-
Encryption and Key
Management
-
Hashing
-
Masking
-
Tokenization
-
Data Loss Prevention
(DLP)
-
Data
Obfuscation
-
Data De-identification (e.g.,
anonymization)
-
Mapping
-
Labelling
-
Sensitive data (e.g.,
Protected Health Information (PHI), Personally Identifiable Information (PII),
card holder data)
-
Plan and Implement Data
Retention, Deletion and Archiving Policies
-
Data Retention
Policies
-
Data Deletion Procedures and
Mechanisms
-
Data Archiving Procedures and
Mechanisms
-
Legal Hold
-
Design and Implement
Auditability, Traceability and Accountability of Data Events
-
Definition of Event Sources
and Requirement of Identity Attribution
-
Logging, Storage and
Analysis of Data Events
-
Chain of Custody and
Non-repudiation
-
Comprehend Cloud
Infrastructure Components
-
Design a Secure Data
Center
-
Logical Design (e.g.,
tenant partitioning, access control)
-
Physical Design (e.g.
location, buy or build)
-
Environmental Design (e.g.,
Heating, Ventilation and Air Conditioning (HVAC), multi-vendor pathway
connectivity)
-
Analyze Risks Associated with
Cloud Infrastructure
-
Design and Plan Security
Controls
-
Plan Disaster Recovery (DR)
and Business Continuity (BC)
-
Physical
Environment
-
Network and
Communications
-
Compute
-
Virtualization
-
Storage
-
Management
Plane
-
Risk Assessment and
Analysis
-
Cloud Vulnerabilities,
Threats and Attacks
-
Virtualization
Risks
-
Counter-measure
Strategies
-
Physical and Environmental
Protection (e.g., on-premise)
-
System and Communication
Protection
-
Virtualization Systems
Protection
-
Identification,
Authentication and Authorization in Cloud Infrastructure
-
Audit Mechanisms (e.g., log
collection, packet capture)
-
Risks Related to the Cloud
Environment
-
Business Requirements (e.g.,
Recovery Time Objective (RTO), Recovery Point Objective (RPO), Recovery
Service Level (RSL))
-
Business Continuity/Disaster
Recovery Strategy
-
Creation, Implementation and
Testing of Plan
-
Advocate Training and
Awareness for Application Security
-
Describe the Secure Software
Development Life Cycle (SDLC) Process
-
Business
Requirements
-
Phases and
Methodologies
-
Apply the Secure Software
Development Life Cycle (SDLC)
-
Apply Cloud Software
Assurance and Validation
-
Use Verified Secure
Software
-
Approved Application
Programming Interfaces (API)
-
Supply-chain
Management
-
Third Party Software
Management
-
Validated Open Source
Software
-
Avoid Common
Vulnerabilities During Development
-
Cloud-specific
Risks
-
Quality
Assurance
-
Threat
Modelling
-
Software Configuration
Management and Versioning
-
Comprehend the Specifics of
Cloud Application Architecture
-
Supplemental Security
components (e.g., Web Application Firewall (WAF), Database Activity
Monitoring
-
(DAM), Extensible Markup
Language (XML) firewalls, Application Programming Interface (API)
gateway)
-
Design Appropriate Identity
and Access Management (IAM) Solutions
-
Implement and Build Physical
and Logical Infrastructure for Cloud Environment
-
Hardware Specific Security
Configuration Requirements (e.g., Basic Input Output System (BIOS), settings
for virtualization and Trusted Platform Module (TPM), storage controllers,
network controllers)
-
Installation and
Configuration of Virtualization Management Tools
-
Virtual Hardware Specific
Security Configuration Requirements (e.g., network, storage, memory, Central
Processing Unit (CPU)
-
Installation of Guest
Operating System (OS) Virtualization Toolsets
-
Operate Physical and Logical
Infrastructure for Cloud Environment
-
Manage Physical and Logical
Infrastructure for Cloud Environment
-
Access Controls for Remote
Access (e.g., Remote Desktop Protocol (RDP), Secure Terminal Access, Secure
Shell (SSH))
-
Operating System (OS)
Baseline Compliance
-
Monitoring and
Remediation
-
Patch
Management
-
Performance and Capacity
Monitoring (e.g., network, compute, storage, response time)
-
Hardware Monitoring (e.g.,
Disk, Central Processing Unit (CPU), fan speed, temperature)
-
Configuration of Host and
Guest Operating System (OS) Backup and Restore Functions
-
Network Security Controls
(e.g., firewalls, Intrusion Detection Systems (IDS), Intrusion Prevention
Systems (IPS), honeypots, vulnerability assessments, network security
groups)
-
Management Plane (e.g.,
scheduling, orchestration, maintenance)
-
Configure Access Control for
Local and Remote Access (e.g., Secure Keyboard Video Mouse (KVM),
