the CAIQ has been enhanced to provide a framework and forum for CSPs
to document and share this crucial information with current and prospective customers (per
CCM controls STA-01 - STA-06).
• The Architectural Relevance and Cloud Stack Components matrix. These columns indicate
the architectural relevance of each CCM control—per cloud stack component—from the
perspective of the CSA Cloud Reference Model. The section focuses on the following
components: “Physical”, “Network”, “Compute”, “Storage”, “App (Application)”, and “Data.”
The relevance box associated with each component is marked as “TRUE” if the control is
relevant to a component and “FALSE” if not.
The architectural relevance represents a high-level simplification, and CCM users should revise
those attributions depending on their specific cloud environments and technologies used.
Figure 4: Snapshot of CCMv4 ‘Audit & Assurance’ domain and control architectural relevance
• The Organizational Relevance matrix. This group of columns indicates the relevance
between each CCM control and its implementation by the respective cloud relevant
functions within an organization. The functions included are: “Cybersecurity”, “Internal
Audit”, “Architecture Team”, “SW (Software) Development Team”, “Operations”, “Legal/
Privacy”, “GRC (Governance/Risk/Control) Team”, “Supply Chain Management”, and “HR
(Human Resources).”
The “relevance box” associated with each component is marked as “TRUE” if the control is
relevant to a component and “FALSE” if not.
b. Implementation Guidelines
This tab includes the implementation guidelines which provide suggestions, recommendations and
examples of how to implement the CCM controls.
This tab includes the mappings between CCM V4 and numerous standards (ISO 27001/2/17/18) and
best practices (CIS v8.0) control sets relevant to cloud computing.
For each standard, CCM V4 is mapped to include the following three columns:
• Control Mapping. The indication of which control(s) in the target standard (e.g., ISO27001)
corresponds to the CCM control.
• Gap Level. The gap level a control (or controls) in the target standard has when compared
with the CCM control. The gap levels used are:
• No Gap: In case of full correspondence.
• Partial Gap: If the control(s) in the target standard does not fully satisfy the
corresponding CCM control’s requirements.
• Full Gap: If there is no control in the target standard to fulfill the corresponding CCM
control’s requirements.
• Addendum. The suggested compensating control organizations could implement to cover
the gap between the control in the target standard and the corresponding CCM control.
Figure 6: Snapshot of a CCMv4 control mapping to ISO standards illustrating the relevant columns.
This tab includes the questionnaire associated with CCM controls, commonly known as CAIQ. The
CAIQ consists of 261 questions structured in the 17 domains of the CCM. Each question is described
in the following manner:
e. Acknowledgments
This tab acknowledges the volunteers who contributed to CCM v4.0’s development.
The CCM was created to help cloud customers, cloud service providers, and auditors and consultants.
Cloud customers: The CCM allows cloud customers to build a detailed list of requirements and
controls they want their CSP to implement as part of their overall third-party risk management and
procurement program. It also helps normalize security expectations, provides a cloud taxonomy, and
improves understanding of the security measures implemented in the cloud supply chain. Because
the actors within a cloud supply chain are independent organizations, each has its own way of
expressing and representing its security requirements. Each actor might use a different vocabulary or
apply policies that differ from others. It is vital to define a taxonomy—or a set of agreed-upon terms—
to standardize the various languages in such a context. That is why CCM plays a critical role and why
more overarching frameworks are necessary to simplify interoperability.
When building a third-party risk management program, the CCM allows customers to assess a
cloud service during the overall service lifecycle. For example, it can be used to evaluate the service
before its acquisition, compare offerings from different CSPs, and monitor alignment with internal
requirements during the service execution.
When organizations build cloud risk management programs, the CCM can help measure, assess, and
monitor risks associated with CSPs or particular services. The CCM allows customers to understand
the gaps between their own security needs and CSP security capabilities. Customers can then
use the CCM to identify compensating controls to close gaps between organizational needs and
provider offerings.
When building a third-party risk management program, the CCM allows customers to assess a
cloud service during the overall service lifecycle. For example, it can be used to evaluate the service
before its acquisition, compare offerings from different CSPs, and monitor alignment with internal
requirements during the service execution.
Cloud service providers (CSPs): The CCM serves multiple purposes for CSPs. First and foremost,
it offers cloud-specific, industry-validated best practices CSPs can follow to guide internal security
programs. In addition, it provides standardized language CSPs can use to communicate with
customers and business partners.
The CCM mapping feature allows CSPs to demonstrate alignment with other recognized
international, national, and industry frameworks and compliance with the CSA STAR program—which
relies on the CCM as one of its foundational frameworks (see Chapter 9 for more details). In addition,
the CSA STAR program enables organizational transparency and reduces the number of security
questionnaires they must provide for customers. These benefits can be realized when organizations
complete the CCM extended question self-assessment (the CAIQ) and submit it to the CSA STAR
Registry—a free, publicly accessible registry documenting CSP-provided security controls.
• Build an internal security program based on mature and industry-recognized best practices.
• Facilitate communication and interoperability with business partners and customers.
• Demonstrate commitment to security and transparency about security postures.
• Streamline compliance by leveraging mapping between CCM controls and the controls in
other international, national, and industry frameworks.
• Reduce time and effort spent addressing customer questionnaires.
• Demonstrate commitment to security to regulators by adhering to the CSA STAR program
(see Chapter 9).
• Build a cloud internal and external audit plan.
To provide an organizational record and prepare for compliance audits, CCM users should focus on
documenting compliance with the CCM V4 controls that they are responsible for in whole or in part
under the Shared Security Responsibility Model (SSRM) that always exists between the Cloud Service
Provider (CSP) and their Cloud Service Customers (CSC).
CCM users should start by developing or assembling high level CCM compliance and SSRM control
applicability and implementation summary documentation as appropriate for their cloud role, e.g. as
a Cloud Service Provider (CSP) or Cloud Service Customer (CSC).
4
https://e.cloudsecurityalliance.org/e/908632/security-questionnaire-caiq-v4/5k7gm/16076104?h=
MnauEgRXjmy71XyORAtJaJr5idpEVy7uzLeD2hYNSrs, accessed on 25/8/21.
5
https://e.cloudsecurityalliance.org/e/908632/star-registry-/5k7gp/16076104?h=MnauEgRXjmy71Xy
ORAtJaJr5idpEVy7uzLeD2hYNSrs, accessed on 25/8/21.
The document contains implementation guidelines tailored to the control specifications for each of
CCM v4.0.’s 17 cloud security domains. The guidelines represent a new element for CCM v4.0 that did
not exist in CCM v3.0.1.
The implementation guidelines aim to support organizations and provide guidance for implementing
every CCM v4.0 security and privacy control specification. Currently, the guidelines are technology/
vendor agnostic, meaning they are not tailored to a specific technology but defined at the same high
level as each CCM control specification. However, they include more details regarding best practices
for implementing such controls, as recommended by cloud organizations.
The implementation guidelines are not exhaustive nor prescriptive. Instead, they represent a
generic guide highlighting recommendations. Therefore, security practitioners must customize
the descriptions, procedures, risks, controls, and documentation and tailor these to their risk
management programs and cloud service(s) (in the scope of the risk assessment) to address specific
security objectives and implementations.
The intended audiences of this document include cloud consumers, cloud providers, cloud auditors,
expert users willing to assist new CCM adopters, and neophytes willing to learn the best approaches
to CCM control implementation.
The document assumes that readers have familiarity and knowledge of CCM 4.0, CAIQ, and CSA
Security Guidance for Critical Areas of Focus in Cloud Computing.
Audience members are encouraged to follow industry-standard practices and innovate on their
implementation journeys using this guidance.
1.3 Versioning
The final version of this is v1.0.
Implementation Guidelines:
Both the cloud service provider (CSP) and customer (CSC), should develop a “customized
integrated framework”, of audit and assurance policies and procedures to incorporate/
demonstrate compliance to leading industry standards and own business requirements, and
finally to provide appropriate coverage of controls to assess the respective cloud environment
and corresponding services.
Audit and assurance policies and procedures should include, but not limited to:
Implementation Guidelines:
Independent audit and assurance should be free from conflict of interest and undue influence in
all matters related to audit and assurance engagements.
The frequency of audit and assurance evaluations should comply with applicable standards,
regulations, legal/contractual obligations, and statutory requirements.
The audit and assurance process should assess all applicable CCM domains.
Implementation Guidelines:
Independent audit and assurance assessments should be based on risk-based plans that define
audit objectives, scope, resources, timeline and deliverables, documentation and reporting
requirements, use of relevant technology and data analysis techniques, costs, communication,
and escalation protocols.
Both CSPs and CSCs may take guidance from industry standards like the Committee of
Sponsoring Organizations (COSO) or the International Organization for Standardization (ISO)
31000 for risk management and risk-based planning.
Implementation Guidelines:
Verify compliance with all relevant standards applicable to the audit, such as:
a. Country regulations
b. Standards and certifications
c. Industry sector regulations
d. International applicable regulations such as those regarding privacy and cybersecurity
Implementation Guidelines:
Audit management process security should include:
a. Secure role-based access and authorization and secure communication and storage.
b. Controls to protect audit data confidentiality, integrity, and availability.
c. Periodic reporting, including issues and remediation plans per organizational requirements.
Implementation Guidelines:
The organization should document a well-defined remediation plan that includes:
The organization should document, communicate, and enforce change management best
practices to address audit findings based on a risk-based approach.
Implementation Guidelines:
The policy should:
Implementation Guidelines:
The baseline requirements should include, but are not limited to:
Implementation Guidelines:
Actionable metrics should be defined with consideration to business goals, the criticality of
service, security requirements, and compliance obligations.
Reporting:
Reporting should be designed with various users in mind. For example, security professionals,
engineering teams, business stakeholders, and executives will often have different interests
requiring specialized views, filtering, and delivery mechanisms.
To successfully enable SSDLC security, roles and expectations should be clearly defined
and published, and an inventory of applications and their metadata should exist in an easily
accessible format.
