Requirement:
In line with related and applicable laws and regulations, and in addition to the applicable ECC controls from main domains (1), (2), (3) and subdomain (4-1), the cybersecurity requirements related to the use of hosting and cloud computing services must include at least the following:
Sub-Controls:
4-2-3-1:
Requirement:
Classification of data prior to hosting on cloud or hosting services and returning data (in a usable format) upon service completion.
Control Implementation Guidelines:
- Ensure that data is classified before being hosted by cloud computing and hosting service providers, ensuring that such data is handled according to that classification and that such data is returned by the service provider upon the expiry of the contract/service with the organization through the following steps:
- Identify all data to be sent to the cloud computing service provider.
- Classify and label the identified data in line with the data classification and labelling mechanism in the organization and the related laws and regulations.
- Share this data with the cloud service provider for cloud hosting.
- Develop procedures to ensure data is returned by the cloud computing service provider (in a usable format) after the contract/service ends.
Expected Deliverables:
- Cybersecurity policy that covers the requirements of the use of cloud computing and hosting services (e.g., electronic copy or official hard copy).
- Sample of the data list that was classified before hosting it with cloud computing service providers, including but not limited to (a file) showing the data that were classified, prior to sharing with the cloud service provider
- A signed sample of the agreement or contract between the organization and the cloud service provider.
- Approved procedures for data return after the termination of cloud computing services.
- Classification policies and procedures for data to be hosted on computing and hosting services.
- Up to date list of hosted services and their classification
4-2-3-2:
Requirement:
Separation of organization's environments (specifically virtual servers) from other environments hosted at the cloud service provider.
Control Implementation Guidelines:
- Define the organization's environment separation requirements (especially virtual servers) from other entities' environments in cloud computing services.
- Include in the organization's contracts with cloud computing and hosting providers clauses stating that the organization's environment must be separated from other entities' environments in the cloud computing services.
Expected Deliverables:
- Cybersecurity policy that covers the requirements of the use of cloud computing and hosting services (e.g., electronic copy or official hard copy).
- Evidence that outlines the separation of the organization's environment from other entities' environments in cloud computing services (e.g., as an item of the signed contract or having an agreement signed between the service provider and the organization).
- Evidence by the cloud computing service provider that the organization's environment is separated from other entities' environments in cloud computing services.
Quick & Simple
Discover Our Cybersecurity Compliance Solutions:
Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you