Information risk management is the act of aligning exposure to risk and capability of managing it with the risk tolerance of the data owner. It is the primary means of decision support for information technology resources designed to protect the confidentiality, integrity, and availability of information assets. Ensures that risk of all types are identified, understood, communicated and either accepted, remediated, transferred, or avoided. Risk Management can look to the output of Compliance Management activities to assist the organization in evaluating the overall security posture and if it is in alignment the defined risk objectives.
Cloud Controls Matrix (CCM) Data
Physical | Network | Compute | App | Data |
---|---|---|---|---|
True | True | True | True | True |
Corp Gov Relevance |
---|
True |
SaaS | PaaS | IaaS |
---|---|---|
True | True | True |
Service Provider | Tenant / Consumer |
---|---|
True | True |
COBIT 4.1 | HIPAA / HITECH Act | ISO/IEC 27001-2005 |
---|---|---|
PO 9.5 | 45 CFR 164.308 (a)(1)(ii)(B) | Clause 4.2.1 c) through g) |
NIST SP800-53 R3 | FedRAMP (Final 2012) Low Impact | FedRAMP (Final 2012) Moderate Impact | PCI DSS v2.0 |
---|---|---|---|
CA-5 | NIST SP 800-53 R3 CA-5 | NIST SP 800-53 R3 CA-5 |
BITS Shared Assessments SIG v6.0 | BITS Shared Assessments SIG v5.0 | GAPP (Aug 2009) |
---|---|---|
I.3, L.9, L.10 | I.4 |
Jericho Forum | NERC CIP |
---|---|
CIP-009-3 - R1.2 |
Consensus Assessments Initiative Questionnaire (CAIQ) Data
COBIT | HIPAA | ISO27001 | SP800_53 |
---|---|---|---|
COBIT 4.1 PO 9.5 | 45 CFR 164.308 (a)(1)(ii)(B) | Clause 4.2.1 c) through g) | NIST SP800-53 R3 CA-5 |
FedRAMP | PCI_DSS | BITS | GAPP |
---|---|---|---|
NIST SP800-53 R3 CA-5 | AUP v5.0I.4 AUP v5.0 L.2 SIG v6.0: I.3, L.9, L.10 |
SaaS | PaaS | IaaS |
---|---|---|
True | True | True |
SP | CUST |
---|---|
True | True |