C5 2020 Changelog
C5 2020 Changelog
Area Title
C5:2016 C5:2020
- IDM-12 - -
- IDM-13 - -
Cryptography and KRY-01 CRY-01 Policy for the use of
Key Management encryption procedures
(CRY) and key management
- BEI-10 - -
The background of all internal and external employees of the cloud provider
with access to data of the cloud customers or of the shared IT infrastructure
is checked according to the local legislation and regulation by the cloud
provider prior to the start of the employment relationship. To the extent
permitted by law, the security check includes the following areas:
• Verification of the person by means of the identity card
• Verification of the curriculum vitae
• Verification of academic titles and degrees
• Request of a police clearance certificate for sensitive posts in the
company
AM-01:
The assets (e. g. PCs, peripheral devices, telephones, network
components, servers, installation documentation, process instructions, IT
applications, tools) used to render the cloud service are identified and
inventoried.
By means of appropriate processes and safeguards, it is ensured that this
inventory remains complete, correct, up-to-date and consistent. A history of
the changes to the entries in the inventory is kept in a comprehensible
manner. If no effective automatic procedures are established for this, this is
ensured by a manual review of the inventory data of the assets which takes
place at least once a month.
AM-02:
All inventoried assets are assigned to a person responsible on the part of
the cloud provider. The persons responsible of the cloud provider are
responsible over the entire life cycle of the assets to ensure that they are
inventoried completely and classified correctly.
MDM-01:
Policies and instructions with technical and organisational safeguards for
the proper use of mobile terminal devices in the cloud provider's area of
responsibility, which allow access to IT systems for the development and
operation of the cloud service, are documented, communicated and
provided according to SA-01.
These policies and instructions include at least the following aspects,
insofar as they are applicable to the cloud provider's situation:
• Encryption of the devices and data transmission
• Increased access protection
• Extended identity and authorisation management
• Ban on jailbreaking/rooting
• Installation only of approved applications from "App Stores" classified as
trusted
• Bring your own device (BYOD) minimum requirements for private terminal
devices
AM-03:
Policies and instructions with technical and organisational safeguards for
the proper handling of assets are documented, communicated and provided
according to SA-01 in the respectively current version.
AM-05:
The cloud provider uses a uniform classification of information and assets
which are relevant to the development and rendering of the cloud service.
AM-06:
Work instructions and processes for the implemented classification scheme
of information and assets are in place in order to ensure the labeling of
information as well as the corresponding handling of assets. This only
refers to assets which store or process information.
MDM-01:
Policies and instructions with technical and organisational safeguards for
the proper use of mobile terminal devices in the cloud provider's area of
responsibility, which allow access to IT systems for the development and
operation of the cloud service, are documented, communicated and
provided according to SA-01.
These policies and instructions include at least the following aspects,
insofar as they are applicable to the cloud provider's situation:
• Encryption of the devices and data transmission
• Increased access protection
• Extended identity and authorisation management
• Ban on jailbreaking/rooting
• Installation only of approved applications from "App Stores" classified as
trusted
• Bring your own device (BYOD) minimum requirements for private terminal
devices
-
AM-04:
All internal and external employees of the cloud provider are obliged to
return or irrevocably delete all assets which were handed over to them in
relation to the cloud service and/or for which they are responsible as soon
as the employment relationship has been terminated.
MDM-01:
Policies and instructions with technical and organisational safeguards for
the proper use of mobile terminal devices in the cloud provider's area of
responsibility, which allow access to IT systems for the development and
operation of the cloud service, are documented, communicated and
provided according to SA-01.
These policies and instructions include at least the following aspects,
insofar as they are applicable to the cloud provider's situation:
• Encryption of the devices and data transmission
• Increased access protection
• Extended identity and authorisation management
• Ban on jailbreaking/rooting
• Installation only of approved applications from "App Stores" classified as
trusted
• Bring your own device (BYOD) minimum requirements for private terminal
devices
AM-05:
The cloud provider uses a uniform classification of information and assets
which are relevant to the development and rendering of the cloud service.
