The process of assessing the value of information to the business and assigning it to different levels such as (protected, public, top secret) based on the impact to the business should the data be obtained by unauthorized individuals.
Cloud Controls Matrix (CCM) Data
Physical | Network | Compute | App | Data |
---|---|---|---|---|
False | False | True | True | True |
Corp Gov Relevance |
---|
True |
SaaS | PaaS | IaaS |
---|---|---|
True | True | True |
Service Provider | Tenant / Consumer |
---|---|
True | True |
COBIT 4.1 | HIPAA / HITECH Act | ISO/IEC 27001-2005 |
---|---|---|
PO 2.3 | A.7.2.1 |
NIST SP800-53 R3 | FedRAMP (Final 2012) Low Impact | FedRAMP (Final 2012) Moderate Impact | PCI DSS v2.0 |
---|---|---|---|
RA-2 | NIST SP 800-53 R3 RA-2 | NIST SP 800-53 R3 RA-2 | 9.7.1 |
BITS Shared Assessments SIG v6.0 | BITS Shared Assessments SIG v5.0 | GAPP (Aug 2009) |
---|---|---|
D.1.3, D.2.2 | 1.2.3 |
Jericho Forum | NERC CIP |
---|---|
Commandment #9 | CIP-003-3 - R4 - R5 |
Consensus Assessments Initiative Questionnaire (CAIQ) Data
COBIT | HIPAA | ISO27001 | SP800_53 |
---|---|---|---|
COBIT 4.1 PO 2.3, DS 11.6 | A.7.2.1 | NIST SP800-53 R3 RA-2 |
FedRAMP | PCI_DSS | BITS | GAPP |
---|---|---|---|
NIST SP800-53 R3 RA-2 | PCI DSS v2.0 9.7.1 | SIG v6.0: D.1.3, D.2.2 | GAPP Ref 1.2.3 |
SaaS | PaaS | IaaS |
---|---|---|
True | True | True |
SP | CUST |
---|---|
True | True |