Appropriate security practice examples for the common stages of an SSDLC are provided below
to include the following categories: training, requirements, design, development, testing, and
release and response.
A. Training:
a. Role-based secure development training should be required at multiple stages of
employment (or other contractual relationships), including on-boarding and role
changes.
b. Refresher training should be delivered throughout one’s career, regardless of position or
movement in their organization.
c. Targeted, specialty training should be created and made available as the organization
adopts new technologies.
d. Progressively advanced training should be made available to relevant employees (and
contractors whenever applicable) as they transition through technical roles and/or
champion program participants.
B. Requirements:
a. Generic and specialized security requirements should be defined, published, organized,
and easily accessible to all organizational roles.
b. Every application, during each iteration, should review existing requirements and
research if additional requirements are necessary. It is beneficial for the engineering
teams to consult with a security professional at this time.
C. Design:
a. Security-focused design reviews are conducted.
b. Threat models are developed or modified.
c. The design of new or enhanced security controls, required by the application design,
is developed.
E. Security Testing:
a. Manual and automated test plans are developed and executed with abuse cases in mind
b. Automation may include one or more of SCA, SAST, DAST, IAST, fuzzing, credential
scans, etc.
c. Penetration testing may be executed during this stage, based on need.
d. Crowdsourced testing or private bug bounty programs may be implemented.
F. Release:
a. Change control is instituted, including gating and documenting releases to ensure
requirements and compliance objectives are met.
G. Response:
a. Monitoring and alerting are in place to identify security issues and enable response
activities.
b. A response plan exists and can be easily executed when a security issue is discovered.
c. A process is established for monitoring external sources for vulnerability disclosures and
responding when applicable.
Implementation Guidelines:
Note: The implementation guidelines of AIS-05 should be interpreted as further guidance in
addition to what is specified in AIS-03 and AIS-04.
Automation of security testing should be implemented to reduce risks and errors and enable the
scaling of security practices to meet organizational demands. Multiple test types and integration
points will likely be needed to provide the appropriate level of assurance throughout the SDLC.
Criteria should be developed for use when assessing the automation required by an application,
as not all systems will benefit equally.
Strategy:
a. Identify the goals and requirements of the automation implementation.
Example Requirements:
• Applicable programming languages should be supported by static analysis tools.
• Python and C# should be supported by select static analysis tools.
• Automation should not require infrastructure support.
• All automation tools should offer an application programming interface (API).
• All website security headers are verified to meet security requirements when deployed.
Considerations:
a. Security requirements
b. Risk, business, and compliance requirements
c. Development methodology
d. Lifecycle
e. Metrics establishment
Example:
• Count or percentage of (test type) adoption among applications requiring (test type)
SAST, DAST, SCA, etc.
• Count or percentage of false positives produced by test automation.
• Count or percentage of execution-time SLA breaches by test automation.
• Soft measures, including satisfaction levels with usability.
• Change in the number of security weaknesses discovered after release.
• Percentage coverage of automated test cases for exposed APIs and SDK functions by
service (i.e., the total number of automated test cases for APIs/SDK functions; the total
number of APIs/SDK by service).
• Evaluate test types to determine which is best suited for different categories of
applications based on the attributes of those in the prioritized inventory.
Considerations:
• Development and security team sizes
• Platform and operating systems
• Maturity of build automation
• Language support
Implementation Guidelines:
The strategies should include:
The capabilities should be based on the organization’s SSDLC and should include, for instance:
g. Defined and approved list of deployment and automation technologies.
h. Enablement for team members (e.g., developers, administrators, etc.) to dynamically
address security issues when needed.
Implementation Guidelines:
Application security remediation should adhere to the following guidelines:
a. Follow defined remediation processes, designed, tested, and implemented by security
and application teams.
b. Remediate risks as early in the SDLC as possible, such as during the design or
development stages.
c. Have defined roles and responsibilities, including escalation paths for application security
incident response and remediation.
d. Follow a risk-based approach to address high-risk incidents that significantly impact
application availability, integrity, or confidentiality.
e. Leverage automation when possible to increase remediation efficiency and accuracy.
Example:
• GitOps-based remediation of application vulnerabilities.
• Automated remediation efficacy metric: total number of remediations of active critical/
high vulnerabilities performed through Git for the given period.
• Total number of active critical/ high vulnerabilities identified for the given period.
Implementation Guidelines:
The policies should include defined roles and responsibilities supported by regular workforce
training.
Implementation Guidelines:
The business impact analysis (BIA) should incorporate the following components:
a. Identification of critical products and services with their inherent risks.
b. The likelihood and impact of each risk.
c. The organization’s risk appetite and tolerance.
d. The identification of risk dependencies.
e. The identification of appropriate and relevant countermeasures to prevent, detect, and
react to the identified risks.
Implementation Guidelines:
Business continuity and operational resilience strategies should:
a. Be developed by both cloud service providers and cloud service consumers with
consideration of acceptable limits regarding risk appetite and tolerance.
b. Cover all aspects of business continuity and resilience planning—taking inputs from
assessed impact and risks—to consider activities for before, during, and after a
disruption.
c. Account for the unavailability of all relevant components required to operate the
business “as usual” or in a disrupted mode (in parts or total) during a disruption.
d. Cover all actions required to continue and recover prioritized activities within identified
timeframes and aligned with organizational risk appetite and tolerance (including the
invocation of continuity plans and crisis management capabilities).
e. Cover all activities within the defined scope to protect prioritized activities, reduce
disruption likelihood, and limit cloud capability disruption through adequate resourcing.
f. Include detailed solutions and measures for each strategy.
Implementation Guidelines:
All relevant business continuity plans should be developed consistently to address priorities for
operational resilience, testing, maintenance, and information security requirements.
Business continuity plans should be accessible and available to those with the need-to-know and
include the following elements:
a. Defined purpose and scope, aligned with relevant dependencies.
b. Assigned roles and responsibilities (i.e., review, update, and approval).
c. Defined lines of communication, roles, and responsibilities.
d. Detailed recovery procedures, manual workaround, and reference information.
e. Method for plan invocation.
The plans should be tested and reviewed at planned intervals (e.g., annually or upon significant
organizational or environmental changes).
Implementation Guidelines:
The documentation should include but is not limited to:
a. Administrator and user guides
b. Database backup and replication guidelines
c. Architecture diagrams
d. Incident playbooks
Implementation Guidelines:
Exercise and test business continuity and operational resilience plans at least annually or upon
significant changes.
Exercises and tests should include but are not limited to:
a. Processes established in the business continuity plan.
b. Alignment with business continuity policies.
c. Critical systems and equipment relevant to the business continuity plan.
d. Roles and responsibilities of the various parties involved in the exercises.
e. The use of CSP support mechanisms in CSC exercises.
f. A review and update of communication templates.
g. Lessons learned from previous events and exercises.
h. Tabletop exercises.
Depending on the level of CSP maturity, the CSP’s practices may include automated chaos testing.
Implementation Guidelines:
A business continuity and resilience program should:
a. Communicate the importance of effective business continuity and the consequences of
disruptions to all relevant stakeholders.
b. Communicate the business continuity and resilience policy, objectives, and plans to all
relevant stakeholders.
c. Communicate the roles, responsibilities, authorities, and expected competencies to all
relevant stakeholders.
d. Establish the criteria, thresholds, and indicators to demonstrate when and how business
continuity-related communications should be sent, who should send them, and to whom
they should be sent.
e. Establish templates for common communications during a disruption regarding the
activation, operation, coordination, and communication of a business continuity response.
f. Establish the people, technology, and processes required for business continuity
communications.
g. Establish a response structure that will enable timely warnings and communication to
relevant stakeholders.
Clear and effective communication channels should remain available to disseminate information
to participants and stakeholders, assess and relay damage, and coordinate a recovery strategy.
Failed communication often results in failed business continuity efforts. Thorough planning,
testing, and exercising communication procedures within the following four phases are essential
to support effective business continuity and the viability of critical business operations.
Implementation Guidelines:
Implementation of backups and/or other means of data preservation (e.g., replication) should
follow the following guidelines.
a. The scope, frequency, and duration of cloud retention should comply with:
1. Applicable laws
2. Contractual agreements with the cloud customers
3. The cloud provider’s business requirements
Additional guidance is also available in the NIST Special Publication 800-53 (Rev. 4) CP-9
INFORMATION SYSTEM BACKUP (latest revision).
Implementation Guidelines:
The response plan should include the ability to protect systems—including the physical
environment when possible—from inadvertent unauthorized access during an emergency.
The response plan should include the following when describing environmental threats/natural
disasters: fires, medical emergencies, tornadoes, hurricanes, flooding, earthquakes, and other
natural disasters.
Emergency authorities can include first responders and other law enforcement entities.
Depending on regulatory requirements, the business, and the industry, a disaster recovery (DR)
exercise might be required. For example, financial institutions may consider running live on DR for
extended periods or simulate component or partial failures to test overall organizational resiliency
and recovery abilities.
Implementation Guidelines:
The minimum distance between mirrored or redundant physical systems should support
compliance with the organization’s defined continuity and availability within contractual agreements
or service-level agreements (SLAs).
Implementation Guidelines:
A documented and approved change management policy (and associated process
documentation) should:
a. Ensure that changes are tested, documented, risk assessed, and authorized in a
consistent and timely manner. All changes (e.g., major, minor, and emergency and the
qualifying criteria) in organization assets, applications, system software, and informational
technology (IT) infrastructure (e.g., hardware, operating systems, communications
equipment, and software) and associated configurations should be under the scope of the
change management policy.
b. Be communicated and made accessible to all employees and interested parties involved
within the change management process (e.g., service/application owners, project leaders,
IT, operating systems staff, contractors, etc.).
c. Include the management of emergency changes.
