Technical Security Standards

Specify how specific technical security controls must be implemented (for example, a security policy might mandate at-rest encryption for a particular class of data and a technical security standard might specify that the encryption implementation must be FIPS 140-2 certified AES-256).

Cloud Controls Matrix (CCM) Data

Array

SA-02 | Security Architecture | User ID Credentials

Control Specification +-

Implement and enforce (through automation) user credential and password controls for applications, databases and server and network infrastructure, requiring the following minimum standards: ? User identity verification prior to password resets. ? If password reset initiated by personnel other than user (i.e., administrator), password must be immediately changed by user upon first use. ? Timely access revocation for terminated users. ? Remove/disable inactive user accounts at least every 90 days. ? Unique user IDs and disallow group, shared, or generic accounts and passwords. ? Password expiration at least every 90 days. ? Minimum password length of at least seven (7) characters. ? Strong passwords containing both numeric and alphabetic characters. ? Allow password re-use after the last four (4) passwords used. ? User ID lockout after not more than si1 (6) attempts. ? User ID lockout duration to a minimum of 30 minutes or until administrator enables the user ID. ? Re-enter password to reactivate terminal after session idle time for more than 15 minutes. ? Maintain user activity logs for privileged access or access to sensitive data.

Architectural Relevance +-

PhysicalNetworkComputeAppData
False True True True False

Corp Gov Relevance +-

Corp Gov Relevance
False

Cloud Service Delivery Model Applicability +-

SaaSPaaSIaaS
True True True

Supplier Relationship +-

Service ProviderTenant / Consumer
True True

Scope Applicability +-

COBIT 4.1HIPAA / HITECH ActISO/IEC 27001-2005

DS5.3
DS5.4

45 CFR 164.308(a)(5)(ii)(c)
45 CFR 164.308 (a)(5)(ii)(D)
45 CFR 164.312 (a)(2)(i)
45 CFR 164.312 (a)(2)(iii)
45 CFR 164.312 (d)

A.8.3.3
A.11.1.1
A.11.2.1
A.11.2.3
A.11.2.4
A.11.5.5

NIST SP800-53 R3FedRAMP (Final 2012) Low ImpactFedRAMP (Final 2012) Moderate ImpactPCI DSS v2.0

AC-1
AC-2
AC-3
AC-11
AU-2
AU-11
IA-1
IA-2
IA-5
IA-6
IA-8
SC-10

NIST SP 800-53 R3 AC-1
NIST SP 800-53 R3 AC-2
NIST SP 800-53 R3 AC-3
NIST SP 800-53 R3 AU-2
NIST SP 800-53 R3 AU-11
NIST SP 800-53 R3 IA-1
NIST SP 800-53 R3 IA-2
NIST SP 800-53 R3 IA-2 (1)
NIST SP 800-53 R3 IA-5
NIST SP 800-53 R3 IA-5 (1)
NIST SP 800-53 R3 IA-6
NIST SP 800-53 R3 IA-8

NIST SP 800-53 R3 AC-1
NIST SP 800-53 R3 AC-2
NIST SP 800-53 R3 AC-3
NIST SP 800-53 R3 AC-11
NIST SP 800-53 R3 AC-11 (1)
NIST SP 800-53 R3 AU-2
NIST SP 800-53 R3 AU-2 (3)
NIST SP 800-53 R3 AU-2 (4)
NIST SP 800-53 R3 AU-11
NIST SP 800-53 R3 IA-1
NIST SP 800-53 R3 IA-2
NIST SP 800-53 R3 IA-2 (1)
NIST SP 800-53 R3 IA-2 (2)
NIST SP 800-53 R3 IA-2 (3)
NIST SP 800-53 R3 IA-2 (8)
NIST SP 800-53 R3 IA-5
NIST SP 800-53 R3 IA-5 (1)
NIST SP 800-53 R3 IA-5 (2)
NIST SP 800-53 R3 IA-5 (3)
NIST SP 800-53 R3 IA-5 (6)
NIST SP 800-53 R3 IA-5 (7)
NIST SP 800-53 R3 IA-6
NIST SP 800-53 R3 IA-8
NIST SP 800-53 R3 SC-10

8.1
8.2,
8.3
8.4
8.5
10.1,
12.2,
12.3.8

BITS Shared Assessments SIG v6.0BITS Shared Assessments SIG v5.0GAPP (Aug 2009)

E.6.2, E.6.3, H.1.1, H.1.2, H.2, H.3.2, H.4, H.4.1, H.4.5, H.4.8

B.1
H.5

Jericho ForumNERC CIP

Commandment #6
Commandment #7
Commandment #8
Commandment #9

CIP-004-3 R2.2.3
CIP-007-3 - R5.2 - R5.3.1 - R5.3.2 - R5.3.3

Array

Security Architecture (SA) | ID #SA-02.1

Do you support use of, or integration with, existing customer-based Single Sign On (SSO) solutions to your service?