AM-06:
Work instructions and processes for the implemented classification scheme
of information and assets are in place in order to ensure the labeling of
information as well as the corresponding handling of assets. This only
refers to assets which store or process information.
-
BCM-05:
The supply of the computing centres (e. g. water, electricity, temperature
and moisture control, telecommunications and Internet connection) is
secured, monitored and is maintained and tested at regular intervals in
order to guarantee continuous effectiveness. It has been designed with
automatic fail-safe mechanisms and other redundancies.
Maintenance is performed in compliance with the maintenance intervals
and targets recommended by the suppliers as well as only by personnel
authorised to do so.
Maintenance protocols including any suspected or detected deficiencies are
stored for the duration of the period of time previously agreed upon. After
this period of time has expired, the maintenance protocols are destroyed
properly and permanently:
The logical and physical IT systems which the cloud provider uses for the
development and rendering of the cloud service as well as the network
perimeters which are subject to the cloud provider's area of responsibility
are equipped with anti-virus protection and repair programs which allow for
a signature- and behaviour-based detection and removal of malware.
The programs are updated according to the contractual agreements
concluded with the manufacturer(s), but at least once a day.
RB-12:
The cloud provider maintains a list of all assets critical in terms of logging
and monitoring and reviews this list for their currency and correctness at
regular intervals. For these critical assets, advanced logging and monitoring
safeguards were defined.
SIM-05:
Logged incidents are centrally aggregated and consolidated (event
correlation). Rules for identifying relations between incidents and assessing
them according to their criticality are implemented. These incidents are
handled according to the security incident management process.
The generated logs are stored on central logging servers on which they are
protected against unauthorised access and changes. Logged data must be
deleted immediately once they are no longer required to fulfill the purpose.
Authentication takes place between the logging servers and the logged
assets in order to protect the integrity and authenticity of the transmitted
and stored information. The transmission is encrypted that conforms to the
state of the art or via a separate administration network (out-of-band
management).
The generated logs allow for a clear identification of user access to the
tenant level in order to support (forensic) analyses in the case of a security
incident.
The cloud customer is informed by the cloud provider of the status of the
incidents affecting them in a regular and an appropriate form that
corresponds to the contractual agreements or is involved into
corresponding remedial actions.
As soon as an incident was remedied from the cloud provider's point of
view, the cloud customer is informed of the safeguards taken. This
information is sufficiently detailed so that the cloud customer can use it in
their security management.
The IT systems which the cloud provider uses for the development and
rendering of the cloud service are checked automatically for known
vulnerabilities at least once a month.
In the event of deviations from the expected configurations (for example,
the expected patch level), the reasons for this are analysed in a timely
manner and the deviations remedied or documented according to the
exception process (see SA-03).
System components which are used for the rendering of the cloud service
are hardened according to generally established and accepted industry
standards.
The hardening instructions used are documented as well as the
implementation status.
Data is separated securely and strictly on jointly used virtual and physical
resources (storage network, memory) according to a documented concept
in order to guarantee the confidentiality and integrity of the stored and
processed data.
A role and rights concept based on the business and security requirements
of the cloud provider as well as a policy for the management of system and
data access authorisations are documented, communicated and provided
according to SA-01 and address the following areas:
• Granting and change (provisioning) of data access authorisations on the
basis of the "least-privilege principle" and as is necessary for performing the
required tasks ("need-to-
know principle")
• Separation of functions between operative and controlling functions (also
referred to as "separation of duties")
• Separation of functions in the administration of roles, approval and
granting of data access authorisations
• Regular review of granted authorisations,
• Withdrawal of authorisations (de-provisioning) in case of changes to the
employment relationship
• Requirements for the approval and documentation of the management of
system and data access authorisations
IDM-02:
System access authorisations for users under the responsibility of the cloud
provider (internal and external employees) are granted in a formal
procedure.
Organisational and/or technical safeguards make sure that unique user IDs
which clearly identify each user are granted.
IDM-03:
Granting and change of data access authorisations for users under the
responsibility of the cloud provider comply with the policy for the
management of system and data access authorisations.