Implementation Guidelines:
A plan to test and review during the development process should be prepared. This plan should
include (but is not limited to) relevant activities and test inputs, and expected outputs regarding
various conditions that may impact the outcome. For internal organizational developments, the
team that oversees development efforts initially can perform such tests. Independent acceptance
testing can then be performed (both for internal and external development sources) to determine
whether the system functions as intended. Testing should be proportionate to the system’s
relevance based on its nature.
The quality testing plan might align with relevant standards or guidelines (i.e., ITIL or ISO 20000, etc.)
Implementation Guidelines:
The organization should:
• Collaborate with relevant internal and external parties involved in the change
management process.
• Assess the impact and type of change to determine the risk of the change before it is
applied.
• Adopt Change Management Technologies to manage the change management workflow.
These tools should help adequately manage the authorization process, including activity logging.
In addition, real-time reporting/monitoring capabilities should be implemented to monitor change
progress so that quick decisions can be made to manage the risks of unforeseen issues due to the
change implementation.
Understanding how those relevant components impact the security and usability of the supply
chain that supports organizational environments should be one aspect of such collaboration.
Implementation Guidelines:
The organization should establish procedures and implement technical measures to
prevent and/or detect any unwanted/unauthorized changes (e.g., additions, removals, and
updates) to organizational assets production, including applications, systems, infrastructure,
configuration, etc.
Implementation Guidelines:
Processes and procedures established by both the CSP and CSC should reflect respective
change management responsibilities with respect to the scope of services being provided
and/or consumed. There should be acknowledgement of each party’s responsibility, where
applicable and it should be part of a written change management agreement between CSC
and CSP. The acknowledgment should include a reference to limitations related to changes
impacting CSC-owned environments/tenants.
NOTE: The CSP may need to apply changes that impact CSC-owned environments/tenants
without the explicit authorization of the CSC (in case those changes would be required for the
overall security of the CSP system). If those types of changes are applied, the CSC should be
consulted promptly.
Implementation Guidelines:
A change management baseline reflects the minimum policies, procedures and technical
measures established to achieve organizational objectives, and requirements (i.e., CCC-02
implementation guidelines).
Implementation Guidelines:
The organization should establish a policy and procedures to detect deviations from the
established control baseline. When a deviation is detected, the organization should follow the
incidence management policies and procedures defined in SEF-01.
Implementation Guidelines:
Rollback procedures should be created and tested with each change request.
Implementation Guidelines:
Policies and procedures on the use, protection, and lifetime of cryptographic keys should be
developed and implemented through their full lifecycle.
Policies and procedures include but are not limited to the following considerations:
A. Policies and procedures relating to organization/management.
a. Roles and responsibilities (See GRM for general considerations)
b. Data protection (DSP domain for general considerations)
1. Data encryption
2. Algorithm
c. Change management (See CCC domain for general considerations)
1. Cost-Benefit analysis
d. Risk management (See BCR/GRC domains for general considerations)
e. Monitoring and reporting (see LOG and monitoring domain for general considerations )
f. Transaction/activity logging (see LOG and monitoring domain for general
considerations)
g. Incident handling (see SEF domain for general considerations)
h. Audit (See A&A domain for general considerations)
Implementation Guidelines:
Below are some examples of possible roles and responsibilities:
a. Keys managers should not be able to access protected data or the cryptographic engine.
b. Separation of duties should include two or more individuals control a single process.
c. Split Knowledge requires no one person knows the complete value of an encryption key.
d. No one person should know the entire passphrase used to create encryption keys.
e. Restrict access rights to the least resources required (least privilege).
f. A policy authority is responsible for all operational cryptographic key management
system (CKMS) roles and reports to the executive IT.
Implementation Guidelines:
A risk-based approach to encryption algorithms adoption should consider, but not be limited to:
a. Cryptographic key management system algorithms should not exceed the anticipated
lifetime of the CKMS and the information it protects.
b. Cryptographic key management system security policies should protect the
confidentiality, integrity, availability, and source authentication of all keys, algorithms,
and metadata.
c. The (CKMS) should include, but is not limited to:
1. Approved algorithms
2. Hardware security modules (HSMs)
3. Key sizes
d. The adoption of the appropriate key size and algorithm types should be done based on
cost-benefit analysis and the level of risk to data (please see the reference to quantum-
resistant encryption in CEK-03).
Implementation Guidelines:
Key change management is the process of managing all changes to key management governance,
organization, infrastructure, and activities.
a. Changes to the key management system and its policies and procedures should be
analyzed and approved before implementation.
b. Changes should be documented to show the reasoning behind the changes and include
a path to rollback to the previous status.
c. If unauthorized changes are made to the software, the software should be recovered.
d. There should be security audits after every significant change to the key management
system.
e. All audit results should be reported to the system authority.
Implementation Guidelines:
Encryption change cost-benefit analysis is the process of comparing the benefit of encryption
changes to its cost.
a. Key change management cost-benefit analysis/return on investment (ROI) should be
calculated for all key management-related changes.
b. Every analysis should fully account for downstream effects of proposed changes,
including residual risks.
c. Every analysis should be reviewed and approved.
d. Six months after a change, compare the anticipated ROI to the actual ROI.
e. Significant deviation from the planned ROI should be audited.
f. Report all audit results to the system authority.
Implementation Guidelines:
Key management capability is the process of CSPs providing CSCs the capability to manage CSC-
owned or generated encryption keys.
a. The CSC and CSP should agree on the definition and scope of CSC-managed keys and
document this (shared responsibility) in the SLA, applicable contracts, policies, and
procedures.
b. The CSP should allow the CSC to manage policies, procedures, and processes.
c. The CSP should empower the CSC to manage keys and data encryption keys.
d. The CSP should enable the CSC to manage key encryption keys or master keys used to
encrypt data keys.
e. The CSP should allow the CSC to use the key management system (e.g., transactions,
reporting, etc.).
f. Optionally, the CSC should supply CSC-generated master encryption keys using bring-
your-own-key (BYOK) mechanisms per the SLA.
Implementation Guidelines:
The key generation process should be cryptographically secure.
a. Keys should be generated:
1. using random bit generators (RBGs) and possibly other parameters, or
2. generated based on keys that are created in this fashion.
b. Key management technology and processes should be NIST FIPS validated or NSA-
approved or comparable.
c. All relevant transitions/activity should be recorded (logged) in the inventory
management system (CKMS).
Implementation Guidelines:
Key distribution is the process of logically or physically transferring keys.
a. Distribution of asymmetric key pairs (public, ephemeral, centrally) requires protection
mechanisms.
b. Distribution of symmetric keys requires their own protection mechanisms.
c. Distribution of other key materials requires their own protection mechanisms.
d. Distributed keys should be protected at rest, in storage, in transit, and to the appropriate
extent (even when in use).
e. Distribution controls must address confidentiality, integrity, and availability.
f. Manual or automated (preferable) distribution may be used.
g. All relevant transitions/activity should be recorded (logged) in the inventory
management system (CKMS).
Implementation Guidelines:
Key rotation generates (based on policy) a new key version of a key used to encrypt data.
a. Non-primary (old) keys should be used to decrypt data previously encrypted before re-
encrypting the data with new keys.
b. Old data may be re-encrypted using new keys based on organizational policy and
technology capacity.
c. When rotating keys, consider the following principles:
• Cryptographic mechanism strength: algorithm, key length, and mode of
operation.
• The volume of information flow or the number of transactions.
• The security life of the data.
• The security functions, such as data encryption, digital signature, and key
protection.
• The number of key copies and the distribution of those copies.
d. All relevant transitions/activity should be recorded (logged) in the inventory
management system (CKMS).
Implementation Guidelines:
Key revocation removes keys from operational use before their expiration dates.
a. Key revocation of a “symmetric key” restricts the use of the key material.
b. Key revocation of an asymmetric key specifically refers to the private key.
c. Perform emergency revocation when keys are lost or compromised.
d. Revocation statuses should be available to all who have relied on the key.
e. Use certificate revocation lists (CRLs) or other relevant mechanisms to inform
stakeholders.
f. ROI: Cost to decrypt then re-encrypt large distributed databases with a significant
number of key holders.
g. ROI: Risk of long-term cryptoperiods versus short and the amount of data encrypted
with one key.
h. All relevant transitions/activity should be recorded (logged) in the inventory
management system (CKMS).
Implementation Guidelines:
Key destruction removes all traces to prevent recovery by physical or electronic means.
a. When a key is to be destroyed, all key copies should be destroyed.
b. Keys should be destroyed when they are not needed to minimize compromise risks.
c. Secret and private keys should be destroyed so they cannot be recovered by any means.
d. Public keys may be kept or destroyed.
e. Notify stakeholders in advance of key destruction.
f. Consider laws, regulations, and their retention requirements for keys and/or metadata.
g. Key recovery information (KRI) should be protected against unauthorized disclosure or
destruction.
h. All relevant transitions/activity should be recorded (logged) in the inventory
management system (CKMS).
Implementation Guidelines:
Activated keys are used to protect information cryptographically.
a. Pre-activated keys are activated by entering the start date of the validity/cryptoperiod.
b. Keys which are not activated for use are not ready to encrypt data.
c. Non-activated keys should only be used to perform proof-of-possession or key
confirmation.
d. If pre-activated keys are no longer needed, they should be destroyed.
e. If there are suspicions about the integrity of a given key, it should be moved to the
compromised state.
f. All relevant transitions/activity should be recorded (logged) in the inventory
management system (CKMS).
Implementation Guidelines:
Deactivated keys should not be used to encrypt but can be used to decrypt.
a. Upon the expiration date, keys should not be able to encrypt data.
b. The deactivated state should transition to the destroyed state when keys are no longer
needed.
c. Metadata should be retained for audit purposes.
d. All relevant transitions/activity should be recorded (logged) in the inventory
management system (CKMS).
