(ISC)2 - International Information System Security Certification Consortium
A security certification granting organization that has a long history of
... [Show More] certifications that were difficult to get. This difficulty has made their certificates seen as having higher value in the industry.
(ISC)2 Cloud Secure Data Life Cycle
Based on CSA Guidance. 1. Create; 2. Store; 3. Use; 4. Share; 5. Archive; 6. Destroy.
(SAS) 70
_____ was a recognized standard of the American Institute of Certified Public Accountants (AICPA) in response to the issues that also lead to Sarbanes-Oxley (SOX). Deprecated in 2011 by the Statement on Standards for Attestation Engagements (SSAE) No. 16.
AICPA
established SAS 70 and later SAAE 16.
AICPA
American Institute of Certified Public Accountants
Organizational Normative Framework (ONF)
Concepts of ISO 27034. There is only one _____ for an organization but potentially as many ANF's as applications.
ASHRAE - American Society of Heating, Refrigerating and Air-Conditioning Engineers
a professional association seeking to advance heating, ventilation, air conditioning and refrigeration systems design and construction.
Biba
an access control model designed to preserve data integrity. It has 3 goals. Maintain internal and external consistency; prevent unauthorized data modification even by authorized parties; prevent data modification by unauthorized individuals.
Capability Maturity Model (CMM)
a development model where the maturity relates to the formality and optimization of processes. When applied to cloud security it would focus on those aspects as they relate to cloud security.
Child Online Protection Act (COPA)
An attempt to restrict access by minors to material defined as harmful to minors. A permanent injunction against the law in 2009.
Cloud Access Security Brokers (CASBs)
monitors network activity between users and cloud applications and enforces security policy and blocking malware.
Cloud Security Alliance (CSA)
publishes the Notorious Nine: 1) Data breaches; 2) Data Loss; 3) Account service traffic hijacking; 4) Insecure Interfaces and APIs; 5) Denial of Service; 6) Malicious Insiders; 7) Abuse of Cloud Services; 8) Insufficient Due Diligence; 9) Shared technology Vulnerabilities. There are also implications and controls associated with each.
CSA STAR - Cloud Security Alliance (CSA) Security, Trust, and Assurance Registry (STAR)
_______ uses the Consensus Assessments Initiative Questionnaire (CAIQ), Cloud Controls Matrix (CCM), and GDPR Self-Assessment as inputs to certify an organization to Level 1.
Level 2 integrates the CSA Cloud Controls Matrix and the AICPA Trust Service Principles - AT 101 for STAR attestation.
STAR Certification for level to uses the CSA Cloud Controls Matrix and the requirements of the ISO/IEC 27001:2013 management system standard together with the CSA Cloud Controls Matrix.
Certification certificates follow normal ISO/IEC 27001 protocol for a 3rd party assessment.
Cloud Security Alliance Cloud Controls Matrix (CSA CCM)
Composed of 17 domains covering key elements of cloud. It contains 170 objectives within the domains. They integrate with the STAR program.
COBIT or Control Objectives for Information and Related Technologies
a framework for IT governance and management. Initially used to achieve compliance with Sarbanes-Oxley and focused on IT controls. Since 2019 the emphasis has shifted to information governance. It is focused on these 5 principles: 1: Meeting Stakeholder Needs; 2: Covering the Enterprise End-to-End; 3: Applying a Single Integrated Framework; 4: Enabling a Holistic Approach; and 5: Separating Governance from Management.
Common Criteria and the EAL
is assigned to an IT product after it has been evaluated by an independent lab. The level indicates the degree and type of testing with 1 the least and 7 the most. _____ contains 60 functional requirements in 11 classes and is an accepted standard among the military organizations of the US and many allies.
Consensus Assessments Initiative Questionnaire (CAIQ)
an initiative of the Cloud Security Alliance to provide an industry-accepted documentation of security controls and as of 2020 is combined with the Cloud Controls Matrix.
They can be used as evidence for entry to the CSA STAR registry.
Digital Millennium Copyright Act (DMCA)
controversial act intended to align the US copyright act with the requirements of treaties and the World Intellectual Property Organization.
DLP (Data Loss Prevention)
is ensured by a set of tools, procedures, and policy to ensure sensitive, proprietary, and PII is not lost or misused. It helps to provide compliance with numerous laws and compliance requirements by enforcing preventative and detective measures in the organization.
ENISA - European Union Agency for Cybersecurity
a Cyber Security awareness association that provides support, information, and collaboration on security issues. They also publish a top x threats each year. The last few years they have included 15 threats each year.
EU Data Directive
regulates the processing of PII in the EU. Since it is a directive, each country must pass the laws that establish how each country will enforce the directive. It includes the 7 principles governing the OECD's recommendations for protection of personal data.
Eurocloud Star Audit Certification (ESAC)
a nonprofit organization that maintains information security standards or best practices and provides assessments and certification of compliance.
ENISA
European Union Agency for Network and Information Security [Show Less]