The process for ensuring that an employee exit procedure minimizing the risk of an ex employee misusing information assets after their term of employment. The process normally includes access removal to electronic accounts, turn off VPN or external email services, etc.
Cloud Controls Matrix (CCM) Data
Physical | Network | Compute | App | Data |
---|---|---|---|---|
True | True | True | True | True |
Corp Gov Relevance |
---|
True |
SaaS | PaaS | IaaS |
---|---|---|
True | True | True |
Service Provider | Tenant / Consumer |
---|---|
True | True |
COBIT 4.1 | HIPAA / HITECH Act | ISO/IEC 27001-2005 |
---|---|---|
45 CFR 164.308 (a)(3)(ii)(C) | A.7.1.1 |
NIST SP800-53 R3 | FedRAMP (Final 2012) Low Impact | FedRAMP (Final 2012) Moderate Impact | PCI DSS v2.0 |
---|---|---|---|
PS-4 | NIST SP 800-53 R3 PS-4 | NIST SP 800-53 R3 PS-4 |
BITS Shared Assessments SIG v6.0 | BITS Shared Assessments SIG v5.0 | GAPP (Aug 2009) |
---|---|---|
E.6.4 | D.1 | 5.2.3 |
Jericho Forum | NERC CIP |
---|---|
Consensus Assessments Initiative Questionnaire (CAIQ) Data
COBIT | HIPAA | ISO27001 | SP800_53 |
---|---|---|---|
45 CFR 164.308 (a)(3)(ii)(C) | A.7.1.1 | NIST SP800-53 R3 PS-4 |
FedRAMP | PCI_DSS | BITS | GAPP |
---|---|---|---|
NIST SP800-53 R3 PS-4 | AUP v5.0 D.1 SIG v6.0: E.6.4 | GAPP Ref 5.2.3 |
SaaS | PaaS | IaaS |
---|---|---|
True | True | True |
SP | CUST |
---|---|
True | True |