Implementation Guidelines:
Key archiving places keys in long-term storage.
a. Archived key material can support the later recovery of information.
b. While archived key material may be needed in the future, the key material should be
destroyed when no longer required.
c. The key recovery process should include the generation, storage, and access of the long-
term storage keys used to protect backed-up and archived key information.
d. Archives should be used for long-term key access.
e. The inventory system should record the storage and recovery of archived key information.
f. All relevant transitions/activity should be recorded (logged) in the inventory
management system (CKMS).
Implementation Guidelines:
Compromised keys/states are keys that may be waiting for the performance of an investigation
to determine the appropriate disposition. Compromised keys should be revoked using the
organization’s emergency revocation policy.
When appropriate, relevant stakeholders should be notified that keys previously used to encrypt
their data have been compromised and that those keys are no longer used for encryption.
These compromised keys should be notated in the organization’s “Compromised Key Lists (CKLs)”
along with a summary of users notified, notification timeframes, or reasons that notifications
were not made to compromised key users.
Implementation Guidelines:
Cryptographic Key Management Systems (CKMS), whether manual or automated, exist to
process, control, store and report key management activity.
Implementation Guidelines:
When clients delete, leave, or egress a cloud platform, the provider should follow a sequence of
structured steps to ensure that client data has been expunged from the provider environment
according to the terms in the contract and best practice (per vetted guidance sources such as NIST
800-88). In addition, the client may request verification that data has been effectively removed.
Implementation Guidelines:
The communications between services that facilitate movements of workloads, application
data, etc., should be encrypted based on globally recognized crypto algorithms such as AES-256.
Additionally, communication may include measures such as obfuscation or de-identification to
render the information in transit illegible. NIST 800-122 (Guide to Protecting the Confidentiality of
Personally Identifiable Information - PII) provides relevant and effective techniques for obscuring
sensitive data, such as personally identifiable information (PII), etc.
Implementation Guidelines:
The CSP should identify the manageable parts of the data center and consider operational
criteria, such as effectiveness, efficiency, compliance, reliability, risk management, functionality,
availability, integrity, and confidentiality. Then, the CSP should prepare and maintain policies and
procedures for each part.
Policies and procedures should include provisions to restrict physical access to the facilities to
prevent unauthorized entry.
Facility areas that house, store, and transact customer data should be configured to prevent
confidential information or activities from being visible and audible from the outside.
Electromagnetic shielding should also be considered as appropriate (ISO standard; ISO_
IEC_27002_2013 - 11.1.3 (c)).
In addition, the facility itself should be designed and positioned to reduce the risk of natural
disasters. Systems and infrastructure should be deployed to enhance fire prevention—typically
utilizing zoned dry-pipe sprinkler systems. These systems are intended to be deployed
throughout the facility and not just within the computer room.
Implementation Guidelines:
Secure transportation of physical media should include secure information-handling policies
and procedures for storage, packaging by internal or external personnel (third-parties, such as
couriers), internal delivery, packaging for external mail or courier services, and shipping tracking.
Implementation Guidelines:
The facility management should develop a naming convention for asset classification that meets
legal, value, and business requirements to protect restricted information sharing.
Implementation Guidelines:
Datacenter personnel should utilize a solution that enables inventory tracking and managing
physical locations of servers and other data center assets while eliminating paper and manual
processes. A hosted asset tracking solution for servers, switches, data center asset tracking and
racks typically uses passive radio frequency identification (RFID), global positioning system (GPS),
and/or Bluetooth Low Energy (BLE) technologies.
Implementation Guidelines:
Physical security perimeters should be restricted to authorized personnel only. They may include
(but are not limited to): fences, walls, barriers, guards, gates, external boundary protection,
bollards, fencing, guard dogs, armed guards, physical authentication mechanisms, reception
desks, and security patrols.
Implementation Guidelines:
Where applicable, use location-aware technologies to validate connection authentication integrity
based on known equipment locations.
Implementation Guidelines:
The external and internal perimeter should be equipped with security alarm systems and
surveillance devices such as: movement sensors, cameras, etc., and monitored by security
personnel. The recordings should be retrained for a defined period.
Implementation Guidelines:
Comprehensive training on detecting and responding to various kinds of unauthorized access
attempts should be provided to relevant data center personnel and issued periodically.
Implementation Guidelines:
All cabling should be shielded (when possible) to protect against electromagnetic interference
(EMI). Additionally, hide cabling (i.e., under the floor, above cabinets in caged, cable-management
systems, etc.) or—at a minimum—protect with (PVC) tubing (or something similar) when possible
to protect against unauthorized physical access.
Implementation Guidelines:
Examples of environmental systems include but are not limited to temperature and humidity
systems, fire prevention, and detection systems.
Environmental system reviews should include activities to ensure continual effectiveness, and
environmental control systems should be maintained at normal operational levels during a power
outage.
Implementation Guidelines:
Examples of utility services include but are not limited to water, power, telecommunications, and
internet connectivity.
Service reviews should include activities to protect from unauthorized interception or damage
and ensure the services are designed with automated failover or other redundancies if planned or
unplanned disruptions occur.
Implementation Guidelines:
Keep business-critical equipment away from locations subject to a high probability of
environmental risks, such as switchyards and chemical facilities. Hazards include fires, flooding
(e.g., waterlogging, water pipe exposure), dust, wind (i.e., exposure to open doors/windows), and
natural disasters (earthquakes and hurricanes).
Implementation Guidelines:
Policies and procedures should include provisions for the following:
a. Data classifications with clear definitions and examples.
b. Acceptable use, handling, and storage of data by classifications.
c. How long the classified data should be retained.
d. How/when the classified data should be destroyed.
e. Responsibilities of data stewards.
Maintain a data inventory and document data flow diagrams and associated technical measures.
Document data protection controls and third-party data sharing practices. This documentation
and associated risks should be shared with customers and data owners as needed.
Implementation Guidelines:
Data deletion should be conducted securely and effectively to ensure that it is not recoverable
by any means, including forensic techniques. Examples include but are not limited to cross-cut
shredding or incinerating hard copy materials, and writing zeros.
Implementation Guidelines:
Implement data classification by defining organizational data categories, such as public data,
confidential data, etc. Automated tools to label files, per their sensitivity levels, may be used.
Appropriate security measures/protection should be implemented, per its categorization.
Use data classification, tagging, or metadata fields based on industry-standard frameworks such
as (but not limited to):
a. Carnegie Mellon University: Guidelines for Data Classification
b. SANS Institute: Tagging Data to Prevent Data Leakage (Forming Content Repositories)
Implementation Guidelines:
Review and update the data flow documentation periodically.
Implementation Guidelines:
A data responsibility matrix can be defined, documented, and communicated. The matrix should
include, but is not limited to:
a. Data type.
b. The associated obligations (regulatory, contractual, or otherwise).
c. The persons or roles responsible for the data.
d. The frequency at which the documented personal and sensitive data should be reviewed.
Implementation Guidelines:
In line with privacy considerations by design and default principles, the default/out-of-the-box
settings should align with the applicable regional privacy regulations.
Implementation Guidelines:
Data protection impact assessment, which is essentially risk assessment from a privacy
perspective, should be performed by the data controller before processing if such personal data
processing is likely to result in a high risk to the rights and freedoms of natural persons.
Implementation Guidelines:
When defining processes, procedures, and technical measures for data transfer, consider data
transfer within the organization and externally.
Personal data transfer in transit should be protected by strong encryption or similar techniques to
prevent unauthorized access by eavesdropping or data transfer interception.
Implementation Guidelines:
The data subject should be able to access, view, rectify, or delete personal data in the system
or by logging a request with the service provider. The service provider should respond to such
requests in alignment with the relevant data protection laws.
Implementation Guidelines:
Implement and maintain processes, procedures, and technical measures to ensure the following:
a. The data subject is made aware of the nature and purpose of information collection.
b. The information is relevant and limited to processing requirements.
c. Processing is performed in a reasonable manner that does not infringe upon the data
subject’s privacy.
d. Processing is for a specific, explicitly defined, and lawful purpose related to a function or
activity of the responsible party.
e. Where the controller intends to further process the personal data for an alternative
purpose to which the personal data were collected, the data subject should be informed
of the purpose and provide consent before additional processing.
f. Information is stored only as long as required.
The CSP should inform the cloud customer of any intended changes concerning the addition or
replacement of subcontractors or sub-processors and allow the cloud customer to object to such
changes or terminate the contract.
The data protection obligations agreed upon between the CSP and the cloud customer should be
supported by any subcontractors or sub-processors used by the CSP.
The CSP remains liable to the cloud customer for data protection, regardless of whether the CSP
uses subcontractors or not.
Implementation Guidelines:
The CSP should document and notify the data owner of the data that will be accessed by sub-
processors. Information may include, but are not limited to, categories of data, special categories
of data, and processing operations.
Implementation Guidelines:
Before replicating data or using data in non-production systems copied from the production
system, perform a risk analysis and obtain data owner approval. Then, implement privacy risk
mitigating techniques such as anonymization, pseudonymization, etc. (if required).
Implementation Guidelines:
Organizational data retention and deletion practices encompassing both physical and
electronic data should be established and implemented.
Implementation Guidelines:
Information rights management technology should be used and applied (when applicable)
to all sensitive data. This technology can add a security layer that will help protect files from
unauthorized copying, viewing, printing, forwarding, deleting, and editing.
Implementation Guidelines:
The CSP should have a process that describes how to respond to requests by law enforcement
authorities, such as a subpoena, official investigations, or legal proceedings initiated by
governmental and/or law enforcement officials. This process should be transparent to the
interested CSCs unless otherwise prohibited.
Implementation Guidelines:
The CSP should track where data is stored, processed, and backed up to ensure it is in line with
the laws and regulations applicable to the CSP and ensure those locations are not prohibited.
In addition, the physical locations’ registry should be kept up to date and shareable with CSC (if
requested).
Implementation Guidelines:
Organizational leadership should govern the program. The program should include—but is
not limited to—policies and procedures regarding legal matters, industry-specific regulations,
regional requirements, compliance mandates, security and privacy requirements, and information
governance. Management of each business area should include the implementation of all
applicable governance policies and procedures. Policies and procedures should be reviewed and
updated at least annually.