Organisational and/or technical safeguards make sure that the granted
access authorisations meet the following requirements:
• Data access authorisations comply with the "least- Privilege principle".
• When granting data access authorisations, only access authorisations
necessary to perform the corresponding tasks should be granted ("need-to-
know principle").
• Formal approval is given by an authorised person, before the data access
authorisations are set up (i. e. before the user can access data of the cloud
customers or components of the shared IT infrastructure).
• Technically assigned data access authorisations do not exceed the formal
approval.
-
IDM-06:
Granting and change of data access authorisations for internal and external
users with administrative or extensive authorisations under the
responsibility of the cloud provider comply with the policy or the
management of system and data access authorisations (see IDM-01) or a
separate policy. The authorisations are granted in a personalised manner
and as is necessary for performing the corresponding tasks ("need-to-know
principle").
Organisational and/or technical safeguards make sure that granting these
authorisations does not result in undesired, critical combinations which
violate the principle of the separation of duties (e. g. assigning
authorisations for the administration of both the database and the operating
system). If this is not possible in certain selected cases, appropriate,
compensating controls are established in order to identify any misuse of
these authorisations (e. g. logging and monitoring by an SIEM (security
information and event management) solution).
IDM-12:
The use of service programs and management consoles (e. g. for the
management of the hypervisor or virtual machines), which allow extensive
access to the data of the cloud customers, is restricted to authorised
persons.
Granting and changes to corresponding data access authorisations comply
with the policy for the management of system and data access
authorisations.
Access is controlled by means of strong authentication techniques,
including multi-factor authentication (see KOS-06).
-
IDM-11:
Security parameters on the network, operating system (host and guest),
database and application level (where relevant to the cloud service) are
configured appropriately to avoid unauthorised access.
If no two-factor authentication or use of one-time passwords is possible, the
use of secure passwords on all levels and devices (including mobile
devices) under the cloud provider's responsibility is forced technically or
must be ensured organisationally in a password policy. The targets must at
least meet the following requirements:
• Minimum password length of 8 characters
• At least two of the following character types must be included: Capital
letters, minor letters, special characters and numbers
• Maximum validity of 90 days, minimum validity of 1 day
• Password history of 6
• Transmission and storage of the passwords in an encrypted procedure
that conforms to the state of the art.
The use of service programs and management consoles (e. g. for the
management of the hypervisor or virtual machines), which allow extensive
access to the data of the cloud customers, is restricted to authorised
persons.
Granting and changes to corresponding data access authorisations comply
with the policy for the management of system and data access
authorisations.
Access is controlled by means of strong authentication techniques,
including multi-factor authentication (see KOS-06).
Based on the results of a risk analysis carried out according to OIS-06, the
cloud provider has implemented technical safeguards which are suitable to
promptly detect and respond to network-based attacks on the basis of
irregular incoming or outgoing traffic patterns (e. g. by MAC spoofing and
ARP poisoning attacks) and/or Distributed Denial- of-Service (DDoS)
attacks.
-
Physical and virtualised network environments are designed and configured
in such a way that the connections between trusted and untrusted networks
must be restricted and monitored.
At defined intervals, it is reviewed whether the use of all services, logs and
ports serve a real commercial purpose. In addition, the review also includes
the justifications for compensating controls for the use of logs which are
considered to be insecure.
PI-01:
In order to guarantee the interoperability of cloud services, data regarding
documented input and output interfaces and in recognised industry
standards (e. g. the Open Virtualization Format for virtual appliances) is
available in order to support the communication between different
components and the migration of applications.
PI-04:
The cloud provider uses secure network protocols for the import and export
of information as well as for the management of the service in order to
ensure the integrity, confidentiality and availability of the transported data.
PI-02:
At the end of the contract, the cloud customer can request the data to
which they are entitled according to the contractual framework conditions,
from the cloud provider and receives them in processable electronic
standard formats such as CSV or XML.
PI-03:
If no individual agreements between the cloud provider and cloud customer
regulate the interoperability and portability of the data, policies and
instructions with technical and organisational safeguards are documented,
communicated and provided according to SA-01 in order to ensure the
respective requirements and duties of the cloud customer.
