Background verification for personnel, contractors, and third-parties must be in place and should be proportional to the data classification to be accessed, pursuant to local laws, regulations, and ethics.
Cloud Controls Matrix (CCM) Data
Physical | Network | Compute | App | Data |
---|---|---|---|---|
False | False | False | False | True |
Corp Gov Relevance |
---|
True |
SaaS | PaaS | IaaS |
---|---|---|
True | True | True |
Service Provider | Tenant / Consumer |
---|---|
True | True |
COBIT 4.1 | HIPAA / HITECH Act | ISO/IEC 27001-2005 |
---|---|---|
PO 7.6 | A.8.1.2 |
NIST SP800-53 R3 | FedRAMP (Final 2012) Low Impact | FedRAMP (Final 2012) Moderate Impact | PCI DSS v2.0 |
---|---|---|---|
PS-2 | NIST SP 800-53 R3 PS-2 | NIST SP 800-53 R3 PS-2 | 12.7 |
BITS Shared Assessments SIG v6.0 | BITS Shared Assessments SIG v5.0 | GAPP (Aug 2009) |
---|---|---|
E.2 | E.2 | 1.2.9 |
Jericho Forum | NERC CIP |
---|---|
Commandment #2 | CIP-004-3 - R2.2 |
Consensus Assessments Initiative Questionnaire (CAIQ) Data
COBIT | HIPAA | ISO27001 | SP800_53 |
---|---|---|---|
COBIT 4.1 PO 7.6 | A.8.1.2 | NIST SP800-53 R3 PS-2 |
FedRAMP | PCI_DSS | BITS | GAPP |
---|---|---|---|
NIST SP800-53 R3 PS-2 | PCI DSS v2.0 12.7 | AUP v5.0 E.2 SIG v6.0: E.2 | GAPP Ref 1.2.9 |
SaaS | PaaS | IaaS |
---|---|---|
True | True | True |
SP | CUST |
---|---|
True | True |