Implementation Guidelines:
The enterprise risk management (ERM) program should consider—and not be limited to—cloud-
related information security and data privacy risks. The program should include risk management
elements such as risk identification, risk assessment, risk treatment, and risk reporting.
Management of each business area should consist of the implementation of the applicable ERM
program policies and procedures.
The ERM program should also feature a formal statement of risk appetite and may include
creating and maintaining a risk register that reflects the likelihood of occurrence, potential
business impacts, risk levels, and proposed mitigation actions for each risk.
Implementation Guidelines:
Management-approved defined policies and procedures should be communicated to all
employees for adherence. Evaluate policies, procedures, and assigned responsibilities for
accuracy and efficacy at least annually and when there are significant internal changes or
alterations in the external operating environment.
Implementation Guidelines:
The exception process should be defined and approved by the management team and
communicated across the organization to promote adherence. Integrate exemptions with the
information security risk management process, and review organizational risks whenever a
deviation from an established policy occurs.
Implementation Guidelines:
The program should identify and assign roles, responsibilities, and management commitment.
The CCM domains to address within the information security governance program include, but
are not limited to:
a. Audit and assurance
b. Application and interface security
c. Business continuity management and operational resilience
d. Change control and configuration management
e. Cryptography, encryption, and key management
f. Datacenter security
g. Data security and privacy lifecycle management
h. Governance, risk management, and compliance
i. Human resources
j. Identity and access management
k. Interoperability and portability
l. Infrastructure and virtualization security
m. Logging and monitoring
n. Security incident management, e-discovery, and cloud forensics
o. Supply chain management, transparency, and accountability
p. Threat and vulnerability management
q. Universal endpoint management
Management should promote coordination among organizational entities responsible for the
different aspects of cloud security and privacy risks. Review the program as required to address
threat landscape changes and substantial organization changes.
Implementation Guidelines:
RACI charts (responsible, accountable, consulted, and informed) charts may be used to document
roles and responsibilities. Specific people or teams should be assigned for each documented
role in the governance program, policies, and procedures. Roles and responsibilities should be
reviewed and updated periodically.
Implementation Guidelines:
Documentation should reflect the requirements relevant to the organization and be updated
regularly to reflect changes in the internal and external operational environments. Communicate
requirement changes to management and other personnel, and implement them promptly.
Implementation Guidelines:
Management should establish and maintain contact with special interest groups or professional
associations to receive early warnings and advice regarding new threats, vulnerabilities, and
regulatory updates.
Implementation Guidelines:
Personnel working under organizational control—including full-time employees, part-time
employees, consultants, and temporary staff—should undergo a screening process appropriate
for their role and responsibilities before granting access to the corporate network or systems.
Depending on the applicable legislation, inform candidates beforehand about screening activities.
Personnel screening should consider all relevant privacy, PII protection, and employment-based
legislation and should (when permitted) include the following:
a. Availability of satisfactory references.
b. Verification of the applicant’s curriculum vitae, including claimed academic and
professional qualifications.
c. Independent identity verification (passports or similar documents).
d. Additional role-specific verifications, such as a credit review if the person will have fiscal
responsibilities.
The organization should consider rescreening individuals at regular intervals. Rescreening may
also occur if the employee’s responsibilities or access to confidential data have increased since
their last screening.
The organization should have policies to determine who can screen personnel, how, when, and
why the screening is required, where data is stored, and what the retention period constitutes.
All relevant data about personnel should be considered PII and managed accordingly. If the
screening is done by an external entity or another organizational department, sensitive information
like historic remuneration details should be redacted if irrelevant to the screening process.
Implementation Guidelines:
The organization should establish a policy on acceptable use requirements and standards
for protecting and handling the organizational assets and communicate them as sufficient to
personnel. In addition, the policy should provide clear direction on how individuals should utilize
these assets.
Personnel should acknowledge their understanding and accept responsibility to use information
processing resources.
Policies and procedures should be reviewed and updated at least annually or whenever there are
significant changes in the environment, and personnel should be retrained when these changes
occur.
Implementation Guidelines:
The organization should establish and communicate a “clean desk” policy to guide personnel on
reducing the risk of unauthorized access to information.
The organization should have procedures to vacate facilities, including conducting a final sweep
before leaving to validate the organization’s assets are not left behind (e.g., documents fallen
behind drawers or furniture).
Implementation Guidelines:
Organizations allowing remote working activities should issue a policy that defines the conditions
and restrictions of working away from a regular office.
Implementation Guidelines:
The organization should establish and communicate a policy and procedure for the return of
assets owned or controlled by the organization upon the termination of a personnel contract.
The organization should identify and document all information and other associated assets to be
returned or disabled.
The organization should prevent the unauthorized copying of information (e.g., intellectual
property) by personnel under a notice of termination.
Implementation Guidelines:
The organization should establish and communicate a ‘termination of employment’ policy that
defines the responsibilities and duties that should remain valid after termination of employment
or a change in employment status. This may include guidelines on information confidentiality,
intellectual property, and other knowledge obtained while personnel was employed under
the organization’s control, and responsibilities contained within any additional confidentiality
agreements. These responsibilities should be included in employment terms and conditions.
The process for termination or change of employment should also be applied to external
personnel (i.e., suppliers) when contract or job termination occurs or there is a role change within
the organization.
Implementation Guidelines:
Employees should not be granted access to systems or information unless they have signed the
employment agreement featuring terms and conditions concerning information security. The
terms and conditions of employment should be appropriate to the employee based on their role.
Additionally, roles and responsibilities should be communicated during the hiring process.
The terms and conditions concerning information security should be reviewed and updated if
relevant laws, regulations, or information security policies change. Furthermore, personnel may
be asked to acknowledge and agree to such changes.
Implementation Guidelines:
The agreement between the employee and organization should include—but is not limited to—a
confidentiality or non-disclosure agreement if the employee will have access to confidential data.
Employee legal responsibilities regarding their rights as an employee of the organization (i.e.,
whistleblower, data protection regulations, etc.) should include guidance on how to handle both
physical and digital assets.
The organization should take appropriate and proportionate action if an employee is in breach of
an agreement.
These responsibilities should be supplemented, where necessary, with more detailed guidance
for specific sites and information processing facilities.
Implementation Guidelines:
The non-disclosure agreement should address requirements to protect confidential information
using legally binding terms. Agreement terms should be based on the organization’s information
security requirements. The type of information covered should define permissible access and
information handling protocols. The agreement should include, but is not limited to:
a. What information is protected.
b. The length of the agreement.
c. Interested parties to the agreement.
d. The responsibilities of each party in the agreement.
e. Terms for the destruction of data once the agreement has ended.
f. Expected actions if a breach of agreement terms occurs.
Implementation Guidelines:
Security awareness training should educate personnel about their responsibilities and the
necessary means for securing corporate assets.
Security awareness training should consider the roles and responsibilities of organizational
members.
Training may include a test to measure personnel’s understanding of the responsibilities and
protections required to secure corporate assets. This evaluation may be used to improve training
and verify that relevant knowledge transfer occurs. Additionally, a training attendance registry
should be maintained.
Implementation Guidelines:
Security awareness training should educate personnel on their responsibilities and the necessary
means for securing personal and sensitive data.
Training should include the various regulatory and legal requirements that impact personal and
sensitive data handling.
Implementation Guidelines:
The organization should maintain a training and awareness program that regularly reminds
personnel of their responsibilities. These responsibilities include maintaining awareness
and compliance with policies, procedures, and applicable legal, statutory, and/or regulatory
obligations.
The training and awareness program may include several awareness-raising activities via
appropriate physical or virtual channels, such as campaigns, booklets, posters, newsletters,
websites, information sessions, briefings, e-learning modules, and emails.
Implementation Guidelines:
Organizations should document access control policies for the registration, management, and
removal of digital identities. Additionally, the guidelines should be communicated within the
organization.
The organization should leverage the identity and access management policy to establish a
security baseline.
Implementation Guidelines:
Organizations should establish a clear policy on strong password usage for different technical
areas. Organizations should also have a monitoring mechanism to evaluate the effectiveness of
policy implementation.
The policy should be reviewed periodically (at least annually) based on business requirements. In
addition, the policy should clearly describe its applicability and scope, and management should
promote effective communication to ensure effective implementation within the organization.
Organizations should also have policies and procedures for all personnel (employees, vendors, or
other third parties) who have access to organizational data. Additionally, control-testing strategies
should be employed to test these policies and be maintained regularly.
The identity and access management database should incorporate single sign-on and multi-factor
authentication for user access.
Database access should be based on need-to-know and least-privilege principles and should
follow best practices (such as role-based access control and segregation of duties). Finally,
all access (especially privileged access) should be logged and monitored for anomalies and
unauthorized use and linked to alerting systems as appropriate.
Implementation Guidelines:
Access control policy should provide instruction on separation of environment and separation of
duties, and cover the following:
a. Maintain separation of duties between the production, testing, and development
environments while limiting read/write access to all environments (such as production,
development, and testing).
b. Maintain separation of duties should and require multiple layers of approval (e.g.,
business approval, system owner approval) to ensure the integrity of access to different
systems.
Implementation Guidelines:
User and service account access should leverage access control methods, such as role-based
access control (RBAC) and attribute-based access control (ABAC). In addition, conduct regular
reviews of access processes (including auditing, when appropriate) to identify non-adherence
to the principle of least privilege.
Restrict privileged access and access to administrative accounts should be via the principle
of least privilege and a need-to-know basis. Furthermore, access should be set to “deny all“
unless specifically allowed.
Implementation Guidelines:
The organizations should address any changes to the identity and access controls using the pre-
established baseline. These changes could be from the proactive management of exploits via
vulnerability scanning or reactive management of issues via incident management.
Implementation Guidelines:
Deprovisioning should automatically remove associated authorizations. For systems not
integrated into automated processes, deprovisioning processes should be manually carried out
by system owners. De-provisions to customer data should be made known to cloud customers
where applicable.
