2025版云控制矩陣 4.0(中英版)_第1頁
2025版云控制矩陣 4.0(中英版)_第2頁
2025版云控制矩陣 4.0(中英版)_第3頁
2025版云控制矩陣 4.0(中英版)_第4頁
2025版云控制矩陣 4.0(中英版)_第5頁
已閱讀5頁,還剩11頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領

文檔簡介

2024云控制矩陣4.0(中英版 Audit&Assurance-A&A審計&AuditandAssurancePolicyandEstablish,document,approve,communicate,apply,evaluateandmaintainauditandassurancepoliciesandproceduresandstandards.Reviewandupdatethepoliciesandproceduresatleastannually.ConductindependentauditandassuranceassessmentsaccordingtorelevantstandardsatleastRiskBasedPlanningPerformindependentauditandassuranceassessmentsaccordingtorisk-basedplansandDefineandimplementanAuditManagementprocesstosupportauditplanning,riskanalysis,securitycontrolassessment,conclusion,remediationschedules,reportgeneration,andreviewofpastreportsandsupportingevidence.Establish,document,approve,communicate,apply,evaluateandmaintainarisk-basedcorrectiveactionplantoremediateauditfindings,reviewandreportremediationstatustorelevantstakeholders.ApplicationandInterfaceSecurityPolicyandEstablish,document,approve,communicate,apply,evaluateandmaintainpoliciesandproceduresforapplicationsecuritytoprovideguidancetotheappropriateplanning,deliveryandsupportoftheorganization'sapplicationsecuritycapabilities.Reviewandupdatethepoliciesandproceduresatleastannually.Establish,documentandmaintainbaselinerequirementsforsecuringdifferentDefineandimplementtechnicalandoperationalmetricsinalignmentwithbusinessobjectives,securityrequirements,andcomplianceSecureApplicationDesignandDefineandimplementaSDLCprocessforapplicationdesign,development,deployment,andoperationinaccordancewithsecurityrequirementsdefinedbytheImplementatestingstrategy,includingcriteriaforacceptanceofnewinformationsystems,upgradesandnewversions,whichprovidesapplicationsecurityassuranceandmaintainscompliancewhileenablingorganizationalspeedofdeliverygoals.Automatewhenapplicableandpossible.Establishandimplementstrategiesandcapabilitiesforsecure,standardized,andcompliantapplicationdeployment.AutomatewhereDefineandimplementaprocesstoremediateapplicationsecurityvulnerabilities,automatingremediationwhen-BusinessContinuityManagementPolicyandEstablish,document,approve,communicate,apply,evaluateandmaintainbusinesscontinuitymanagementandoperationalresiliencepoliciesandprocedures.Reviewandupdatethepoliciesandproceduresatleastannually.RiskAssessmentandImpactDeterminetheimpactofbusinessdisruptionsandriskstoestablishcriteriafordevelopingbusinesscontinuityandoperationalresiliencestrategiesandEstablishstrategiestoreducetheimpactof,withstand,andrecoverfrombusinessdisruptionswithinriskEstablish,document,approve,communicate,apply,evaluateandmaintainabusinesscontinuityplanbasedontheresultsoftheoperationalresiliencestrategiesandDevelop,identify,andacquiredocumentationthatisrelevanttosupportthebusinesscontinuityandoperationalresilienceprograms.Makethedocumentationavailabletoauthorizedstakeholdersandreviewperiodically.ExerciseandtestbusinesscontinuityandoperationalresilienceplansatleastannuallyoruponsignificantEstablishcommunicationwithstakeholdersandparticipantsinthecourseofbusinesscontinuityandresiliencePeriodicallybackupdatastoredinthecloud.Ensuretheconfidentiality,integrityandavailabilityofthebackup,andverifydatarestorationfrombackupforDisasterResponseEstablish,document,approve,communicate,apply,evaluateandmaintainadisasterresponseplantorecoverfromnaturalandman-madedisasters.Updatetheplanatleastannuallyoruponsignificantchanges.ResponsePlanExercisethedisasterresponseplanannuallyoruponsignificantchanges,includingifpossiblelocalemergency-Establish,document,approve,communicate,apply,evaluateandmaintainpoliciesandproceduresformanagingtherisksassociatedwithapplyingchangestoorganizationassets,includingapplication,systems,infrastructure,configuration,etc.,regardlessofwhethertheassetsaremanagedinternallyorexternally(i.e.,outsourced).Reviewandupdatethepoliciesandproceduresatleastannually.