2.3

Data Security (2.3): Information and records (data) are managed consistent with the organisation’s risk strategy to protect the confidentiality, integrity, and availability of information.

Metric

Met2.3

2.3.1

PR.DS-1: Is the Data protected while at rest in the cloud?

HIGH

· CCS CSC 17

· COBIT 5 APO01.06, BAI02.01, BAI06.01, DSS06.06

· ISA 62443-3-3:2013 SR 3.4, SR 4.1

· ISO/IEC 27001:2013 A.8.2.3

· NIST SP 800-53 Rev. 4 SC-28

Cloud Provider/Use of Encryption

Sub Metric

Met2.3.1

2.3.2

PR.DS-2: Is the Data protected while in transit (upload/download from the cloud)?

HIGH

· ISA 62443-3-3:2013 SR 3.1, SR 3.8, SR 4.1, SR 4.2

· CCS CSC 17

· ISO/IEC 27001:2013 A.8.2.3, A.13.1.1, A.13.2.1, A.13.2.3, A.14.1.2, A.14.1.3

Cloud Provider/Use of TLS

Sub Metric

Met2.3.2

2.3.4

PR.DS-4: Does the SME have Adequate bandwidth capacity to ensure availability is maintained for data in the cloud?

HIGH

· COBIT 5 APO13.01

· ISA 62443-3-3:2013 SR 7.1, SR 7.2

· ISO/IEC 27001:2013 A.12.3.1

Administrators/Use of secondary link

Sub Metric

Met2.3.4

2.3.5

PR.DS-5: Does the cloud provider have approved firewall rule sets and access control lists between network fabrics to restrict the flow of information to specific information system services and counter for multi-tenancy?

MEDIUM

· ISO/IEC 27001:2013 A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.3, A.9.4.1, A.9.4.4,

· A.9.4.5, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3

· NIST SP 800-53 Rev. 4 AC-4, AC-5, AC-6, PE-19, PS-3, PS-6, SC-7, SC-8, SC-13, SC-31, SI-4

Cloud Provider

Sub Metric

Met2.3.5

2.3.6

PR.DS-6: Does the SME or cloud provider employ integrity verification tools to monitor and detect unauthorised changes to organisation’s software and information?

LOW

· ISA 62443-3-3:2013 SR 3.1, SR 3.3, SR 3.4, SR 3.8

· ISO/IEC 27001:2013 A.12.2.1, A.12.5.1, A.14.1.2, A.14.1.3

· NIST SP 800-53 Rev. 4 SI-7

Cloud Provider, use of monitoring tools

Sub Metric

Met2.3.6

2.4

Information Protection Processes and Procedures (2.4): Security policies addressing roles, responsibilities, and scope, processes, and procedures are maintained and used to manage protection of information systems and assets.

Metric

Met2.4

2.4.1

PR.IP-1: Does the SME create and maintain configuration of IT control systems for the cloud as well as internal systems?

HIGH

· COBIT 5 BAI10.01, BAI10.02, BAI10.03, BAI10.05

· ISA 62443-2-1:2009 4.3.4.3.2, 4.3.4.3.3

· ISA 62443-3-3:2013 SR 7.6

· ISO/IEC 27001:2013 A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4

· CCS CSC 3, 10

Cloud Provider

Sub Metric

Met2.4.1

2.4.2

PR.IP-2: Does the SME have a System Development Life Cycle to manage cloud and internal systems implemented?

MEDIUM

· COBIT 5 APO13.01

· ISO/IEC 27001:2013 A.6.1.5, A.14.1.1, A.14.2.1, A.14.2.5

· NIST SP 800-53 Rev. 4 SA-3, SA-4, SA-8, SA-10, SA-11, SA-12, SA-15, SA-17, PL-8

SME users

Sub Metric

Met2.4.2