Implementation Guidelines:
The principle of separation of duties should also be considered when conducting user access
reviews.
Access should be reviewed when users resign, are terminated, change roles, and/or no longer
need the authorization to carry out duties for any other reason.
These operations should be managed using split knowledge and dual control where key
management operations are used.
Implementation Guidelines:
Administrators should be allowed to log in as themselves and elevate privilege by systematically
requesting a new role assignment to obtain the rights they need to perform tasks. This can be
accomplished by establishing temporary, time-bound privileged access for both on-premises and
cloud-based infrastructure. The duration of approval validity should be automatically limited. Only
authorized users/roles should be pre-approved to request elevation of privileged access.
The privileged access roles and rights should be reviewed periodically. Additionally, all the
privilege access rights should be assigned based on multiple approval approaches (i.e., system
owner, manager of user, etc.).
All privileged accounts and elevation of privileges should be monitored for suspicious activity,
such as login failures or attempts to escalate permissions using a security information and event
management (SIEM) solution.
Implementation Guidelines:
The organization should consider the following for the control’s implementation:
a. Logs should be stored in a centralized log management solution with separation of
duties maintained by an independent team if possible.
b. Logs should be integrated with a SIEM-type solution for real-time monitoring to raise
alerts in case of any violation.
Implementation Guidelines:
All users should be assigned a unique ID before allowing access to system components or
applications. Allocating a unique ID to each person with access ensures each individual is uniquely
accountable for their actions. When such accountability occurs, actions taken on critical data and
systems can be traced to known, authorized users and processes.
The organization should have a process to detect any creation of non -individual accounts in any
infrastructure/application (either in the cloud or on-premises).
Implementation Guidelines:
All individual, non-console administrative access and remote access to the systems and
applications should be secured using multi-factor authentication. Multi-factor authentication
should contain a minimum of two of the three authentication methods:
a. Something you know, such as a password or passphrase.
b. Something you have, such as a token device or smart card or digital certification*.
c. Something you are, such as a biometric.
* Note: a digital certificate is a valid option for “something you have” as long as it is unique for a
particular user)
Implementation Guidelines:
The organization should adopt the following guidelines for the secure management of passwords:
• Always change vendor-supplied defaults and remove or disable unnecessary default
accounts before installing a network system.
• All non-console administrative access should be encrypted using strong cryptography.
• Using strong cryptography, all authentication credentials (such as passwords or
phrases) should be rendered unreadable during transmission and storage on all system
components.
• Verify user identity before modifying any authentication credential (i.e., performing
password resets, provisioning new tokens, or generating new keys).
• Passwords/passphrases should meet the criteria of industry best practices.
• Alternatively, the password/passphrases should have complexity and strength at least
equivalent to the parameters specified above.
• Change user passwords/passphrases per the organization password standard.
• Limit password reuse per the organization password standard.
• Set passwords/passphrases for first-time use and upon reset to a unique value for each
user and change immediately after the first use.
Guidance on selecting strong passwords may include suggestions to help personnel select hard-
to-guess passwords that don’t contain:
f. Dictionary words
g. Information about the user (such as the user ID)
h. Names of family members, date of birth, etc.
Guidance for protecting authentication credentials may include not writing down passwords or
saving them in insecure files and being alert for malicious individuals who may attempt to exploit
their passwords (see NIST 800:53 password controls for details).
Implementation Guidelines:
The information system should require approvals for authorizations to access the system
resources and follow communicated and approved applicable policies.
The organization should adopt multiple authorization concepts (i.e., user manager, system/
information owner).
Implementation Guidelines:
The organization should leverage security testing of interoperability and portability policies and
procedures.
Implementation Guidelines:
These APIs should support interoperability between components and facilitate the secure
migration of applications and data between environments. Documentation supports API
functionality, being updated regularly and given to customers alongside new API versions.
Furthermore, security issues should be considered during development and updates.
Implementation Guidelines:
Evidence of executed and planned security tests upon all interoperability and portability systems
should be provided per contractual agreements or upon request.
Implementation Guidelines:
N/A (This field is intentionally left blank)
Implementation Guidelines:
Infrastructure Virtualization Security Policy and Procedures should include, but are not limited to:
a. Governance and control VM lifecycle management.
b. Storage restriction of VM images and snapshots.
c. Backup and failover systems.
d. Tagging for the VM based on sensitivity / risk level.
e. A formal change management process for creation, storage, and use of VM images.
Approve changes only when necessary.
f. Consistent security policy and configuration across the physical/virtual network.
g. Implementation of security technologies that span physical and virtual environments
with a consistent policy management and enforcement framework.
To implement security technologies that span physical and virtual environments with a
consistent policy management and enforcement framework.
h. Firewalls, whether physical or virtual, to isolate groups of VMs from other hosted groups.
i. Design and implementation access from each trust level to physical and virtual
management and security systems.
Cloud service providers should maximize resource utilization and optimize resource allocation to
ensure adequate performance is delivered in line with the promised capacity.
Cloud service consumers should specify performance and resource requirements in line with the
business objectives.
Implementation Guidelines:
Network communications justified by the business should be allowed, encrypted, and require
authorization. Conversely, unjustified network communications should be disallowed.
Implement anti-malware, file integrity monitoring, and logging, and utilize hardware rooted trust
in virtual trusted platform modules (vTPMs).
Implementation Guidelines:
Separation of the environments may include:
• Stateful inspection firewalls
• Domain/realm authentication sources
• Clear segregation of duties for personnel accessing these environments as part of their
job duties
Apply sanitization routines on data before loading into non-production, and define environmental
boundaries.
Production workloads should be isolated from the lower environments (e.g., development,
testing) when possible.
Workloads between tenants and business lines should be segmented per the least privilege
concept to reduce the attack surface. In addition, workload tagging, resource names, and
identification should be used for workloads.
Implementation Guidelines:
Secure communication—when migrating physical servers, services, applications, or data to
virtualized environments—could use a combination of confidentiality, integrity, authentication,
source authentication, authorization, and non-repudiation.
Only up-to-date versions for these protocols should be used (deprecated versions should not be
used). Furthermore, only a secure port (e.g., 443) should be used.
Implementation Guidelines:
Vulnerabilities in a physical environment also apply in a virtual environment. Configuration flaws/
vulnerabilities in the applications, firewalls, or networks will be vulnerable to exploits. Defense-in-
depth techniques should be leveraged for both physical, logical, and administrative, etc., controls.
Implementation Guidelines:
The policies and procedures should include considerations regarding:
a. The purpose, scope, roles, responsibilities, and coordination among organizational
entities and training.
b. How are incidents handled during a security incident?
c. What information should be logged and monitored, and for how long?
d. Who is notified in the event of an incident?
Logging and monitoring policies and procedures should capture the following events:
e. Individual user accesses to systems.
f. Actions taken by any individual with root or administrative privileges.
g. Access to all audit logs should be restricted based on need-to-know and least privilege
principles.
h. Invalid access attempts.
i. Changes, additions, or deletions to accounts with root or administrative privileges.
j. Use of and changes to identification and authentication mechanisms, including elevation
of privilege.
k. Initializing, stopping, or pausing of the audit logs.
l. Creation and deletion of system-level objects.
Implementation Guidelines:
Log protection methodology should be applied in adherence to any applicable legal, statutory or
regulatory compliance obligations. In the absence of those requirements, they should adhere to
any standards established as appropriate for the business.
Implementation Guidelines:
Audit logs should track access to aid upon detection of suspicious activity and contain sufficient
data to support investigative needs for security breaches.
Access to all audit logs should be restricted based on need-to-know and least privilege principles.
Additionally, monitor all relevant actions taken. In the case of unintended or unauthorized actions,
alerts should occur.
Implementation Guidelines:
Failure response capabilities should be in place. Also, consider infrastructure layers (e.g., network,
container orchestration, hypervisor, endpoint, control plane, and data plane).
Potential implementation guidance can be derived from the NIST Internet Time Servers overview
(see https://tf.nist.gov/tf-cgi/servers.cgi).
Implementation Guidelines:
Examples of events that should be logged include:
a. Successful and unsuccessful account login events
b. Account management events
c. Object access
d. Policy change
e. Privilege functions
f. Process tracking and system events
g. All administrator activity
h. Authentication checks
i. Authorization checks
j. Data deletions
k. Data access
l. Data changes
m. Permission changes
Implementation Guidelines:
Access to audit records should be granted based on a least-privilege basis and only to authorized
individuals. Changes to logs, including deletions, should be tracked and approved by authorized
individuals. Logs should be backed up per organizational policies.
Implementation Guidelines:
Compliance breaches and deviations from standard operations should be reported as defined in
the organization’s incident management process (as outlined in SEF-01). In addition, file-integrity
monitoring or change-detection software should be used to prevent changes in existing log data.
Implementation Guidelines:
Logging of key lifecycle events should include but are not limited to the following events: key
generation, key usage, key storage (including backup), and archiving and key deletion. In addition,
only authorized personnel should have access to key materials, and all access attempts should be
logged and reviewed.
Document and implement all key-management processes and procedures for cryptographic keys,
including:
a. Generation of strong cryptographic keys
b. Secure cryptographic key distribution
c. Secure cryptographic key storage
d. Key revocation after expiry
e. Split knowledge and dual control as needed for manual key management operations
f. Prevention of unauthorized substitution of cryptographic keys
Implementation Guidelines:
The organization should monitor and log all physical access via the following means:
a. Verifying physical access of individuals when they enter secure areas.
b. Maintaining physical access logs for the facilities
c. Escorting visitors at all times.
d. Reviewing access control logs regularly.
The organization should use either video cameras or access control mechanisms (or both) to
monitor individual physical access to sensitive areas. Review collected data, correlate with other
entries, and store the data for at least three months (unless otherwise restricted by law.)