Both when changing the storage media for maintenance purposes and
upon request of the cloud customer or the termination of the contract
relationship, the content data of the cloud customer, including the data
backups and the meta data (as soon as they are no longer required for the
proper documentation of the accounting and billing), is deleted completely.
The methods used for this (e. g. by overwriting data several times, deletion
of the key) prevent the data from being restored via forensic methods.
Policies and instructions with technical and organisational safeguards for
the proper development and/or procurement of information systems for the
development or operation of the cloud service, including middleware,
databases, operating systems and network components are documented,
communicated and provided according to SA-01.
The policies and instructions describe at least the following aspects:
• Security in software development methods in compliance with security
standards established in the industry (e. g. OWASP for web applications)
• Security of the development environment (e. g. separate
development/test/production environments)
• Programming policies for each programming language used (e. g.
regarding buffer overflows, hiding internal object references towards users)
• Security in version control
BEI-04:
The principal of a change performs a risk assessment beforehand. All
configuration objects which might be affected by the change are assessed
with regard to potential impacts. The result of the risk assessment is
documented appropriately and comprehensively.
BEI-05:
All changes are categorised on the basis of a risk assessment (e. g. as
insignificant, significant or far- reaching impacts) in order to obtain an
appropriate authorisation prior to making the change available to the
production environment.
BEI-06:
All changes are prioritised on the basis of a risk assessment (e. g. as low,
normal, high, emergency) in order to obtain an appropriate authorisation
prior to making the change available to the production environment.
All changes to the cloud service are subjected to tests (e. g. for integration,
regression, security and user acceptance) during the development and
before they are made available to the production environment. The tests
are carried out by adequately qualified personnel of the cloud provider.
According to the service level agreement (SLA), changes are also tested by
the customers (tenants) suitable for this.
-
Procedures for the regular monitoring and review of agreed services and
security requirements of third parties (e.g. service providers and/or
suppliers of the cloud provider) who contribute essential parts to the
development or operation of the cloud service are established.
The safeguards include at least the following aspects:
• Regular review of service reports (e. g. SLA reports) if they are provided
by third
parties
• Review of security-relevant incidents, operational disruptions or failures
and interruptions that are related to the service
• Unscheduled reviews after essential changes to the requirements or
environment. The essentiality must be assessed by the cloud provider and
documented comprehensibly for audits
Identified deviations are subjected to a risk analysis according to
requirement OIS-07 in order to effectively address them by mitigating
safeguards in a timely manner.
-
Policies and instructions with technical and organisational safeguards are
documented, communicated and provided according to SA-01 in order to
ensure a fast, effective and proper response to all known security incidents.
On the part of the cloud provider, at least the roles listed in OIS-03 must be
filled, requirements for the classification, prioritisation and escalation of
security incidents defined and interfaces with the incident management and
the business continuity management created.
In addition to this, the cloud provider has established a "computer
emergency response team" (CERT), which contributes to the coordinated
solution of specific security incidents. Customers affected by security
incidents are informed in a timely manner and appropriate form.
Mechanisms are in place to be able to measure and monitor the type and
scope of the security incidents as well as to report them to supporting
bodies. The information gained from the evaluation is used to identify
recurring incidents or incidents involving significant consequences and to
determine the need for advanced safeguards.
The business impact analysis as well as the business continuity plans and
contingency plans are verified, updated and tested at regular intervals (at
least once a year) or after essential organisational or environment-related
changes. The tests also involve affected customers (tenants) and relevant
third parties (e. g. critical suppliers). The tests are documented and results
are taken into account for future business continuity safeguards.
SPN-02:
Qualified personnel (e. g. internal revision) of the cloud provider or expert
third parties commissioned by the cloud provider audit the compliance of
the internal IT processes with the corresponding internal policies and
standards as well as the legal, regulatory and statutory prescribed
requirements relevant to the cloud service on an annual basis.
The deviations identified are prioritised and, depending on their criticality,
safeguards for their elimination are defined, followed up and implemented
in a timely manner.
