Essential Cybersecurity Controls (ECC – 2 : 2024) - 4-2-1
Cybersecurity Requirements Related To The Use Of Hosting And Cloud Computing Services Must Be
Defined, Documented And Approved.
Essential Cybersecurity Controls (ECC – 2 : 2024) - 4-2-2
The Cybersecurity Requirements Related To The Use Of Hosting And Cloud Computing Services Must Be
Implemented.
Essential Cybersecurity Controls (ECC – 2 : 2024) - 4-2-3
- In line with related and applicable laws and regulations, and in addition to the applicable ECC controls from main domains (1), (2), (3) and subdomain (4-1), the cybersecurity requirements related to the use of hosting and cloud computing services must include at least the following:
- Classification of data prior to hosting on cloud or hosting services and returning data (in a usable format) upon service completion.
- Separation of organization’s environments (specifically virtual servers) from other environments hosted at the cloud service provider.
Essential Cybersecurity Controls (ECC – 2 : 2024) - 4-2-4
The Cybersecurity Requirements Related To The Use Of Hosting And Cloud Computing Services Must
Be Reviewed Periodically.