Technical Awareness & Training

To increase the ability to select and implement effective technical security mechanisms, products, process and tools

Cloud Controls Matrix (CCM) Data

Array

IS-04 | Information Security | Baseline Requirements

Control Specification +-

Baseline security requirements shall be established and applied to the design and implementation of (developed or purchased) applications, databases, systems, and network infrastructure and information processing that comply with policies, standards and applicable regulatory requirements. Compliance with security baseline requirements must be reassessed at least annually or upon significant changes.

Architectural Relevance +-

PhysicalNetworkComputeAppData
True True True True True

Corp Gov Relevance +-

Corp Gov Relevance
True

Cloud Service Delivery Model Applicability +-

SaaSPaaSIaaS
True True True

Supplier Relationship +-

Service ProviderTenant / Consumer
True False

Scope Applicability +-

COBIT 4.1HIPAA / HITECH ActISO/IEC 27001-2005

AI2.1
AI2.2
AI3.3
DS2.3
DS11.6

A.12.1.1
A.15.2.2

NIST SP800-53 R3FedRAMP (Final 2012) Low ImpactFedRAMP (Final 2012) Moderate ImpactPCI DSS v2.0

CM-2
SA-2
SA-4

NIST SP 800-53 R3 CM-2
NIST SP 800-53 R3 SA-2
NIST SP 800-53 R3 SA-4

NIST SP 800-53 R3 CM-2
NIST SP 800-53 R3 CM-2 (1)
NIST SP 800-53 R3 CM-2 (3)
NIST SP 800-53 R3 CM-2 (5)
NIST SP 800-53 R3 SA-2
NIST SP 800-53 R3 SA-4
NIST SP 800-53 R3 SA-4 (1)
NIST SP 800-53 R3 SA-4 (4)
NIST SP 800-53 R3 SA-4 (7)

1.1
1.1.1
1.1.2
1.1.3
1.1.4
1.1.5
1.1.6
2.2
2.2.1
2.2.2
2.2.3
2.2.4

BITS Shared Assessments SIG v6.0BITS Shared Assessments SIG v5.0GAPP (Aug 2009)

L.2, L.5, L.7 L.8, L.9, L.10

L.2

1.2.6
8.2.1
8.2.7

Jericho ForumNERC CIP

Commandment #2
Commandment #4
Commandment #5
Commandment #11

Array

Consensus Assessments Initiative Questionnaire (CAIQ) Data

Information Security (IS) | ID #IS-03.2

Do you have agreements which ensure your providers adhere to your information security and privacy policies?

Compliance Mapping +-

COBITHIPAAISO27001SP800_53
FedRAMPPCI_DSSBITSGAPP

Model Applicability +-

SaaSPaaSIaaS
True True True

Scope Applicability +-

SPCUST
True True

Consensus Assessments Initiative Questionnaire (CAIQ) Data

Information Security (IS) | ID #IS-04.1

Do you have documented information security baselines for every component of your infrastructure (ex. Hypervisors, operating systems, routers, DNS servers, etc.)?

Compliance Mapping +-

COBITHIPAAISO27001SP800_53

COBIT 4.1 AI2.1
COBIT 4.1 AI2.2
COBIT 4.1 AI3.3
COBIT 4.1 DS2.3
COBIT 4.1 DS11.6

A.12.1.1
A.15.2.2

NIST SP800-53 R3 CM-2
NIST SP800-53 R3 SA-2
NIST SP800-53 R3 SA-4

FedRAMPPCI_DSSBITSGAPP

NIST SP800-53 R3 CM-2
NIST SP800-53 R3 CM-2 (1)
NIST SP800-53 R3 CM-2 (3)
NIST SP800-53 R3 CM-2 (5)
NIST SP800-53 R3 SA-2
NIST SP800-53 R3 SA-4
NIST SP800-53 R3 SA-4 (1)
NIST SP800-53 R3 SA-4 (4)
NIST SP800-53 R3 SA-4 (7)

PCI DSS v1.2 1.1
PCI DSS v1.2 1.1.1
PCI DSS v1.2 1.1.2
PCI DSS v1.2 1.1.3
PCI DSS v1.2 1.1.4
PCI DSS v1.2 1.1.5
PCI DSS v1.2 1.1.6
PCI DSS v1.2 2.2
PCI DSS v1.2 2.2.1
PCI DSS v1.2 2.2.2
PCI DSS v1.2 2.2.3
PCI DSS v1.2 2.2.4

AUP v5.0 L.2 SIG v6.0: L.2, L.5, L.7 L.8, L.9, L.10

GAPP Ref 1.2.6
GAPP Ref 8.2.1
GAPP Ref 8.2.7

Model Applicability +-

SaaSPaaSIaaS
True True True

Scope Applicability +-

SPCUST
True True

Consensus Assessments Initiative Questionnaire (CAIQ) Data

Information Security (IS) | ID #IS-04.2

Do you have a capability to continuously monitor and report the compliance of your infrastructure against your information security baselines?

