Security policies are the primary objectives of the security program. Policy management strives to maintain an organization structure and process that supports the creation, implementation, exception handling and management of policy that represent business requirements.
Cloud Controls Matrix (CCM) Data
Physical | Network | Compute | App | Data |
---|---|---|---|---|
False | False | False | False | False |
Corp Gov Relevance |
---|
True |
SaaS | PaaS | IaaS |
---|---|---|
True | True | True |
Service Provider | Tenant / Consumer |
---|---|
True | True |
COBIT 4.1 | HIPAA / HITECH Act | ISO/IEC 27001-2005 |
---|---|---|
DS 5.2 | 45 CFR 164.316 (b)(2)(iii) | Clause 4.2.3 f) |
NIST SP800-53 R3 | FedRAMP (Final 2012) Low Impact | FedRAMP (Final 2012) Moderate Impact | PCI DSS v2.0 |
---|---|---|---|
AC-1 | NIST SP 800-53 R3 AC-1 | NIST SP 800-53 R3 AC-1 | 12.1.3 |
BITS Shared Assessments SIG v6.0 | BITS Shared Assessments SIG v5.0 | GAPP (Aug 2009) |
---|---|---|
B.1.33. B.1.34, | B.2 | 1.2.1 |
Jericho Forum | NERC CIP |
---|---|
Commandment #1 | CIP-003-3 - R3.2 - R3.3 - R1.3 |
Consensus Assessments Initiative Questionnaire (CAIQ) Data
COBIT | HIPAA | ISO27001 | SP800_53 |
---|---|---|---|
FedRAMP | PCI_DSS | BITS | GAPP |
---|---|---|---|
SaaS | PaaS | IaaS |
---|---|---|
False | False | False |
SP | CUST |
---|---|
False | False |