2.5.1 | PR.PT-1: Are all records pertaining to audits and logs of cloud usage documented and reviewed in accordance with the SME’s internal policy? | MEDIUM | · CCS CSC 14 · COBIT 5 APO11.04 · ISO/IEC 27001:2013 A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1 · NIST SP 800-53 Rev. 4 AU Family | Admins to administer logging software or tools | Sub Metric | Met2.5.1 |
2.5.2 | PR.PT-2: Are any removable media used in the SME’s premises protected and its use restricted according to the SME’s policy? | MEDIUM | · COBIT 5 DSS05.02, APO13.01 · ISA 62443-3-3:2013 SR 2.3 · ISO/IEC 27001:2013 A.8.2.2, A.8.2.3, A.8.3.1, A.8.3.3, A.11.2.9 · NIST SP 800-53 Rev. 4 MP-2, MP-4, MP-5, MP-7 | Administrator to enforce rules | Sub Metric | Met2.5.2 |
2.5.3 | PR.PT-3: Is Access to equipment, systems and IT assets controlled in a manner that enforces the least functionality principle? | MEDIUM | · COBIT 5 DSS05.02 · ISA 62443-2-1:2009 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, · ISA 62443-3-3:2013 SR 1.1, SR 1.2, SR 1.3, SR 1.4, SR 1.5, · ISO/IEC 27001:2013 A.9.1.2 · NIST SP 800-53 Rev. 4 AC-3, CM-7 | Administrator to enforce rules | Sub Metric | Met2.5.3 |
3 | DETECT SECURITY INCIDENTS IN THE CLOUD |
|
|
| Group Metric | Met3 |
3.1 | Anomalies and Events (3.1): Unusual or irregular activity is detected in a timely manner and the potential impact of events is understood. |
|
|
| Metric | Met3.1 |
3.1.1 | DE.AE-1: Does the SME manage network operations and data flow for users through the cloud? | LOW | · COBIT 5 DSS03.01 · ISA 62443-2-1:2009 4.4.3.3 · NIST SP 800-53 Rev. 4 AC-4, CA-3, CM-2, SI-4 | Administrator | Sub Metric | Met3.1.1 |
3.1.2 | DE.AE-2: Does the SME have measures to detect events and analyse attacks and methods?
| LOW | · ISA 62443-2-1:2009 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8 · ISA 62443-3-3:2013 SR 2.8, SR 2.9, SR 2.10, SR 2.11, SR · 2.12, SR 3.9, SR 6.1, SR 6.2 · ISO/IEC 27001:2013 A.16.1.1, A.16.1.4 · NIST SP 800-53 Rev. 4 AU-6, CA-7, IR-4, SI-4 | Administrator. Use of IPD/IDS | Sub Metric | Met3.1.2 |
3.1.4 | DE.AE-4: Does the cloud provider give means of determining the impact of events in the cloud? | MEDIUM | · COBIT 5 APO12.06 · NIST SP 800-53 Rev. 4 CP-2, IR-4, RA-3, SI -4 | Cloud Provider | Sub Metric | Met3.1.4 |
3.1.5 | DE.AE-5: Are incident alert thresholds established by the cloud provider for their cloud services? | MEDIUM | · COBIT 5 APO12.06 · ISA 62443-2-1:2009 4.2.3.10 · NIST SP 800-53 Rev. 4 IR-4, IR-5, IR-8 | Cloud Provider | Sub Metric | Met3.1.5 |
3.2 | Security Continuous Monitoring (3.2): The IT systems and assets are monitored at appropriate intervals to identify any security events and to verify the effectiveness of security controls. |
|
|
| Metric | Met3.2 |
3.2.1 | DE.CM-1: Is the LAN and WAN monitored to detect potential cloud security events? | MEDIUM | · CCS CSC 14, 16 · COBIT 5 DSS05.07 · NIST SP 800-53 Rev. 4 AC-2, AU-12, | Administrator. Use network monitoring tools. | Sub Metric | Met3.2.1 |