Governance Risk & Compliance

The fundamental issues of governance and enterprise risk management in Cloud Computing concern the identification and implementation of the appropriate organizational structures, processes, and controls to maintain effective information security governance, risk management and compliance.

GRC encompasses, integrates and aligns activities such as corporate governance, enterprise risk management and corporate compliance with applicable laws and regulations. Components include compliance management (which assures compliance with all internal information security policies and standards), vendor management (to ensure that service providers and outsourcers adhere to intended and contractual information security policies applying concepts of ownership and custody), audit management (to highlight areas for improvement), IT risk management (to ensure that risk of all types are identified, understood, communicated, and either accepted, remediated, transferred, or avoided), and policy management (to maintain an organizational structure and process that supports the creation, implementation, exception handling and management of policy that represent business requirements), and technical awareness and training (to increase the ability to select and implement effective technical security mechanisms, products, process and tools).

Cloud Controls Matrix (CCM) Data

IS-06 | Information Security | Policy Enforcement

Control Specification +-

A formal disciplinary or sanction policy shall be established for employees who have violated security policies and procedures. Employees shall be made aware of what action might be taken in the event of a violation and stated as such in the policies and procedures.

Architectural Relevance +-

PhysicalNetworkComputeAppData
False False False False False

Corp Gov Relevance +-

Corp Gov Relevance
True

Cloud Service Delivery Model Applicability +-

SaaSPaaSIaaS
True True True

Supplier Relationship +-

Service ProviderTenant / Consumer
True True

Scope Applicability +-

COBIT 4.1HIPAA / HITECH ActISO/IEC 27001-2005

PO 7.7

45 CFR 164.308 (a)(1)(ii)(C)

A.8.2.3

NIST SP800-53 R3FedRAMP (Final 2012) Low ImpactFedRAMP (Final 2012) Moderate ImpactPCI DSS v2.0

PL-4
PS-1
PS-8

NIST SP 800-53 R3 PL-4
NIST SP 800-53 R3 PS-1
NIST SP 800-53 R3 PS-8

NIST SP 800-53 R3 PL-4
NIST SP 800-53 R3 PS-1
NIST SP 800-53 R3 PS-8

BITS Shared Assessments SIG v6.0BITS Shared Assessments SIG v5.0GAPP (Aug 2009)

B.1.5

10.2.4

Jericho ForumNERC CIP

Commandment #6
Commandment #7

Consensus Assessments Initiative Questionnaire (CAIQ) Data

Information Security (IS) | ID #IS-06.1

Is a formal disciplinary or sanction policy established for employees who have violated security policies and procedures?

Compliance Mapping +-

COBITHIPAAISO27001SP800_53

COBIT 4.1 PO 7.7

45 CFR 164.308 (a)(1)(ii)(C)

A.8.2.3

NIST SP800-53 R3 PL-4
NIST SP800-53 R3 PS-1
NIST SP800-53 R3 PS-8

FedRAMPPCI_DSSBITSGAPP

NIST SP800-53 R3 PL-4
NIST SP800-53 R3 PS-1
NIST SP800-53 R3 PS-8

SIG v6.0:B.1.5

GAPP Ref 10.2.4

Model Applicability +-

SaaSPaaSIaaS
True True True

Scope Applicability +-

SPCUST
True True