SPN-03:
At least on an annual basis, qualified personnel (e. g. internal revision) of
the cloud provider or expert third parties commissioned by the cloud
provider audit the compliance of the IT systems, provided that they are
completely or partially in the cloud provider's area of responsibility and are
relevant to the development or operation of the cloud service, with the
corresponding internal policies and standards as well as the legal,
regulatory and statutory prescribed requirements relevant to the cloud
service.
The deviations identified are prioritised and, depending on their criticality,
safeguards for their elimination are defined, followed up and implemented
in a timely manner.
COM-03:
Audits and assessments of processes, IT systems and IT components,
provided that they are completely or partially in the cloud provider's area of
responsibility and are relevant to the development or operation of the cloud
service, are carried out by independent third parties (e. g. certified public
auditor) at least once a year in order to identify non-conformities with
legally, regulatory and statutory prescribed requirements. The deviations
identified are prioritised and, depending on their criticality, safeguards for
their elimination are defined, followed up and implemented in a timely
manner.
-
-
-
-
-
-
-
Secret authentication credentials (e. g. passwords, certificates, security
token) is assigned to internal and external users of the cloud provider or
cloud customer, provided that this is subject to organisational or technical
procedures of the cloud provider, in a proper organised procedure which
ensures the confidentiality of the information.
If it is assigned initially, it is valid only temporarily, but not longer than 14
days. Moreover, users are forced to change it when using it for the first
time. Access of the cloud provider to the authentication information of the
cloud customer is strictly regulated, communicated with the cloud customer
and only takes place if it is necessary to perform the corresponding tasks
("need-to-know principle").
Access is documented and reported to the cloud customer.
The use of emergency users (for activities which cannot be carried out with
personalised, administrative users, see IDM-06) is documented, to be
justified and requires the approval by an authorised person, which takes the
principle of the separation of functions into account. The emergency user is
only activated as long as it is necessary to perform the corresponding
tasks.
-
-
• the security objectives and the desired security level, based on the
business goals and tasks of the Cloud Service Provider;
• the most important aspects of the security strategy to achieve the security
objectives set; and
• Vulnerabilities;
• Malfunctions.
The type and scope of the documentation is geared towards the information
requirements of the subject matter experts of the affected organisations in
order to carry out the activities appropriately (e.g. definition of roles and
responsibilities in guidelines, description of cooperation obligations in
service descriptions and contracts).
The risk assessment covers the following areas, insofar as these are
applicable to the provision of the Cloud Service and are in the area of
responsibility of the Cloud Service Provider:
Policies and instructions (incl. concepts and guidelines) are derived from
the information security policy and are documented according to a uniform
structure. They are communicated and made available to all internal and
external employees of the Cloud Service Provider in an appropriate
manner.
The policies and instructions are version controlled and approved by the top
management of the Cloud Service Provider or an authorised body.
• Objectives;
• Scope;
The competency and integrity of all internal and external employees of the
Cloud Service Provider with access to cloud customer data or system
components under the Cloud Service Provider's responsibility who are
responsible to provide the cloud service in the production environment shall
be verified prior to commencement of employment in accordance with local
legislation and regulation by the Cloud Service Provider.
To the extent permitted by law, the review will cover the following areas:
The Cloud Service Provider's internal and external employees are required
by the employment terms and conditions to comply with applicable policies
and instructions relating to information security.
The information security policy, and the policies and instructions based on
it, are to be acknowledged by the internal and external personnel in a
documented form before access is granted to any cloud customer data or
system components under the responsibility of the Cloud Service Provider
used to provide the cloud service in the production environment.
The Cloud Service Provider operates a target group-oriented security
awareness and training program, which is completed by all internal and
external employees of the Cloud Service Provider on a regular basis. The
program is regularly updated based on changes to policies and instructions
and the current threat situation and includes the following aspects:
• Consideration of the nature and severity of the violation and its impact.
The internal and external employees of the Cloud Service Provider are
informed about possible disciplinary measures.
The Cloud Service Provider must inform the internal employees, external
service providers and suppliers and obtain confirmation of the updated
confidentiality or non-disclosure agreement.