(即外包)Followadefinedqualitychangecontrol,approvalandtestingprocesswithestablishedbaselines,testing,andreleaseManagetherisksassociatedwithapplyingchangestoorganizationassets,includingapplication,systems,infrastructure,configuration,etc.,regardlessofwhethertheassetsaremanagedinternallyorexternally(i.e.,outsourced).ChangeIncludeprovisionslimitingchangesdirectlyimpactingCSCsownedenvironments/tenantstoexplicitlyauthorizedrequestswithinservicelevelagreementsbetweenCSPsandDetectionofBaselineImplementdetectionmeasureswithproactivenotificationincaseofchangesdeviatingfromtheestablishedImplementaprocedureforthemanagementofexceptions,includingemergencies,inthechangeandconfigurationprocess.AligntheprocedurewiththerequirementsofGRC-04:PolicyExceptionProcess.DefineandimplementaprocesstoproactivelyrollbackchangestoapreviousknowngoodstateincaseoferrorsorsecurityEncryptionandKeyManagementPolicyandEstablish,document,approve,communicate,apply,evaluateandmaintainpoliciesandproceduresforCryptography,EncryptionandKeyManagement.Reviewandupdatethepoliciesandproceduresatleastannually.CEKRolesandDefineandimplementcryptographic,encryptionandkeymanagementrolesandDataProvidecryptographicprotectiontodataat-restandin-transit,usingcryptographiclibrariescertifiedtoapprovedUseencryptionalgorithmsthatareappropriatefordataprotection,consideringtheclassificationofdata,associatedrisks,andusabilityoftheencryptionEstablishastandardchangemanagementprocedure,toaccommodatechangesfrominternalandexternalsources,forreview,approval,implementationandcommunicationofcryptographic,encryptionandkeymanagementtechnologychanges.EncryptionChangeCostBenefitManageandadoptchangestocryptography-,encryption-,andkeymanagement-relatedsystems(includingpoliciesandprocedures)thatfullyaccountfordownstreameffectsofproposedchanges,includingresidualrisk,cost,andbenefitsanalysis.EncryptionRiskEstablishandmaintainanencryptionandkeymanagementriskprogramthatincludesprovisionsforriskassessment,risktreatment,riskcontext,monitoring,andCSCKeyManagementCapabiilityCSPsmustprovidethecapabilityforCSCstomanagetheirowndataencryptionAuditencryptionandkeymanagementsystems,policies,andprocesseswithafrequencythatisproportionaltotheriskexposureofthesystemwithauditoccurringpreferablycontinuouslybutatleastannuallyandafteranysecurityevent(s).KeyGenerateCryptographickeysusingindustryacceptedcryptographiclibrariesspecifyingthealgorithmstrengthandtherandomnumbergeneratorKeyManagecryptographicsecretandprivatekeysthatareprovisionedforauniqueKeyRotatecryptographickeysinaccordancewiththecalculatedcryptoperiod,whichincludesprovisionsforconsideringtheriskofinformationdisclosureandlegalandregulatoryKeyDefine,implementandevaluateprocesses,proceduresandtechnicalmeasurestorevokeandremovecryptographickeyspriortotheendofitsestablishedcryptoperiod,whenakeyiscompromised,oranentityisnolongerpartoftheorganization,whichincludeprovisionsforlegalandregulatoryrequirements.KeyDefine,implementandevaluateprocesses,proceduresandtechnicalmeasurestodestroykeysstoredoutsideasecureenvironmentandrevokekeysstoredinHardwareSecurityModules(HSMs)whentheyarenolongerneeded,whichincludeprovisionsforlegalandregulatoryrequirements.KeyDefine,implementandevaluateprocesses,proceduresandtechnicalmeasurestocreatekeysinapre-activatedstatewhentheyhavebeengeneratedbutnotauthorizedforuse,whichincludeprovisionsforlegalandregulatoryrequirements.KeyDefine,implementandevaluateprocesses,proceduresandtechnicalmeasurestomonitor,reviewandapprovekeytransitionsfromanystateto/fromsuspension,whichincludeprovisionsforlegalandregulatoryrequirements.KeyDefine,implementandevaluateprocesses,proceduresandtechnicalmeasurestodeactivatekeysatthetimeoftheirexpirationdate,whichincludeprovisionsforlegalandregulatoryrequirements