Essential Cybersecurity Controls (ECC – 2 : 2024) 4-2-3 Requirement:
- In line with related and applicable laws and regulations, and in addition to the applicable ECC controls from main domains (1), (2), (3) and subdomain (4-1), the cybersecurity requirements related to the use of hosting and cloud computing services must include at least the following:
- Classification of data prior to hosting on cloud or hosting services and returning data (in a usable format) upon service completion.
- Separation of organization’s environments (specifically virtual servers) from other environments hosted at the cloud service provider.
Quick & Simple
Discover Our Cybersecurity Compliance Solutions:
Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you