The organization should implement physical and/or logical controls to restrict access to publicly
accessible network jacks. For example, limit physical access to wireless access points, gateways,
handheld devices, networking/communications hardware, and telecommunication lines.
The organization should develop procedures to distinguish between onsite personnel and visitors
with an emphasis on the following considerations:
e. Identifying onsite personnel and visitors (for example, assigning badges)
f. Changing access requirements
g. Revoking or terminating onsite personnel and expired visitor identification
The organization should develop procedures to control physical access for onsite personnel to
sensitive areas as follows:
h. Access should be authorized and based on individual job functions.
i. Access should be revoked immediately upon termination. Furthermore, all physical
access mechanisms, such as keys, access cards, etc., should be returned or disabled.
Organizations should implement a process for the timely detection and reporting of failures of
critical security control systems, such as (but limited to):
a. Firewalls
b. Intrusion detection systems (IDS)/intrusion prevention systems (IPS)
c. File integrity monitoring (FIM)
d. Anti-virus
e. Physical access controls
f. Logical access controls
g. Audit logging mechanisms
Implementation Guidelines:
Management-approved policies and procedures for organizations and personnel who manage
incidents should incorporate clearly defined roles and responsibilities—including guidelines on
managing the “chain of custody” for forensic evidence collected from affected systems, devices,
cloud services, applications, and personnel. These policies, procedures, and supporting systems
should result in legally admissible evidence.
Policies should require establishing a core, qualified, and standing incident response team that
holds the capability to assess, respond, learn, and communicate appropriately.
Appropriate reporting standards and procedures shall include lessons learned and key
performance indicators (KPIs), which should be defined and implemented for incident response
processes and training.
Appropriate information should be shared with affected third parties (including customers)
promptly.
Implementation Guidelines:
Policies and procedures should address personnel involved in the entire incident and event
management lifecycle— which includes prevention, identification, investigation, and resolution—
as well as periodic training for this personnel.
Implementation Guidelines:
Incident response plans should provide a roadmap for handling incidents involving the
organization’s cloud services and the products and services upon which those services rely. These
plans should apply whether those dependencies are internal (such as IT, operations, support, and
legal) or external (suppliers, vendors, partners, customers, and other third parties).
Implementation Guidelines:
Periodically test, update, and verify the effectiveness of incident response plans using various
event scenarios. For critical operations, plans should be tested at least annually. Test results
should be documented and communicated—with follow-up action plans developed as appropriate.
Incident response plans should be reconciled with the organization’s business continuity and
disaster recovery plans.
Organizations should also test, update, and improve incident response plans after:
a. Significant organizational changes.
b. External supply chain disruptions and natural disasters.
c. Security attacks, particularly those resulting in security breaches.
Implementation Guidelines:
Organizations should define, implement and monitor metrics associated with events and
incidents to detect any weaknesses in the operational processes or technical controls which
support effective incident management. Metrics may quantify:
a. Volume of events and ratio of events to incidents.
b. Incidents by type, product, department, severity, etc.
c. Timeliness of procedural execution for identification, investigation, and resolution.
d. Variances from documented procedures.
Implementation Guidelines:
Processes, procedures, and technical measures should be defined and implemented to support
the investigation and evaluation of security-related events that allow the organization to prioritize
events by severity and impact. The objective for these measures is to prioritize the timely analysis
of event information and rapid engagement of the incident response process.
Accurately and promptly report information security breaches to affected, relevant parties
through predefined communication channels, per applicable legal, statutory, and regulatory
obligations. Clearly describe the event which occurred and its result, and identify any required or
recommended actions for the affected parties. Where applicable, notifications should be sent to
relevant parties in a timely manner.
Implementation Guidelines:
Maintain points of contact by establishing liaisons and preparing them for any investigations
requiring rapid engagement with law enforcement.
Document and update security incident contact information regularly. Additionally, processes
and responsibilities should be documented and maintained for information accuracy that reflects
organizational changes to internal operations and external regulatory environments. Personnel
sending security notifications should use these identified contacts.
Implementation Guidelines:
Cloud service implementations involve a shared security responsibility model (SSRM) between
the CSP and the CSC. Although specific details vary from service to service (e.g., depending on
the cloud service model and the particular implementation), both CSPs and CSCs should have
organizational policies and procedures that delineate how the SSRM should be documented,
implemented, managed, communicated, enforced, and audited.
Implementation Guidelines:
The SSRM explicitly details each specific service based on the cloud service model and
implementation specifics. Accordingly, each party in the supply chain should document,
implement and manage their SSRM responsibilities for their specific service. This includes
supporting service providers such as infrastructure as a service (IaaS) providers engaged by
primary software as a service (SaaS) CSPs and specialized CSPs (e.g., IDaaS, CASB, DDOS/CDN/
DNS services) employed by the CSP and/or the CSC.
Implementation Guidelines:
Shared security responsibility model guidance should include references describing SSRM
applicability throughout the supply chain.
Any CSP control responses should identify control applicability and ownership for their specific
service.
a. Cloud service provider-owned: CSP is fully responsible.
b. Cloud service customer-owned: CSC is fully responsible.
c. Third-party outsourced: The CSP has fully outsourced this control to a third party (e.g.,
a supporting CSP), but the CSP is fully accountable to the CSC for the third party’s
performance from a supply chain perspective.
d. Shared CSP and CSC: Both the CSP and CSC have responsibilities (independent or
dependent). If the CSP has partially outsourced control to a third party, that should be
noted in the CSP implementation description.
e. Shared CSP and third party: The CSP has partially outsourced control to a third party
(e.g., a supporting CSP). Hence, the CSP and the third party have responsibilities—but
the CSC has no responsibilities. The CSP is fully accountable to the CSC for the third
party’s performance from a supply-chain perspective.
f. N/A: Not applicable to this specific cloud service offering (no SSRM responsibilities).
Cloud service providers should also describe the following for each control (as appropriate) for its
service and the specific ownership classification:
g. Cloud service provider implementation description: How the CSP meets (or doesn’t
meet) the controls they are responsible for, wholly or partially. This should explain why
N/A controls are not applicable for the specific service and describe the extent to which
responsibility for particular controls is outsourced to third parties.
h. Cloud service customer responsibilities: A detailed description of CSC security
responsibilities for the controls the customer is responsible for, wholly or partially, with
references and external links (as appropriate).
The CSA’s Consensus Assessments Initiative Questionnaire (CAIQ) should be used by CSPs to
provide SSRM ownership and guidance to current and prospective CSCs. In cases where the CAIQ
has multiple questions associated with a single control, CSPs should delineate SSRM ownership
and describe how they meet their control requirements at the question level, aligned with the
scope of the CSP CAIQ answer.
Implementation Guidelines:
Both the CSP and CSC should implement the finalized SSRM and then thoroughly document and
test it to validate proper operation of security control implementations—including integration
testing where there are interdependencies. Once implemented, both the CSP and CSC should
operate, monitor and audit, and/or assess their service performance according to the finalized
SSRM and remain engaged with their supply chain and customers to understand, implement and
manage SSRM changes over time.
Particular areas that require proactive supply chain SSRM engagement with corresponding levels
of (secure) transparency include:
a. Incident and vulnerability management
b. Change and configuration management
c. Periodic SSRM-aligned audit reviews and security assessments with appropriate risk
management
Implementation Guidelines:
Both the CSP and CSC should develop, manage and maintain a comprehensive inventory
of all supply chain relationships (i.e., third-party product and service providers) involved in
implementing, operating, and securing their respective cloud service implementations. This
process should include assembling, tracking, and maintaining key organizational roles, contracts,
contacts, and risk-related information about each third party in the supply chain regularly (and
when significant changes occur) to facilitate supply chain risk management practices.
Implementation Guidelines:
Service agreement content should include, but is not limited to the following:
a. Scope, characteristics and location of business relationship and services offered: (e.g.,
service level agreements, customer (tenant) data acquisition, exchange and usage
-including data processing restrictions, feature sets and functionality-, personnel and
infrastructure components and supporting services for service delivery and support,
roles and responsibilities of provider and customer (tenant) and any subcontractor or
outsourced business relationships, geographical location of hosted data, backups and
services, and any known regulatory compliance considerations). Refer to STA-08 for CSP
management of supply chain applicability (Relevant control domains include particularly
DSP, BCR, HRS).
b. Information security requirements (including SSRM): provider and customer (tenant)
primary points of contact for the duration of the business relationship, and references
to detailed supporting and relevant business processes, acceptable use policies and
technical measures implemented to enable effectively governance, risk management,
assurance and legal, statutory and regulatory compliance obligations by all impacted
business relationships, including legal obligations of the CSP to allow government access
to customer data. Relevant control domains include particularly DSP, GRM.
c. Change management process: Notification and/or pre-authorization of any changes
controlled by the provider with customer (tenant) impacts.
Implementation Guidelines:
Reviews should include activities to identify non-conformance with contractual requirements and
SLAs for services a CSP provides. If non-conformance issues are identified, the parties involved
should negotiate and remediate the problems.
Implementation Guidelines:
The scope of assessments should include STA-related policies and procedures while validating
adherence to STA controls and SLA requirements. Applicability includes assessing conformance
and effectiveness across the supply chain, including the total cloud service technology stack (as
appropriate). Refer to A&A-02.
Implementation Guidelines:
Reviews should validate alignment with applicable industry standards as well as service and
contract requirements.
Implementation Guidelines:
Assessments should validate alignment with applicable industry standards as well as service and
contract requirements.
Implementation Guidelines:
A policy on threat and vulnerability management (TVM) should be established that includes the
intent, purpose, and governance of how a CSP or CSC should address threats and vulnerabilities
for their respective scope under the SSRM.
Threat and vulnerability management policy should include the ability to address malware as a
specific threat element. This should provide the organization with a guideline to handle malware
using appropriate tools, relevant automation, and operational frameworks to meet their risk
tolerance.
Implementation Guidelines:
An integrated TVM system should be implemented that can maintain records of threats and
vulnerabilities found over time and the result of their mitigation actions. The Integrated TVM
system should be used to mitigate all future risks, by leveraging the previous experiences of the
mitigation activities.
A full remediation schedule should be considered. The schedule should classify and prioritize
vulnerabilities in order of their severity and threat to the environment, aligned to the expectations
of TVM Policy.
Implementation Guidelines:
A rolling schedule of detection, reporting, and mitigation should be established so that all actions
to address threats and non-conformance are performed on time and reported to the integrated
TVM system for monitoring and oversight. In addition, where applicable, implement automation
so that threats and non-conformance are mitigated on time.
Implementation Guidelines:
Where a CSC or a CSP uses third party or open source libraries, these should be tracked, scanned
and reported on in the integrated TVM system. Installed or used packages, libraries and/or
runtimes that are part of their solution with their running version should be included. TVM scans
can be performed automatically and the findings should be promptly reported to the integrated
TVM system. This activity should be monitored to avoid operational gaps.
The organization should leverage global threat intelligence about threat signatures and
vulnerability databases that may contain indicators of attack and compromise. It should also
consider implementing automated & recurring processes so that human errors can be avoided.
Implementation Guidelines:
A formal schedule of red team exercises interspersed with risk assessments, remediation,
and penetration testing aligned to the applicable service model (I-P-SaaS, and XaaS) should be
established. Penetration testing should comply with all applicable laws and regulations.
A written and signed authorization should be obtained and verified before and after services
are rendered. Penetration test schedules should be published on the integrated TVM system to
ensure tactics, techniques, and test procedures adhere to documented policies.
Implementation Guidelines:
The integrated TVM system should track vulnerabilities to closure and report them to build
oversight of residual risks. Furthermore, the system should retain information that can be reused
in future remediation activities.
Implementation Guidelines:
Vulnerabilities should be prioritized in terms of their relative risk, importance, organizational
impact, and urgency. When evaluating impact, consider exposure levels to applicable threats from
the organization’s specific usage and/or implementation. When evaluating importance, consider
the criticality and value of the affected assets. Finally, when assessing urgency, consider the
Common Vulnerability Scoring System (CVSS) ratings and timeframes, the relevance to current
and ongoing threats, and the effort required for remediation.
Implementation Guidelines:
The integrated TVM system should have comprehensive vulnerability tracking capabilities.
Capabilities should include when discoveries were made and remediated, systems impacted,
reasons for the delay (where applicable), and any communications that may have been made to
stakeholders.
Implementation Guidelines:
The integrated TVM system should be used to collect and report metrics about the vulnerability
management program. Metrics should demonstrate the coverage, efficacy, and efficiency of o
perational TVM activities.
Implementation Guidelines:
Policies and procedures for both managed and unmanaged endpoints (including BYOD) should
include the following components:
a. Definition of endpoints and the acceptable-use policy requirements for all endpoints
(mobile devices, virtual, desktop, etc.). Note: Physical and virtual servers, containers,
and similar “endpoints” are addressed in the DCS and IVS domains, while application and
interface “endpoints” are discussed in the AIS domain.
b. List the approved systems, servers, applications, application stores, application
extensions, and plugins that may be allowed for managed endpoint access and usage
and/or enforced through enterprise management tools.
c. Policy and procedures related to installing non-approved applications or approved
applications not obtained through a pre-identified application store.
d. Prohibit the circumvention of vendor-supported and integrated (built-in) security controls
on endpoints (i.e., jailbreaking or rooting). Enforce these restrictions through detective
and preventive controls on the endpoint, managed through a centralized system (e.g., an
endpoint, system configuration control, or mobile device management system).
e. Policies regarding privacy expectations and requirements for remote location
identification, litigation, e-discovery, and legal holds (especially for personally-owned
devices).
f. Policies and procedures related to non-company data loss if a full or partial wipe of a
device is required.
g. Performing policy reviews at planned intervals or upon significant organizational or
environmental changes.
Policies and procedures should also integrate the following concepts (which may have applicable
controls in other domains to consider):
h. Passcodes, biometric authentication, idle/no-use screen locks, and logouts.
i. The use of anti-malware software.
j. The use of encryption for the entire device or data identified as non-public on all
endpoints (enforced through technology controls).
k. Each endpoint device should be assigned to a named person who is responsible for it.
Such devices may be shared (e.g., in shared work areas), but a single individual should
still be assigned responsibility for it.
l. Non-device endpoints should also have “owners” responsible for assessing risks and
ensuring appropriate controls.
m. Endpoints should be vetted for policy compliance before being provisioned for
organizational use.
Implementation Guidelines:
For managed endpoints, universally enforce policies through one or more centralized
configuration management tools.
Use risk assessment to determine what (if any) information or systems may be accessed or
stored using unmanaged endpoints.
Implementation Guidelines:
The company should have a documented application validation process to test for compatibility
issues regarding mobile devices, operating systems, and applications.
Misconfigured endpoints will not only impact operations but will also introduce attack vectors.
Poor configuration settings could involve open ports, outdated exceptions, insecure protocols
allowed, etc. Any configuration changes once in production should follow change management
guidelines (why, what, how) and require appropriate approvals.
Implementation Guidelines:
All organizational endpoint systems should be identified and protected. In addition, a policy
against the inventory should be established and documented (including scan type, number of
scans, schedule, and exceptions/exclusions).
An inventory of all mobile devices used to store and access company data should be kept
and maintained. Include all device status changes (i.e., operating system, patch levels, lost/
decommissioned status, and to whom the device is assigned or approved for usage [BYOD]) in
the inventory.
A documented list of approved application stores should be defined as acceptable for mobile
devices accessing or storing provider-managed data.
Implementation Guidelines:
For managed endpoints, universal policy enforcement through one or more centralized
configuration management tools is essential. Note: “Universal” enforcement is not necessarily
“unified.” Some vendors claim to offer “unified endpoint management” systems, but none are
truly capable of managing all security features of all endpoint types.
For unmanaged endpoints, guidance should be provided but will not be enforced (by definition).
Based on risk assessment, different configurations may be acceptable for systems access and/
or information storage—resulting in various degrees of end-points management with different
access requirements. These may include using container technology for sensitive data isolation.
For example, an organization that prohibits using electronic mail for sensitive information may
determine that access to company electronic mail using a personally-owned device requires only
limited controls (such as an acceptable passcode, a lock screen, reasonably up-to-date software,
and no circumvention of vendor security controls [such as jailbreaking or rooting]).
Implementation Guidelines:
The organization should implement this requirement through technical controls for all interactive-
use endpoints.
Fallback procedures and responsibilities should be defined and implemented, including guidelines
for aborting and recovering from unsuccessful changes and unforeseen events.
Implementation Guidelines:
To minimize data leak risks and protect data stored on the endpoint device, use encryption.
Encryption capabilities could be part of common endpoint solutions such as DLP, endpoint
firewalls, and PAM. Additionally, they could be standalone (e.g., device container technology, file
encryption, and full-disk encryption). The encryption strength should be based on the sensitivity
of the data being protected.
Endpoint device policies should use encryption for the entire device or data identified as sensitive
on all mobile devices (potentially using container technology). This policy should be enforced
through technology controls.
Implementation Guidelines:
Organizations should consider the following:
a. Managed endpoints should be protected through anti-malware software, security
awareness, appropriate system access, and change management controls.
b. Organizations should have formal policies and technologies implemented to install and
upgrade protective measures promptly. These measures include installing and regularly
updating anti-malware software and virus definitions (automatically) and whenever
updates are available. Additionally, organizations should periodically review and scan
installed software and system data content to identify and remove unauthorized
software (when possible).
Implementation Guidelines:
All managed endpoints should properly configure endpoint firewalls to inspect traffic, apply rules,
and perform behavioral monitoring. These firewalls will protect the endpoint from malware and
attacks originating from inside or outside the corporate network. For example, a web application
firewall (WAF) should be used to protect web services from malicious attacks (e.g., structured
query language (SQL) injection).
The DLP solution should monitor and control the data flow. Furthermore, any anomalies that
exceed normal traffic patterns should be noted, and appropriate action should be taken to
address them.
The DLP solution should also be used to monitor for sensitive information (e.g., personally
identifiable information), keywords, and metadata in order to discover unauthorized attempts
for their disclosure across network boundaries and block such transfers by alerting information
security personnel.
The organization should configure the DLP solution to enforce ACLs even when data is copied off
a server.
Implementation Guidelines:
Remote management controls—such as remote data wipe, anti-tampering, and geotracking—
should be implemented around endpoint devices to protect if a device is lost or stolen.
All mobile devices (permitted through the company BYOD program or a company-assigned
mobile device) should allow for remote wipe by the company’s corporate IT—or have all company-
provided data wiped by its corporate IT.
Implementation Guidelines:
Define, implement and evaluate processes, procedures, and technical measures to enable the
deletion of company data remotely on managed endpoint devices, such as when a device is lost
or stolen. Only rarely should the network administrator or device owner issue the remote wipe
command since it is potentially destructive and removes all content until the device returns to its
factory state.
Additionally, the organization should have a screening process for contractors and third-party
users. When organizations provide contractors, the contract should specify the organization’s
responsibilities for screening and relevant notification procedures if screening has not been
completed (or if the results cause doubts or concerns). Similarly, third-party agreements should
specify all responsibilities and notification procedures for screening.
Third-party providers should notify a designated individual or role (e.g., a member of the
contracting or supply chain function) of any personnel transfers or terminations of third-party
personnel who possess organizational credentials, badges, or have information system privileges.
Mutually agreed-upon provisions and/or terms should be established to satisfy customer (tenant)
requirements for service-to-service application (API), information processing interoperability,
portability for application development and information exchange, usage, and integrity persistence.
Confidentiality
Property that information is not made
available or disclosed to unauthorized
individuals, entities, or processes.
Web application
Application software that runs on a web
server, unlike computer-based software
programs that are stored locally on the
Operating System (OS) of the device.