Assets are recorded with the information needed to apply the Risk
Management Procedure (Cf. OIS-07), including the measures taken to
manage these risks throughout the asset lifecycle. Changes to this
information are logged.
Policies and instructions for acceptable use and safe handling of assets are
documented, communicated and provided in accordance with SP-01 and
address the following aspects of the asset lifecycle as applicable to the
asset:
• Inventory;
• Handling of software for which support and security patches are not
available anymore;
The Cloud Service Provider has an approval process for the use of
hardware to be commissioned, which is used to provide the cloud service in
the production environment, in which the risks arising from the
commissioning are identified, analysed and mitigated. Approval is granted
after verification of the secure configuration of the mechanisms for error
handling, logging, encryption, authentication and authorisation according to
the intended use and based on the applicable policies.
The security requirements for data centres are based on criteria which
comply with established rules of technology. They are suitable for
addressing the following risks in accordance with the applicable legal and
contractual requirements:
• Faults in planning;
• Unauthorised access;
• Insufficient surveillance;
• Insufficient air-conditioning;
• Water;
The structural shell of premises and buildings related to the cloud service
provided are physically solid and protected by adequate security measures
that meet the security requirements of the Cloud Service Provider (cf. PS-
01 Security Concept).
The outer doors, windows and other construction elements reach a level
appropriate to the security requirements and withstand a burglary attempt
for at least 10 minutes.
• Existence and nature of access logging that enables the Cloud Service
Provider, in the sense of an effectiveness audit, to check whether only
defined personnel have entered the premises and buildings related to the
cloud service provided.
Premises and buildings related to the cloud service provided are protected
from fire and smoke by structural, technical and organisational measures
that meet the security requirements of the Cloud Service Provider (cf. PS-
01 Security Concept) and include the following aspects:
a) Structural Measures:
b) Technical Measures:
• Early fire detection with automatic voltage release. The monitored areas
are sufficiently fragmented to ensure that the prevention of the spread of
incipient fires is proportionate to the maintenance of the availability of the
cloud service provided;
c) Organisational Measures
The operating parameters of the technical utilities (cf. PS-06) and the
environmental parameters of the premises and buildings related to the
cloud service provided are monitored and controlled in accordance with the
security requirements of the Cloud Service Provider (cf. PS-01 Security
Concept). When the permitted control range is exceeded, the responsible
departments of the Cloud-Provider are automatically informed in order to
promptly initiate the necessary measures for return to the control range.
Policies and instructions for data backup and recovery are documented,
communicated and provided in accordance with SP-01 regarding the
following aspects.
• The extent and frequency of data backups and the duration of data
retention are consistent with the contractual agreements with the cloud
customers and the Cloud Service Provider's operational continuity
requirements for Recovery Time Objective (RTO) and Recovery Point
Objective (RPO);
The Cloud Service Provider has established policies and instructions that
govern the logging and monitoring of events on system components within
its area of responsibility. These policies and instructions are documented,
communicated and provided according to SP-01 with respect to the
following aspects:
• No commercial use;
• Immediate deletion if the purposes of the collection are fulfilled and further
storage is no longer necessary.
The requirements for the logging and monitoring of events and for the
secure handling of metadata are implemented by technically supported
procedures with regard to the following restrictions:
The logging data is automatically monitored for events that may violate the
protection goals in accordance with the logging and monitoring
requirements. This also includes the detection of relationships between
events (event correlation).
The Cloud Service Provider retains the generated log data and keeps these
in an appropriate, unchangeable and aggregated form, regardless of the
source of such data, so that a central, authorised evaluation of the data is
possible. Log data is deleted if it is no longer required for the purpose for
which they were collected.
The Cloud Service Provider monitors the system components for logging
and monitoring in its area of responsibility. Failures are automatically and
promptly reported to the Cloud Service Provider’s responsible departments
so that these can assess the failures and take required action.
The Cloud Service Provider has penetration tests carried out by qualified
internal personnel or external service providers at least once a year. The
penetration tests are carried out according to a documented test
methodology and include the system components relevant to the provision
of the cloud service in the area of responsibility of the Cloud Service
Provider, which have been identified as such in a risk analysis.
