Essential Cybersecurity Controls (ECC – 2 : 2024) - 4-2-1

Cybersecurity Requirements Related To The Use Of Hosting And Cloud Computing Services Must Be Defined, Documented And Approved.

Essential Cybersecurity Controls (ECC – 2 : 2024) - 4-2-2

The Cybersecurity Requirements Related To The Use Of Hosting And Cloud Computing Services Must Be Implemented.

Essential Cybersecurity Controls (ECC – 2 : 2024) - 4-2-3

  1. In line with related and applicable laws and regulations, and in addition to the applicable ECC controls from main domains (1), (2), (3) and subdomain (4-1), the cybersecurity requirements related to the use of hosting and cloud computing services must include at least the following:
    1. Classification of data prior to hosting on cloud or hosting services and returning data (in a usable format) upon service completion.
    2. Separation of organization’s environments (specifically virtual servers) from other environments hosted at the cloud service provider.

Essential Cybersecurity Controls (ECC – 2 : 2024) - 4-2-4

The Cybersecurity Requirements Related To The Use Of Hosting And Cloud Computing Services Must Be Reviewed Periodically.