console-based access mechanisms, Remote Desktop Protocol
(RDP))
-
Secure Network Configuration
(e.g., Virtual Local Area Networks (VLAN), Transport Layer Security (TLS),
Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS), Virtual
Private Network (VPN))
-
Operating System (OS)
Hardening Through the Application of Baselines (e.g., Windows, Linux,
VMware)
-
Availability of Stand-Alone
Hosts
-
Availability of Clustered
Hosts (e.g., Distributed Resource Scheduling (DRS), Dynamic
-
Optimization (DO), storage
clusters, maintenance mode, High Availability)
-
Availability of Guest
Operating System (OS)
-
Change
Management
-
Continuity
Management
-
Information Security
Management
-
Continual Service Improvement
Management
-
Incident
Management
-
Problem
Management
-
Release
Management
-
Deployment
Management
-
Configuration
Management
-
Service level
Management
-
Availability
Management
-
Capacity
Management
-
Vendors
-
Customers
-
Partners
-
Regulators
-
Other
Stakeholders
-
Implement Operational
Controls and Standards (e.g., Information Technology
-
Infrastructure Library
(ITIL), International Organization for
Standardization/International
-
Electrotechnical Commission
(ISO/IEC) 20000-1)
-
Support Digital
Forensics
-
Manage Communication with
Relevant Parties
-
Manage Security
Operations
-
Security Operations Center
(SOC)
-
Monitoring of Security
Controls (e.g., firewalls, Intrusion Detection Systems
(IDS),
-
Intrusion Prevention
Systems (IPS), honeypots, vulnerability assessments, network security
groups)
-
Log Capture and Analysis
(e.g., Security Information and Event Management (SIEM), log
management)
-
Incident
Management
-
Articulate Legal Requirements
and Unique Risks within the Cloud Environment
-
Understand Privacy
Issues
-
Difference Between
Contractual and Regulated Private Data (e.g., Protected Health Information
(PHI), Personally Identifiable Information (PII))
-
Country-Specific
Legislation Related to Private Data (e.g., Protected Health Information
(PHI), Personally Identifiable Information (PII))
-
Jurisdictional Differences
in Data Privacy
-
Standard Privacy
Requirements (e.g., International Organization for
Standardization/International Electrotechnical Commission (ISO/IEC) 27018,
Generally Accepted Privacy Principles (GAPP), General Data Protection
Regulation (GDPR))
-
Understand Audit Process,
Methodologies, and Required Adaptations for a Cloud
Environment
-
Conflicting International
Legislation
-
Evaluation of Legal Risks
Specific to Cloud Computing
-
Legal Framework and
Guidelines
-
eDiscovery (e.g.,
International Organization for Standardization/International Electrotechnical
Commission (ISO/IEC) 27050, Cloud Security Alliance (CSA)
Guidance)
-
Forensics
Requirements
-
Internal and External Audit
Controls
-
Impact of Audit
Requirements
-
Identify Assurance Challenges
of Virtualization and Cloud
-
Types of Audit Reports (e.g.,
Statement on Standards for Attestation Engagements (SSAE), Service
Organization Control (SOC), International Standard on Assurance Engagement
(ISAE))
-
Restrictions of Audit Scope
Statements (e.g., Statement on Standards for Attestation Engagements (SSAE),
International Standard on Assurance Engagements (ISAE))
-
Gap Analysis
-
Audit
Planning
-
Internal Information Security
Management System (ISMS)
-
Internal Information Security
Controls System
-
Policies (e.g.,
organizational, functional, cloud computing)
-
Identification and
Involvement of Relevant Stakeholders
-
Specialized Compliance
Requirements for Highly-Regulated Industries (e.g., North American Electric
Reliability Corporation/ Critical Infrastructure Protection (NERC/CIP), Health
Insurance Portability and Accountability Act (HIPAA), Payment Card Industry
(PCI))
-
Impact of Distributed
Information Technology (IT) Model (e.g., diverse geographical locations and
crossing over legal jurisdictions)
-
Understand Implications of
Cloud to Enterprise Risk Management
-
Understand Outsourcing and
Cloud Contract Design
-
Business Requirements
(e.g., Service Level Agreement (SLA), Master Service Agreement (MSA),
Statement of Work (SOW))
-
Vendor
Management
-
Contract Management (e.g.,
right to audit, metrics, definitions, termination, litigation, assurance,
compliance, access to cloud/data, cyber risk insurance)
-
Supply-Chain Management
(e.g., International Organization for Standardization/International
Electrotechnical Commission (ISO/IEC)
27036)