Compliance Mapping +-

COBITHIPAAISO27001SP800_53

COBIT 4.1 DS5.3
COBIT 4.1 DS5.4

45 CFR 164.308(a)(5)(ii)(c) (New)
45 CFR 164.308 (a)(5)(ii)(D)
45 CFR 164.312 (a)(2)(i)
45 CFR 164.312 (a)(2)(iii)
45 CFR 164.312 (d)

A.8.3.3
A.11.1.1
A.11.2.1
A.11.2.3
A.11.2.4
A.11.5.5

FedRAMPPCI_DSSBITSGAPP

PCI DSS v2.0 8.1
PCI DSS v2.0 8.2,
PCI DSS v2.0 8.3
PCI DSS v2.0 8.4
PCI DSS v2.0 8.5
PCI DSS v2.0 10.1,
PCI DSS v2.0 12.2,
PCI DSS v2.0 12.3.8

AUP v5.0 B.1 AUP v5.0 H.5 SIG v6.0: E.6.2, E.6.3, H.1.1, H.1.2, H.2, H.3.2, H.4, H.4.1, H.4.5, H.4.8,

Model Applicability +-

SaaSPaaSIaaS
True True True

Scope Applicability +-

SPCUST
True True

Security Architecture (SA) | ID #SA-02.2

Do you use open standards to delegate authentication capabilities to your tenants?

Compliance Mapping +-

COBITHIPAAISO27001SP800_53

COBIT 4.1 DS5.3
COBIT 4.1 DS5.4

45 CFR 164.308(a)(5)(ii)(c) (New)
45 CFR 164.308 (a)(5)(ii)(D)
45 CFR 164.312 (a)(2)(i)
45 CFR 164.312 (a)(2)(iii)
45 CFR 164.312 (d)

A.8.3.3
A.11.1.1
A.11.2.1
A.11.2.3
A.11.2.4
A.11.5.5

FedRAMPPCI_DSSBITSGAPP

PCI DSS v2.0 8.1
PCI DSS v2.0 8.2,
PCI DSS v2.0 8.3
PCI DSS v2.0 8.4
PCI DSS v2.0 8.5
PCI DSS v2.0 10.1,
PCI DSS v2.0 12.2,
PCI DSS v2.0 12.3.8

AUP v5.0 B.1 AUP v5.0 H.5 SIG v6.0: E.6.2, E.6.3, H.1.1, H.1.2, H.2, H.3.2, H.4, H.4.1, H.4.5, H.4.8,

Model Applicability +-

SaaSPaaSIaaS
True True True

Scope Applicability +-

SPCUST
True True

Security Architecture (SA) | ID #SA-02.3

Do you support identity federation standards (SAML, SPML, WS-Federation, etc.) as a means of authenticating/authorizing users?

Compliance Mapping +-

COBITHIPAAISO27001SP800_53

COBIT 4.1 DS5.3
COBIT 4.1 DS5.4

45 CFR 164.308(a)(5)(ii)(c) (New)
45 CFR 164.308 (a)(5)(ii)(D)
45 CFR 164.312 (a)(2)(i)
45 CFR 164.312 (a)(2)(iii)
45 CFR 164.312 (d)

A.8.3.3
A.11.1.1
A.11.2.1
A.11.2.3
A.11.2.4
A.11.5.5

FedRAMPPCI_DSSBITSGAPP

PCI DSS v2.0 8.1
PCI DSS v2.0 8.2,
PCI DSS v2.0 8.3
PCI DSS v2.0 8.4
PCI DSS v2.0 8.5
PCI DSS v2.0 10.1,
PCI DSS v2.0 12.2,
PCI DSS v2.0 12.3.8

AUP v5.0 B.1 AUP v5.0 H.5 SIG v6.0: E.6.2, E.6.3, H.1.1, H.1.2, H.2, H.3.2, H.4, H.4.1, H.4.5, H.4.8,

Model Applicability +-

SaaSPaaSIaaS
True True True

Scope Applicability +-

SPCUST
True True

Security Architecture (SA) | ID #SA-02.4

Do you have a Policy Enforcement Point capability (ex. XACML) to enforce regional legal and policy constraints on user access?

