Cloud Security

Mechanisms exist to ensure the integrity of virtual machine images at all times.


Login

Cloud Security

Mechanisms exist to ensure multi-tenant owned or managed assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users.


Login

Cloud Security

Mechanisms exist to formally document a Customer Responsibility Matrix (CRM), delineating assigned responsibilities for controls between the Cloud Service Provider (CSP) and its customers.


Login

Cloud Security

Mechanisms exist to ensure Multi-Tenant Service Providers (MTSP) facilitate security event logging capabilities for its customers that are consistent with applicable statutory, regulatory and/or contractual obligations.


Login

Cloud Security

Mechanisms exist to ensure Multi-Tenant Service Providers (MTSP) facilitate prompt forensic investigations in the event of a suspected or confirmed security incident.


Login

Cloud Security

Mechanisms exist to ensure Multi-Tenant Service Providers (MTSP) facilitate prompt response to suspected or confirmed security incidents and vulnerabilities, including timely notification to affected customers.


Login

Cloud Security

Mechanisms exist to ensure cloud providers use secure protocols for the import, export and management of data in cloud-based services.


Login

Cloud Security

Mechanisms exist to ensure interoperability by requiring cloud providers to use industry-recognized formats and provide documentation of custom changes for review.


Login

Cloud Security

Mechanisms exist to control the location of cloud processing/storage based on business requirements that includes statutory, regulatory and contractual obligations.


Login

Cloud Security

Mechanisms exist to limit and manage the storage of sensitive/regulated data in public cloud providers.


Login