Compliance Mapping +-

COBITHIPAAISO27001SP800_53

COBIT 4.1 AI2.1
COBIT 4.1 AI2.2
COBIT 4.1 AI3.3
COBIT 4.1 DS2.3
COBIT 4.1 DS11.6

A.12.1.1
A.15.2.2

NIST SP800-53 R3 CM-2
NIST SP800-53 R3 SA-2
NIST SP800-53 R3 SA-4

FedRAMPPCI_DSSBITSGAPP

NIST SP800-53 R3 CM-2
NIST SP800-53 R3 CM-2 (1)
NIST SP800-53 R3 CM-2 (3)
NIST SP800-53 R3 CM-2 (5)
NIST SP800-53 R3 SA-2
NIST SP800-53 R3 SA-4
NIST SP800-53 R3 SA-4 (1)
NIST SP800-53 R3 SA-4 (4)
NIST SP800-53 R3 SA-4 (7)

PCI DSS v1.2 1.1
PCI DSS v1.2 1.1.1
PCI DSS v1.2 1.1.2
PCI DSS v1.2 1.1.3
PCI DSS v1.2 1.1.4
PCI DSS v1.2 1.1.5
PCI DSS v1.2 1.1.6
PCI DSS v1.2 2.2
PCI DSS v1.2 2.2.1
PCI DSS v1.2 2.2.2
PCI DSS v1.2 2.2.3
PCI DSS v1.2 2.2.4

AUP v5.0 L.2 SIG v6.0: L.2, L.5, L.7 L.8, L.9, L.10

GAPP Ref 1.2.6
GAPP Ref 8.2.1
GAPP Ref 8.2.7

Model Applicability +-

SaaSPaaSIaaS
True True True

Scope Applicability +-

SPCUST
True True

Consensus Assessments Initiative Questionnaire (CAIQ) Data

Information Security (IS) | ID #IS-04.3

Do you allow your clients to provide their own trusted virtual machine image to ensure conformance to their own internal standards?

Compliance Mapping +-

COBITHIPAAISO27001SP800_53

COBIT 4.1 AI2.1
COBIT 4.1 AI2.2
COBIT 4.1 AI3.3
COBIT 4.1 DS2.3
COBIT 4.1 DS11.6

A.12.1.1
A.15.2.2

NIST SP800-53 R3 CM-2
NIST SP800-53 R3 SA-2
NIST SP800-53 R3 SA-4

FedRAMPPCI_DSSBITSGAPP

NIST SP800-53 R3 CM-2
NIST SP800-53 R3 CM-2 (1)
NIST SP800-53 R3 CM-2 (3)
NIST SP800-53 R3 CM-2 (5)
NIST SP800-53 R3 SA-2
NIST SP800-53 R3 SA-4
NIST SP800-53 R3 SA-4 (1)
NIST SP800-53 R3 SA-4 (4)
NIST SP800-53 R3 SA-4 (7)

PCI DSS v1.2 1.1
PCI DSS v1.2 1.1.1
PCI DSS v1.2 1.1.2
PCI DSS v1.2 1.1.3
PCI DSS v1.2 1.1.4
PCI DSS v1.2 1.1.5
PCI DSS v1.2 1.1.6
PCI DSS v1.2 2.2
PCI DSS v1.2 2.2.1
PCI DSS v1.2 2.2.2
PCI DSS v1.2 2.2.3
PCI DSS v1.2 2.2.4

AUP v5.0 L.2 SIG v6.0: L.2, L.5, L.7 L.8, L.9, L.10

GAPP Ref 1.2.6
GAPP Ref 8.2.1
GAPP Ref 8.2.7

Model Applicability +-

SaaSPaaSIaaS
True True True

Scope Applicability +-

SPCUST
True True