Compliance Mapping +-

COBITHIPAAISO27001SP800_53

COBIT 4.1 DS5.3
COBIT 4.1 DS5.4

45 CFR 164.308(a)(5)(ii)(c) (New)
45 CFR 164.308 (a)(5)(ii)(D)
45 CFR 164.312 (a)(2)(i)
45 CFR 164.312 (a)(2)(iii)
45 CFR 164.312 (d)

A.8.3.3
A.11.1.1
A.11.2.1
A.11.2.3
A.11.2.4
A.11.5.5

FedRAMPPCI_DSSBITSGAPP

PCI DSS v2.0 8.1
PCI DSS v2.0 8.2,
PCI DSS v2.0 8.3
PCI DSS v2.0 8.4
PCI DSS v2.0 8.5
PCI DSS v2.0 10.1,
PCI DSS v2.0 12.2,
PCI DSS v2.0 12.3.8

AUP v5.0 B.1 AUP v5.0 H.5 SIG v6.0: E.6.2, E.6.3, H.1.1, H.1.2, H.2, H.3.2, H.4, H.4.1, H.4.5, H.4.8,

Model Applicability +-

SaaSPaaSIaaS
True True True

Scope Applicability +-

SPCUST
True True

Security Architecture (SA) | ID #SA-02.5

Do you have an identity management system in place which enables both role-based and context-based entitlement to data (enables classification of data for a tenant)?

Compliance Mapping +-

COBITHIPAAISO27001SP800_53

COBIT 4.1 DS5.3
COBIT 4.1 DS5.4

45 CFR 164.308(a)(5)(ii)(c) (New)
45 CFR 164.308 (a)(5)(ii)(D)
45 CFR 164.312 (a)(2)(i)
45 CFR 164.312 (a)(2)(iii)
45 CFR 164.312 (d)

A.8.3.3
A.11.1.1
A.11.2.1
A.11.2.3
A.11.2.4
A.11.5.5

FedRAMPPCI_DSSBITSGAPP

PCI DSS v2.0 8.1
PCI DSS v2.0 8.2,
PCI DSS v2.0 8.3
PCI DSS v2.0 8.4
PCI DSS v2.0 8.5
PCI DSS v2.0 10.1,
PCI DSS v2.0 12.2,
PCI DSS v2.0 12.3.8

AUP v5.0 B.1 AUP v5.0 H.5 SIG v6.0: E.6.2, E.6.3, H.1.1, H.1.2, H.2, H.3.2, H.4, H.4.1, H.4.5, H.4.8,

Model Applicability +-

SaaSPaaSIaaS
True True True

Scope Applicability +-

SPCUST
True True

Security Architecture (SA) | ID #SA-02.6

Do you provide tenants with strong (multifactor) authentication options (digital certs, tokens, biometric, etc..) for user access?

Compliance Mapping +-

COBITHIPAAISO27001SP800_53

COBIT 4.1 DS5.3
COBIT 4.1 DS5.4

45 CFR 164.308(a)(5)(ii)(c) (New)
45 CFR 164.308 (a)(5)(ii)(D)
45 CFR 164.312 (a)(2)(i)
45 CFR 164.312 (a)(2)(iii)
45 CFR 164.312 (d)

A.8.3.3
A.11.1.1
A.11.2.1
A.11.2.3
A.11.2.4
A.11.5.5

FedRAMPPCI_DSSBITSGAPP

PCI DSS v2.0 8.1
PCI DSS v2.0 8.2,
PCI DSS v2.0 8.3
PCI DSS v2.0 8.4
PCI DSS v2.0 8.5
PCI DSS v2.0 10.1,
PCI DSS v2.0 12.2,
PCI DSS v2.0 12.3.8

AUP v5.0 B.1 AUP v5.0 H.5 SIG v6.0: E.6.2, E.6.3, H.1.1, H.1.2, H.2, H.3.2, H.4, H.4.1, H.4.5, H.4.8,

Model Applicability +-

SaaSPaaSIaaS
True True True

Scope Applicability +-

SPCUST
True True

Security Architecture (SA) | ID #SA-02.7

Do you allow tenants to use third party identity assurance services?

Compliance Mapping +-

COBITHIPAAISO27001SP800_53

COBIT 4.1 DS5.3
COBIT 4.1 DS5.4

45 CFR 164.308(a)(5)(ii)(c) (New)
45 CFR 164.308 (a)(5)(ii)(D)
45 CFR 164.312 (a)(2)(i)
45 CFR 164.312 (a)(2)(iii)
45 CFR 164.312 (d)

A.8.3.3
A.11.1.1
A.11.2.1
A.11.2.3
A.11.2.4
A.11.5.5

FedRAMPPCI_DSSBITSGAPP

PCI DSS v2.0 8.1
PCI DSS v2.0 8.2,
PCI DSS v2.0 8.3
PCI DSS v2.0 8.4
PCI DSS v2.0 8.5
PCI DSS v2.0 10.1,
PCI DSS v2.0 12.2,
PCI DSS v2.0 12.3.8

AUP v5.0 B.1 AUP v5.0 H.5 SIG v6.0: E.6.2, E.6.3, H.1.1, H.1.2, H.2, H.3.2, H.4, H.4.1, H.4.5, H.4.8,

Model Applicability +-

SaaSPaaSIaaS
True True True

Scope Applicability +-

SPCUST
True True