Security standards and definitions frequently referenced in our Cloud Security Guidance.
Guidance on certification
The scope of the certification can be specified by the organisation being certified, so if you’re using these standards to assess implementation of one or more Cloud Security Principles, check that the scope covers appropriate aspects. The individual performing this assessment should be appropriately skilled. For example, they could be a CCP certified ‘Accreditor’ or ‘IA Auditor’ at Senior or Lead level.
* Note that ISO/IEC 27001 certification does not verify that the controls implemented by the service provider are effective.
* The United Kingdom Accreditation Service (UKAS) is the body recognised by UK government to assess organisations that provide certification services, including ISO/IEC 27001 certifications. UKAS is involved with some international groups to provide mutual recognition. For more information see their website.
ISO/IEC 27001 audits of cloud service providers performed by bodies not recognised by UKAS may reduce the confidence that users can place in their quality.
Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) v3.0
CSA CCM v3.0 compliance is achieved through CSA’s STAR scheme, the first level of which is ‘self-assessment’.
Service providers referencing STAR at this level should be considered to fall into the Service Provider Assertion category. The remaining levels of STAR (‘certification’, ‘attestation’ or ‘continuous’) should be considered to fall in the Independent validation of assertions category.
As with ISO/IEC 27001:2005 or ISO/IEC 27001:2013, a qualified individual (CCP certified ‘Accreditor’ or ‘IA Auditor’ at senior or lead level, or a recognised subject matter expert) should verify the scope and implementation of controls to ensure they support the Cloud Security Principles claimed.
SSAE-16 / ISAE 3402
ISAE 3402, The International Standard on Assurance Engagements ‘Assurance Reports on Controls at a Service Organisation’, and SSAE 16, Statement on Standards for Attestation Engagements No. 16, replace the US Statement on Auditing Standards No 70 (SAS 70).
SSAE and ISE both require a description of the service organisation’s ‘system’ and a written assertion by management.
ISO/IEC 30111:2013 gives guidelines for how to process and resolve potential vulnerability information in a product or online service. It is applicable to vendors involved in handling vulnerabilities for IT systems.
BS7858:2012 is the British Standard that specifies a Code of Practice for security screening of individuals and third party personnel to be employed in security environments by an organisation prior to their employment.
ISO/IEC 27034 provides guidance to assist organisations in integrating security into the process used for managing their applications. It introduces definitions, concepts, principles and processes involved in application security.
ISO/PAS 28000:2007 specifies the requirements for a security management system, including those aspects critical to the security assurance of the supply chain.
These aspects include finance, manufacturing, information management and the facilities for packing, storing, and transferring goods between modes of transport and locations.
Cloud security definitions
This guidance uses NIST definitions for cloud computing terminology. The key terms are described below.
A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (eg networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort, or service provider interaction.
A cloud infrastructure provisioned for exclusive use by a single organization comprising multiple consumers (eg business units).
It may be owned, managed, and operated by the organization, a third party, or some combination of the two, and it may exist on or off premises.
A cloud infrastructure provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (eg mission, security requirements, policy, and compliance considerations).
It may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of the two, and it may exist on or off premises.
A cloud infrastructure provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of these parties.
It exists on the premises of the cloud provider.
A composition of two or more distinct cloud infrastructures (private, community, or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability (eg cloud bursting for load balancing between clouds).
Software as a Service (SaaS)
A service providing applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (eg web-based email), or a program interface.
Platform as a Service (PaaS)
A service allowing users to cloud-deploy applications created using programming languages, libraries, services, and tools supported by the provider.
Infrastructure as a Service (IaaS)
A service allowing the user to provision processing, storage, networks, and other fundamental computing resources and deploy/run arbitrary software. This can include operating systems and applications.
Read more here:: NCSC Guidance