.KeyDefine,implementandevaluateprocesses,proceduresandtechnicalmeasurestomanagearchivedkeysinasecurerepositoryrequiringleastprivilegeaccess,whichincludeprovisionsforlegalandregulatoryrequirements.KeyDefine,implementandevaluateprocesses,proceduresandtechnicalmeasurestousecompromisedkeystoencryptinformationonlyincontrolledcircumstance,andthereafterexclusivelyfordecryptingdataandneverforencryptingdata,whichincludeprovisionsforlegalandregulatoryrequirements.KeyDefine,implementandevaluateprocesses,proceduresandtechnicalmeasurestoassesstherisktooperationalcontinuityversustheriskofthekeyingmaterialandtheinformationitprotectsbeingexposedifcontrolofthekeyingmaterialislost,whichincludeprovisionsforlegalandregulatoryrequirements.Define,implementandevaluateprocesses,proceduresandtechnicalmeasuresinorderforthekeymanagementsystemtotrackandreportallcryptographicmaterialsandchangesinstatus,whichincludeprovisionsforlegalandregulatoryrequirements.DatacenterSecurity-DCSOff-SiteEquipmentDisposalPolicyandEstablish,document,approve,communicate,apply,evaluateandmaintainpoliciesandproceduresforthesecuredisposalofequipmentusedoutsidetheorganization'spremises.Iftheequipmentisnotphysicallydestroyedadatadestructionprocedurethatrendersrecoveryofinformationimpossiblemustbeapplied.Reviewandupdatethepoliciesandproceduresatleastannually.Off-SiteTransferAuthorizationPolicyandEstablish,document,approve,communicate,apply,evaluateandmaintainpoliciesandproceduresfortherelocationortransferofhardware,software,ordata/informationtoanoffsiteoralternatelocation.Therelocationortransferrequestrequiresthewrittenorcryptographicallyverifiableauthorization.Reviewandupdatethepoliciesandproceduresatleastannually.SecureAreaPolicyandEstablish,document,approve,communicate,apply,evaluateandmaintainpoliciesandproceduresformaintainingasafeandsecureworkingenvironmentinoffices,rooms,andfacilities.Reviewandupdatethepoliciesandproceduresatleastannually.SecureMediaTransportationPolicyandEstablish,document,approve,communicate,apply,evaluateandmaintainpoliciesandproceduresforthesecuretransportationofphysicalmedia.Reviewandupdatethepoliciesandproceduresatleastannually.AssetsClassifyanddocumentthephysical,andlogicalassets(e.g.,applications)basedontheorganizationalbusinessAssetsCataloguingandCatalogueandtrackallrelevantphysicalandlogicalassetslocatedatalloftheCSP'ssiteswithinasecuredControlledAccessImplementphysicalsecurityperimeterstosafeguardpersonnel,data,andinformationsystems.Establishphysicalsecurityperimetersbetweentheadministrativeandbusinessareasandthedatastorageandprocessingfacilitiesareas.UseequipmentidentificationasamethodforconnectionSecureAreaAllowonlyauthorizedpersonnelaccesstosecureareas,withallingressandegresspointsrestricted,documented,andmonitoredbyphysicalaccesscontrolmechanisms.Retainaccesscontrolrecordsonaperiodicbasisasdeemedappropriatebytheorganization.Implement,maintain,andoperatedatacentersurveillancesystemsattheexternalperimeterandatalltheingressandegresspointstodetectunauthorizedingressandegressTraindatacenterpersonneltorespondtounauthorizedingressoregressDefine,implementandevaluateprocesses,proceduresandtechnicalmeasuresthatensurearisk-basedprotectionofpowerandtelecommunicationcablesfromathreatofinterception,interferenceordamageatallfacilities,officesandrooms.Implementandmaintaindatacenterenvironmentalcontrolsystemsthatmonitor,maintainandtestforcontinualeffectivenessthetemperatureandhumidityconditionswithinacceptedindustrystandards.SecureSecure,monitor,maintain,andtestutilitiesservicesforcontinualeffectivenessatplannedKeepbusiness-criticalequipmentawayfromlocationssubjecttohighprobabilityforenvironmentalriskSecurityandPrivacyPolicyandEstablish,document,approve,communicate,apply,evaluateandmaintainpoliciesandproceduresfortheclassification,protectionandhandlingofdatathroughoutitslifecycle,andaccordingtoallapplicablelawsandregulations,standards,andrisklevel.Reviewandupdatethepoliciesandproceduresatleastannually.SecureApplyindustryacceptedmethodsforthesecuredisposalofdatafromstoragemediasuchthatdataisnotrecoverablebyanyforensicDataCreateandmaintainadatainventory,atleastforanysensitivedataandpersonalDataClassifydataaccordingtoitstypeandsensitivityDataFlowCreatedataflowdocumentationtoidentifywhatdataisprocessed,storedortransmittedwhere.Reviewdataflowdocumentationatdefinedintervals,atleastannually,andafteranychange.DataOwnershipandDocumentownershipandstewardshipofallrelevantdocumentedpersonalandsensitivedata.PerformreviewatleastDataProtectionbyDesignandDevelopsystems,products,andbusinesspracticesbaseduponaprincipleofsecuritybydesignandindustrybestDataPrivacybyDesignandDevelopsystems,products,andbusinesspracticesbaseduponaprincipleofprivacybydesignandindustrybestpractices.Ensurethatsystems'privacysettingsareconfiguredbydefault,accordingtoallapplicablelawsandregulations.DataProtectionImpactConductaDataProtectionImpactAssessment(DPIA)toevaluatetheorigin,nature,particularityandseverityoftherisksupontheprocessingofpersonaldata,accordingtoanyapplicablelaws,regulationsandindustrybestpractices.SensitiveDataDefine,implementandevaluateprocesses,proceduresandtechnicalmeasuresthatensureanytransferofpersonalorsensitivedataisprotectedfromunauthorizedaccessandonlyprocessedwithinscopeaspermittedbytherespectivelawsandregulations.PersonalDataAccess,Reversal,RectificationandDefineandimplement,processes,proceduresandtechnicalmeasurestoenabledatasubjectstorequestaccessto,modification,ordeletionoftheirpersonaldata,accordingtoanyapplicablelawsandregulations.LimitationofPurposeinPersonalDataDefine,implementandevaluateprocesses,proceduresandtechnicalmeasurestoensurethatpersonaldataisprocessedaccordingtoanyapplicablelawsandregulationsandforthepurposesdeclaredtothedatasubject.Define,implementandevaluateprocesses,proceduresandtechnicalmeasuresforthetransferandsub-processingofpersonaldatawithintheservicesupplychain,accordingtoanyapplicablelawsandregulations.DisclosureofDataSub-Define,implementandevaluateprocesses,proceduresandtechnicalmeasurestodisclosethedetailsofanypersonalorsensitivedataaccessbysub-processorstothedataownerpriortoinitiationofthatprocessing.LimitationofProductionDataObtainauthorizationfromdataowners,andmanageassociatedriskbeforereplicatingorusingproductiondatainnon-productionDataRetentionandDataretention,archivinganddeletionismanagedinaccordancewithbusinessrequirements,applicablelawsandDefineandimplement,processes,proceduresandtechnicalmeasurestoprotectsensitivedatathroughoutit'sDisclosureTheCSPmusthaveinplace,anddescribetoCSCstheproceduretomanageandrespondtorequestsfordisclosureofPersonalDatabyLawEnforcementAuthoritiesaccordingtoapplicablelawsandregulations.TheCSPmustgivespecialattentiontothenotificationproceduretointerestedCSCs,unlessotherwiseprohibited,suchasaprohibitionundercriminallawtopreserveconfidentialityofalawenforcementinvestigation.DataDefineandimplement,processes,proceduresandtechnicalmeasurestospecifyanddocumentthephysicallocationsofdata,includinganylocationsinwhichdataisprocessedorbackedup.Governance,RiskandComplianceGRCGovernanceProgramPolicyandEstablish,document,approve,communicate,apply,evaluateandmaintainpoliciesandproceduresforaninformationgovernanceprogram,whichissponsoredbytheleadershipoftheorganization.Reviewandupdatethepoliciesandproceduresatleastannually.RiskManagementEstablishaformal,documented,andleadership-sponsoredEnterpriseRiskManagement(ERM)programthatincludespoliciesandproceduresforidentification,evaluation,ownership,treatment,andacceptanceofcloudsecurityandprivacyrisks.ReviewallrelevantorganizationalpoliciesandassociatedproceduresatleastannuallyorwhenasubstantialchangeoccurswithintheEstablishandfollowanapprovedexceptionprocessasmandatedbythegovernanceprogramwheneveradeviationfromanestablishedpolicyDevelopandimplementanInformationSecurityProgram,whichincludesprogramsforalltherelevantdomainsoftheDefineanddocumentrolesandresponsibilitiesforplanning,implementing,operating,assessing,andimprovinggovernanceSpecialInterestEstablishandmaintaincontactwithcloud-relatedspecialinterestgroupsandotherrelevantentitiesinlinewithbusinessHumanResourcesHRSBackgroundScreeningPolicyandEstablish,document,approve,communicate,apply,evaluateandmaintainpoliciesandproceduresforbackgroundverificationofallnewemployees(includingbutnotlimitedtoremoteemployees,contractors,andthirdparties)accordingtolocallaws,regulations,ethics,andcontractualconstraintsandproportionaltothedataclassificationtobeaccessed,thebusinessrequirements,andacceptablerisk.Reviewandupdatethepoliciesandproceduresatleastannually.AcceptableUseofTechnologyPolicyandEstablish,document,approve,communicate,apply,evaluateandmaintainpoliciesandproceduresfordefiningallowancesandconditionsfortheacceptableuseoforganizationally-ownedormanagedassets.Reviewandupdatethepoliciesandproceduresatleastannually.CleanDeskPolicyandEstablish,document,approve,communicate,apply,evaluateandmaintainpoliciesandproceduresthatrequireunattendedworkspacestonothaveopenlyvisibleconfidentialdata.Reviewandupdatethepoliciesandproceduresatleastannually.RemoteandHomeWorkingPolicyandEstablish,document,approve,communicate,apply,evaluateandmaintainpoliciesandprocedurestoprotectinformationaccessed,processedorstoredatremotesitesandlocations.Reviewandupdatethepoliciesandproceduresatleastannually.AssetEstablishanddocumentproceduresforthereturnoforganization-ownedassetsbyterminatedEstablish,document,andcommunicatetoallpersonneltheproceduresoutliningtherolesandresponsibilitiesconcerningchangesinEmployeessigntheemployeeagreementpriortobeinggrantedaccesstoorganizationalinformationsystems,resourcesandTheorganizationincludeswithintheemploymentagreementsprovisionsand/ortermsforadherencetoestablishedinformationgovernanceandsecurityPersonnelRolesandDocumentandcommunicaterolesandresponsibilitiesofemployees,astheyrelatetoinformationassetsandIdentify,document,andreview,atplannedintervals,requirementsfornon-disclosure/confidentialityagreementsreflectingtheorganization'sneedsfortheprotectionofdataandoperationaldetails.Establish,document,approve,communicate,apply,evaluateandmaintainasecurityawarenesstrainingprogramforallemployeesoftheorganizationandprovideregulartrainingupdates.PersonalandSensitiveDataAwarenessandProvideallemployeeswithaccesstosensitiveorganizationalandpersonaldatawithappropriatesecurityawarenesstrainingandregularupdatesinorganizationalprocedures,processes,andpoliciesrelatingtotheirprofessionalfunctionrelativetotheorganization.ComplianceUserMakeemployeesawareoftheirrolesandresponsibilitiesformaintainingawarenessandcompliancewithestablishedpoliciesandproceduresandapplicablelegal,statutory,orregulatorycomplianceobligations.IdentityandAccessManagementPolicyandEstablish,document,approve,communicate,implement,apply,evaluateandmaintainpoliciesandproceduresforidentityandaccessmanagement.Reviewandupdatethepoliciesandproceduresatleastannually.StrongPasswordPolicyandEstablish,document,approve,communicate,implement,apply,evaluateandmaintainstrongpasswordpoliciesandprocedures.Reviewandupdatethepoliciesandproceduresatleastannually.Manage,store,andreviewtheinformationofsystemidentities,andlevelofSeparationofEmploytheseparationofdutiesprinciplewhenimplementinginformationsystemLeastEmploytheleastprivilegeprinciplewhenimplementinginformationsystemUserAccessDefineandimplementauseraccessprovisioningprocesswhichauthorizes,records,andcommunicatesaccesschangestodataandUserAccessChangesandDe-provisionorrespectivelymodifyaccessofmovers/leaversorsystemidentitychangesinatimelymannerinordertoeffectivelyadoptandcommunicateidentityandaccessmanagementpolicies.UserAccessReviewandrevalidateuseraccessforleastprivilegeandseparationofdutieswithafrequencythatiscommensuratewithorganizationalriskSegregationofPrivilegedAccessDefine,implementandevaluateprocesses,proceduresandtechnicalmeasuresforthesegregationofprivilegedaccessrolessuchthatadministrativeaccesstodata,encryptionandkeymanagementcapabilitiesandloggingcapabilitiesaredistinctandseparated.ManagementofPrivilegedAccessDefineandimplementanaccessprocesstoensureprivilegedaccessrolesandrightsaregrantedforatimelimitedperiod,andimplementprocedurestopreventtheculminationofsegregatedprivilegedaccess.CSCsApprovalforAgreedPrivilegedAccessDefine,implementandevaluateprocessesandproceduresforcustomerstoparticipate,whereapplicable,inthegrantingofaccessforagreed,highrisk(asdefinedbytheorganizationalriskassessment)privilegedaccessroles.SafeguardLogsDefine,implementandevaluateprocesses,proceduresandtechnicalmeasurestoensurethelogginginfrastructureisread-onlyforallwithwriteaccess,includingprivilegedaccessroles,andthattheabilitytodisableitiscontrolledthroughaprocedurethatensuresthesegregationofdutiesandbreakglassprocedures.Define,implementandevaluateprocesses,proceduresandtechnicalmeasuresthatensureusersareidentifiablethroughuniqueIDsorwhichcanassociateindividualstotheusageofuserIDs.StrongDefine,implementandevaluateprocesses,proceduresandtechnicalmeasuresforauthenticatingaccesstosystems,applicationanddataassets,includingmultifactorauthenticationforatleastprivilegeduserandsensitivedataaccess.Adoptdigitalcertificatesoralternativeswhichachieveanequivalentlevelofsecurityforsystemidentities.PasswordsDefine,implementandevaluateprocesses,proceduresandtechnicalmeasuresforthesecuremanagementofDefine,implementandevaluateprocesses,proceduresandtechnicalmeasurestoverifyaccesstodataandsystemfunctionsisInformationprocessingInformation/Dataexchange,usage,portability,integrity,andpersistenceReviewandupdatethepoliciesandproceduresatleastannually.Provideapplicationinterface(s)toCSCssothattheyprogrammaticallyretrievetheirdatatoenableinteroperabilityandImplementcryptographicallysecureandstandardizednetworkprotocolsforthemanagement,importandexportofAgreementsmustincludeprovisionsspecifyingCSCsaccesstodatauponcontractterminationandwillDataLengthoftimethedatawillbeScopeofthedataretainedandmadeavailabletotheDatadeletionInfrastructureandVirtualizationSecurityPolicyandEstablish,document,approve,communicate,apply,evaluateandmaintainpoliciesandproceduresforinfrastructureandvirtualizationsecurity.Reviewandupdatethepoliciesandproceduresatleastannually.CapacityandResourcePlanandmonitortheavailability,quality,andadequatecapacityofresourcesinordertodelivertherequiredsystemperformanceasdeterminedbytheNetworkMonitor,encryptandrestrictcommunicationsbetweenenvironmentstoonlyauthenticatedandauthorizedconnections,asjustifiedbythebusiness.Reviewtheseconfigurationsatleastannually,andsupportthembyadocumentedjustificationofallallowedservices,protocols,ports,andcompensatingcontrols.OSHardeningandBaseHardenhostandguestOS,hypervisororinfrastructurecontrolplaneaccordingtotheirrespectivebestpractices,andsupportedbytechnicalcontrols,aspartofasecurityDesign,develop,deployandconfigureapplicationsandinfrastructuressuchthatCSPandCSC(tenant)useraccessandintra-tenantaccessisappropriatelysegmentedandsegregated,monitoredandrestrictedfromothertenants.MigrationtoCloudUsesecureandencryptedcommunicationchannelswhenmigratingservers,services,applications,ordatatocloudenvironments.Suchchannelsmustincludeonlyup-to-dateandapprovedprotocols.Identifyanddocumenthigh-riskNetworkDefine,implementandevaluateprocesses,proceduresanddefense-in-depthtechniquesforprotection,detection,andtimelyresponsetonetwork-basedLoggingandMonitoring-LOGLoggingandMonitoringPolicyandEstablish,document,approve,communicate,apply,evaluateandmaintainpoliciesandproceduresforloggingandmonitoring.Reviewandupdatethepoliciesandproceduresatleastannually.AuditLogsDefine,implementandevaluateprocesses,proceduresandtechnicalmeasurestoensurethesecurityandretentionofauditIdentifyandmonitorsecurity-relatedeventswithinapplicationsandtheunderlyinginfrastructure.Defineandimplementasystemtogeneratealertstoresponsiblestakeholdersbasedonsucheventsandcorrespondingmetrics.AuditLogsAccessandRestrictauditlogsaccesstoauthorizedpersonnelandmaintainrecordsthatprovideuniqueaccessAuditLogsMonitoringandMonitorsecurityauditlogstodetectactivityoutsideoftypicalorexpectedpatterns.Establishandfollowadefinedprocesstoreviewandtakeappropriateandtimelyactionsondetectedanomalies.ClockUseareliabletimesourceacrossallrelevantinformationprocessingEstablish,documentandimplementwhichinformationmeta/datasystemeventsshouldbelogged.Reviewandupdatethescopeatleastannuallyorwheneverthereisachangeinthethreatenvironment.LogLogTheinformationsystemprotectsauditrecordsfromunauthorizedaccess,modification,andEstablishandmaintainamonitoringandinternalreportingcapabilityovertheoperationsofcryptographic,encryptionandkeymanagementpolicies,processes,procedures,andLogandmonitorkeylifecyclemanagementeventstoenableauditingandreportingonusageofcryptographicAccessControlMonitorandlogphysicalaccessusinganauditableaccesscontrolFailuresandAnomaliesDefine,implementandevaluateprocesses,proceduresandtechnicalmeasuresforthereportingofanomaliesandfailuresofthemonitoringsystemandprovideimmediatenotificationtotheaccountableparty.Establish,document,approve,communicate,apply,evaluateandmaintainpoliciesandproceduresforSecurityIncidentManagement,E-Discovery,andCloudForensics.Reviewandupdatethepoliciesandproceduresatleastannually.Establish,document,approve,communicate,apply,evaluateandmaintainpoliciesandproceduresforthetimelymanagementofsecurityincidents.Reviewandupdatethepoliciesandproceduresatleastannually.,IncidentResponseEstablish,document,approve,communicate,apply,evaluateandmaintainasecurityincidentresponseplan,whichincludesbutisnotlimitedto:relevantinternaldepartments,impactedCSCs,andotherbusinesscriticalrelationships(suchassupply-chain)thatmaybeimpacted.TestandupdateasnecessaryincidentresponseplansatplannedintervalsoruponsignificantorganizationalorenvironmentalchangesforEstablishandmonitorinformationsecurityincidentEventTriageDefine,implementandevaluateprocesses,proceduresandtechnicalmeasuressupportingbusinessprocessestotriagesecurity-relatedDefineandimplement,processes,proceduresandtechnicalmeasuresforsecuritybreachnotifications.Reportsecuritybreachesandassumedsecuritybreachesincludinganyrelevantsupplychainbreaches,asperapplicableSLAs,lawsandregulations.PointsofContactMaintainpointsofcontactforapplicableregulationauthorities,nationalandlocallawenforcement,andotherlegaljurisdictionalSSRMPolicyandEstablish,document,approve,communicate,apply,evaluateandmaintainpoliciesandproceduresfortheapplicationoftheSharedSecurityResponsibilityModel(SSRM)withintheorganization.Reviewandupdatethepoliciesandproceduresatleastannually.Apply,document,implementandmanagetheSSRMthroughoutthesupplychainforthecloudserviceSSRMProvideSSRMGuidancetotheCSCdetailinginformationabouttheSSRMapplicabilitythroughoutthesupplySSRMControlDelineatethesharedownershipandapplicabilityofallCSACCMcontrolsaccordingtotheSSRMforthecloudserviceReviewandvalidateSSRMdocumentationforallcloudservicesofferingstheorganizationSSRMControlImplement,operate,andauditorassesstheportionsoftheSSRMwhichtheorganizationisresponsibleDevel

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
  • 4. 未經權益所有人同意不得將文件中的內容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
  • 6. 下載文件中如有侵權或不適當內容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論