Data-in-Transit Encryption (Transitory, Fixed)

Encryption of "Data in Transit" (data being transferred between two nodes in a network).

Cloud Controls Matrix (CCM) Data

Array

IS-28 | Information Security | eCommerce Transactions

Control Specification +-

Electronic commerce (e-commerce) related data traversing public networks shall be appropriately classified and protected from fraudulent activity, unauthorized disclosure or modification in such a manner to prevent contract dispute and compromise of data.

Architectural Relevance +-

PhysicalNetworkComputeAppData
False True False False True

Corp Gov Relevance +-

Corp Gov Relevance
False

Cloud Service Delivery Model Applicability +-

SaaSPaaSIaaS
True True True

Supplier Relationship +-

Service ProviderTenant / Consumer
True True

Scope Applicability +-

COBIT 4.1HIPAA / HITECH ActISO/IEC 27001-2005

DS 5.10 5.11

45 CFR 164.312(e)(1)
45 CFR 164.312(e)(2)(i)

A.7.2.1
A.10.6.1
A.10.6.2
A.10.9.1
A.10.9.2
A.15.1.4

NIST SP800-53 R3FedRAMP (Final 2012) Low ImpactFedRAMP (Final 2012) Moderate ImpactPCI DSS v2.0

AC-14
AC-21
AC-22
IA-8
AU-10
SC-4
SC-8
SC-9

NIST SP 800-53 R3 AC-1
NIST SP 800-53 R3 AC-2
NIST SP 800-53 R3 AC-22
NIST SP 800-53 R3 AU-1

NIST SP 800-53 R3 AC-22
NIST SP 800-53 R3 AU-10
NIST SP 800-53 R3 AU-10 (5)
NIST SP 800-53 R3 SC-8
NIST SP 800-53 R3 SC-8 (1)
NIST SP 800-53 R3 SC-9
NIST SP 800-53 R3 SC-9 (1)

2.1.1
4.1
4.1.1
4.2

BITS Shared Assessments SIG v6.0BITS Shared Assessments SIG v5.0GAPP (Aug 2009)

G.19.1.1, G.19.1.2, G.19.1.3, G.10.8, G.9.11, G.14, G.15.1

G.4
G.11
G.16
G.18
I.3
I.4

3.2.4
4.2.3
7.1.2
7.2.1
7.2.2
8.2.1
8.2.5

Jericho ForumNERC CIP

Commandment #4
Commandment #5
Commandment #9
Commandment #10
Commandment #11

Array

Consensus Assessments Initiative Questionnaire (CAIQ) Data

Information Security (IS) | ID #IS-28.1

Do you provide open encryption methodologies (3.4ES, AES, etc.) to tenants in order for them to protect their data if it is required to traverse public networks? (ex. the Internet)

Compliance Mapping +-

COBITHIPAAISO27001SP800_53

COBIT 4.1 DS 5.10 5.11

45 CFR 164.312(e)(1)
45 CFR 164.312(e)(2)(i)

A.7.2.1
A.10.6.1
A.10.6.2
A.10.9.1
A.10.9.2
A.15.1.4

NIST SP800-53 R3 AC-14
NIST SP800-53 R3 AC-21
NIST SP800-53 R3 AC-22
NIST SP800-53 R3 IA-8
NIST SP800-53 R3 AU-10
NIST SP800-53 R3 SC-4
NIST SP800-53 R3 SC-8
NIST SP800-53 R3 SC-9

FedRAMPPCI_DSSBITSGAPP

PCI-DSS v2.0 2.1.1
PCI-DSS v2.0 4.1
PCI-DSS v2.0 4.1.1
PCI DSS v2.0 4.2

GAPP Ref 3.2.4
GAPP Ref 4.2.3
GAPP Ref 7.1.2
GAPP Ref 7.2.1
GAPP Ref 7.2.2
GAPP Ref 8.2.1
GAPP Ref 8.2.5

Model Applicability +-

SaaSPaaSIaaS
True True True

Scope Applicability +-

SPCUST
True True

Consensus Assessments Initiative Questionnaire (CAIQ) Data

Information Security (IS) | ID #IS-28.2

Do you utilize open encryption methodologies any time your infrastructure components need to communicate to each other over public networks (ex. Internet-based replication of data from one environment to another)?

Compliance Mapping +-

COBITHIPAAISO27001SP800_53

COBIT 4.1 DS 5.10 5.11

45 CFR 164.312(e)(1)
45 CFR 164.312(e)(2)(i)

A.7.2.1
A.10.6.1
A.10.6.2
A.10.9.1
A.10.9.2
A.15.1.4

NIST SP800-53 R3 AC-14
NIST SP800-53 R3 AC-21
NIST SP800-53 R3 AC-22
NIST SP800-53 R3 IA-8
NIST SP800-53 R3 AU-10
NIST SP800-53 R3 SC-4
NIST SP800-53 R3 SC-8
NIST SP800-53 R3 SC-9

FedRAMPPCI_DSSBITSGAPP

PCI-DSS v2.0 2.1.1
PCI-DSS v2.0 4.1
PCI-DSS v2.0 4.1.1
PCI DSS v2.0 4.2

GAPP Ref 3.2.4
GAPP Ref 4.2.3
GAPP Ref 7.1.2
GAPP Ref 7.2.1
GAPP Ref 7.2.2
GAPP Ref 8.2.1
GAPP Ref 8.2.5

Model Applicability +-

SaaSPaaSIaaS
True True True

Scope Applicability +-

SPCUST
True True