Security policies are part of a logical abstraction of an Enterprise Security Architecture. They are derived from risk-based business requirements and exist at a number of different levels including Information Security policy, Physical Security Policy, Business Continuity Policy, Infrastructure Security Policies, Application Security Policies as well as the over-arching Business Operational Risk Management Policy. Security Policies are statements that capture requirements specifying what type of security and how much should be applied to protect the business. Policies typically state what should be done while avoiding reference to particular technical solutions. Security Standards are an abstraction at the component level and are needed to ensure that the many different components can be integrated into systems. There are multiple internationally recognized standards for various aspects of security from standards bodies such as ISO, IETF, IEEE, ISACA, OASIS, and TCG. Direction can also be provided in the form of operational security baselines, job aid guidelines, best practices, correlation of regulatory requirements, and role based awareness. One way to approach security policy and its implementation is to classify information and associate policies with the resulting classes of data.
Cloud Controls Matrix (CCM) Data
Physical | Network | Compute | App | Data |
---|---|---|---|---|
True | True | True | True | True |
Corp Gov Relevance |
---|
True |
SaaS | PaaS | IaaS |
---|---|---|
True | True | True |
Service Provider | Tenant / Consumer |
---|---|
True | False |
COBIT 4.1 | HIPAA / HITECH Act | ISO/IEC 27001-2005 |
---|---|---|
DS 5.4 | 45 CFR 164.308 (a)(3)(i) | A.11.1.1 |
NIST SP800-53 R3 | FedRAMP (Final 2012) Low Impact | FedRAMP (Final 2012) Moderate Impact | PCI DSS v2.0 |
---|---|---|---|
AC-1 | NIST SP 800-53 R3 AC-1 | NIST SP 800-53 R3 AC-1 | 3.5.1 |
BITS Shared Assessments SIG v6.0 | BITS Shared Assessments SIG v5.0 | GAPP (Aug 2009) |
---|---|---|
B.1.8, B.1.21, B.1.28, E.6.2, H.1.1, K.1.4.5, | B.1 | 8.1.0 |
Jericho Forum | NERC CIP |
---|---|
Commandment #6 | CIP-007-3 - R5.1 - R5.1.2 |
Consensus Assessments Initiative Questionnaire (CAIQ) Data
COBIT | HIPAA | ISO27001 | SP800_53 |
---|---|---|---|
COBIT 4.1 DS 5.4 | 45 CFR 164.308 (a)(3)(i) | A.11.1.1 | NIST SP800-53 R3 AC-1 |
FedRAMP | PCI_DSS | BITS | GAPP |
---|---|---|---|
NIST SP800-53 R3 AC-1 | PCI DSS v2.0 3.5.1 | AUP v5.0 B.1 SIG v6.0: B.1.8, B.1.21, B.1.28, E.6.2, H.1.1, K.1.4.5, | GAPP Ref 8.1.0 |
SaaS | PaaS | IaaS |
---|---|---|
True | True | True |
SP | CUST |
---|---|
True | True |