The Cloud Service Provider assess the severity of the findings made in
penetration tests according to defined criteria.
The Cloud Service Provider periodically informs the cloud customer on the
status of incidents affecting the cloud customer, or, where appropriate and
necessary, involve the customer in the resolution, in a manner consistent
with the contractual agreements.
Cloud customer data stored and processed on shared virtual and physical
resources is securely and strictly separated according to a documented
approach based on OIS-07 risk analysis to ensure the confidentiality and
integrity of this data.
A role and rights concept based on the business and security requirements
of the Cloud Service Provider as well as a policy for managing user
accounts and access rights for internal and external employees of the
Cloud Service Provider and system components that have a role in
automated authorisation processes of the Cloud Service Provider are
documented, communicated and made available according to SP-01:
• Granting and modifying user accounts and access rights based on the
“least-privilege- principle” and the “need-to-know” principle;
Specified procedures for granting and modifying user accounts and access
rights for internal and external employees of the Cloud Service Provider as
well as for system components involved in automated authorisation
processes of the Cloud Service Provider ensure compliance with the role
and rights concept as well as the policy for managing user accounts and
access rights.
User accounts of internal and external employees of the Cloud Service
Provider as well as for system components involved in automated
authorisation processes of the Cloud Service Provider are automatically
locked if they have not been used for a period of two months. Approval from
authorised personnel or system components are required to unlock these
accounts.
Locked user accounts are automatically revoked after six months. After
revocation, the procedure for granting user accounts and access rights (cf.
IDM-02) must be repeated.
Access rights are promptly revoked if the job responsibilities of the Cloud
Service Provider's internal or external staff or the tasks of system
components involved in the Cloud Service Provider's automated
authorisation processes change. Privileged access rights are adjusted or
revoked within 48 hours after the change taking effect. All other access
rights are adjusted or revoked within 14 days. After revocation, the
procedure for granting user accounts and access rights (cf. IDM-02) must
be repeated.
Activities of users with privileged access rights are logged in order to detect
any misuse of privileged access in suspicious cases. The logged
information is automatically monitored for defined events that may indicate
misuse. When such an event is identified, the responsible personnel are
automatically informed so that they can promptly assess whether misuse
has occurred and take corresponding action. In the event of proven misuse
of privileged access rights, disciplinary measures are taken in accordance
with HR-04.
The cloud customer is informed by the Cloud Service Provider whenever
internal or external employees of the Cloud Service Provider read or write
to the cloud customer's data processed, stored or transmitted in the cloud
service or have accessed it without the prior consent of the cloud customer.
The Information is provided whenever data of the cloud customer is/was not
encrypted, the encryption is/was disabled for access or the contractual
agreements do not explicitly exclude such information. The information
contains the cause, time, duration, type and scope of the access. The
information is sufficiently detailed to enable subject matter experts of the
cloud customer to assess the risks of the access. The information is
provided in accordance with the contractual agreements, or within 72 hours
after the access.
-
Policies and instructions with technical and organisational safeguards for
encryption procedures and key management are documented,
communicated and provided according to SP-01, in which the following
aspects are described:
• Risk-based provisions for the use of encryption which are aligned with the
data classification schemes and consider the communication channel, type,
strength and quality of the encryption;
• If pre-shared keys are used, the specific provisions relating to the safe use
of this procedure are specified separately.
Based on the results of a risk analysis carried out according to OIS-06, the
Cloud Service Provider has implemented technical safeguards which are
suitable to promptly detect and respond to network-based attacks on the
basis of irregular incoming or outgoing traffic patterns and/or Distributed
Denial- of-Service (DDoS) attacks. Data from corresponding technical
protection measures implemented is fed into a comprehensive SIEM
(Security Information and Event Management) system, so that (counter)
measures regarding correlating events can be initiated. The safeguards are
documented, communicated and provided in accordance with SP-01.
