2.4.3

PR.IP-3: Does the SME have change control processes in place to track changes in the cloud provider’s functionality?

MEDIUM

· COBIT 5 BAI06.01, BAI01.06

· ISA 62443-3-3:2013 SR 7.6

· ISO/IEC 27001:2013 A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4

· NIST SP 800-53 Rev. 4 CM-3, CM-4

Cloud Provider to communicate

Sub Metric

Met2.4.3

2.4.4

PR.IP-4: Does the cloud provider regularly create, test and validate backups of data stored in the cloud?

HIGH

· COBIT 5 APO13.01

· ISA 62443-2-1:2009 4.3.4.3.9

· ISA 62443-3-3:2013 SR 7.3, SR 7.4

· ISO/IEC 27001:2013 A.12.3.1, A.17.1.2A.17.1.3, A.18.1.3

· NIST SP 800-53 Rev. 4 CP-4, CP-6, CP-9

Cloud Provider/Use of offshore backup

Sub Metric

Met2.4.4

2.4.6

PR.IP-6: Is data in the cloud destroyed according to policy and no copies retained without the SMEs knowledge?

· COBIT 5 BAI09.03

Cloud Provider to ensure

Sub Metric

Met2.4.6

HIGH

· ISA 62443-2-1:2009 4.3.4.4.4

· NIST SP 800-53 Rev. 4 MP-6

2.4.8

PR.IP-8: Does the cloud provider share effectiveness of protection technologies with the SME?

LOW

· ISO/IEC 27001:2013 A.16.1.6

· NIST SP 800-53 Rev. 4 AC-21, CA-7, SI-4

Cloud Provider

Sub Metric

Met2.4.8

2.4.9

PR.IP-9: Are Incident Response, Business Continuity and disaster/incident recovery plans) in place and managed well by the cloud provider?

MEDIUM

· COBIT 5 DSS04.03

· ISA 62443-2-1:2009 4.3.2.5.3, 4.3.4.5.1

· ISO/IEC 27001:2013 A.16.1.1, A.17.1.1, A.17.1.2

· NIST SP 800-53 Rev. 4 CP-2, IR-8

SME Owners

Sub Metric

Met2.4.9

2.4.10

PR.IP-10: Are the above-mentioned BC and DR plans tested and validated periodically?

· ISA 62443-2-1:2009 4.3.2.5.7, 4.3.4.5.11

· ISA 62443-3-3:2013 SR 3.3

SME Owners/Admin/Cloud Provider

Sub Metric

Met2.4.10

LOW

· ISO/IEC 27001:2013 A.17.1.3

· NIST SP 800-53 Rev.4 CP-4, IR-3, PM-14

2.4.12

PR.IP-12: Does the SME have a vulnerability management plan in place?

MEDIUM

· ISO/IEC 27001:2013 A.12.6.1, A.18.2.2

· NIST SP 800-53 Rev. 4 RA-3, RA-5, SI-2

SME Owners/ Admin/Cloud Provider

Sub Metric

Met2.4.12

2.4.13

PR.MA-1: Does the SME maintain and repair their IT assets in a timely manner and are these repair and maintenance activities approved and logged?

LOW

· COBIT 5 BAI09.03

· ISA 62443-2-1:2009 4.3.3.3.7

· ISO/IEC 27001:2013 A.11.1.2, A.11.2.4, A.11.2.5

· NIST SP 800-53 Rev. 4 MA-2, MA-3, MA-5

Admins

Sub Metric

Met2.4.13

2.4.14

PR.MA-2: Is Remote maintenance of the SME’s IT assets is approved, logged, and performed in a manner that prevents unauthorised access?

HIGH

· COBIT 5 DSS05.04

· ISA 62443-2-1:2009 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.4.4.6.8

· NIST SP 800-53 Rev. 4 MA-4

Admins

Sub Metric

Met2.4.14

2.5

Protective Technology (2.5): Technical security solutions are managed in a manner that ensures the security and resilience of all IT assets, equipment and systems. Also ensures that the management confers with appropriate policies, procedures, and agreements.

Metric

Met2.5