• in which cases the security zones are to be separated and in which cases
cloud customers are to be logically or physically segregated;
• how the data traffic for administration and monitoring is segregated from
each on network level;
The type and scope of the documentation on the interfaces is geared to the
needs of the cloud customers' subject matter experts in order to enable the
use of these interfaces. The information is maintained in such a way that it
is applicable for the cloud service's version which is intended for productive
use.
• Type, scope and format of the data the Cloud Service Provider provides to
the cloud customer;
The Cloud Service Provider's procedures for deleting the cloud customers'
data upon termination of the contractual relationship ensure compliance
with the contractual agreements (cf. PI-02).
The policies and instructions contain guidelines for the entire life cycle of
the cloud service and are based on recognised standards and methods with
regard to the following aspects:
The Cloud Service Provider provides a training program for regular, target
group-oriented security training and awareness for internal and external
employees on standards and methods of secure software development and
provision as well as on how to use the tools used for this purpose. The
program is regularly reviewed and updated with regard to the applicable
policies and instructions, the assigned roles and responsibilities and the
tools used.
The type and scope of the tests correspond to the risk assessment. The
tests are carried out by appropriately qualified personnel of the Cloud
Service Provider or by automated test procedures that comply with the
state-of-the-art. Cloud customers are involved into the tests in accordance
with the contractual requirements.
The severity of the errors and vulnerabilities identified in the tests, which
are relevant for the deployment decision, is determined according to
defined criteria and actions for timely remediation or mitigation are initiated.
System components and tools for source code management and software
deployment that are used to make changes to system components of the
cloud service in the production environment are subject to a role and rights
concept according to IDM-01 and authorisation mechanisms. They must be
configured in such a way that all changes are logged and can therefore be
traced back to the individuals or system components executing them.
Policies and instructions for controlling and monitoring third parties (e.g.
service providers or suppliers) whose services contribute to the provision of
the cloud service are documented, communicated and provided in
accordance with SP-01 with respect to the following aspects:
• Company name;
• Address;
The Cloud Service Provider has defined and documented exit strategies for
the purchase of services where the risk assessment of the service providers
and suppliers regarding the scope, complexity and uniqueness of the
purchased service resulted in a very high dependency (cf. Supplementary
Information).
Exit strategies are aligned with operational continuity plans and include the
following aspects:
#N/A
Subject matter experts of the Cloud Service Provider, together with external
security providers where appropriate, classify, prioritise and perform root-
cause analyses for events that could constitute a security incident.
Mechanisms are in place to measure and monitor the type and scope of
security incidents and to report them to support agencies. The information
obtained from the evaluation is used to identify recurrent or significant
incidents and to identify the need for further protection.
The top management (or a member of the top management) of the Cloud
Service Provider is named as the process owner of business continuity and
emergency management and is responsible for establishing the process
within the company as well as ensuring compliance with the guidelines.
They must ensure that sufficient resources are made available for an
effective process.
Business continuity plans and contingency plans take the following aspects
into account:
• Accessibility and comprehensibility of the plans for persons who are to act
accordingly;
Basic Criterion
The Cloud Service Provider provides cloud customers with guidelines and
recommendations for the secure use of the cloud service provided. The
information contained therein is intended to assist the cloud customer in the
secure configuration, installation and use of the cloud service, to the extent
applicable to the cloud service and the responsibility of the cloud user.
The type and scope of the information provided will be based on the needs
of subject matter experts of the cloud customers who set information
security requirements, implement them or verify the implementation (e.g. IT,
Compliance, Internal Audit). The information in the guidelines and
recommendations for the secure use of the cloud service address the
following aspects, where applicable to the cloud service:
• Authentication mechanisms;
The procedures for identifying such vulnerabilities are part of the software
development process and, depending on a risk assessment, include the
following activities:
• Code reviews by the Cloud Service Provider's subject matter experts; and
• Which data, services or functions available to the cloud user within the
cloud service, have been accessed by whom and when (Audit Logs);
If the cloud customer is responsible for the activation or type and scope of
logging, the Cloud Service Provider must provide appropriate logging
capabilities.
The Cloud Service Provider provides cloud users with a roles and rights
concept for managing access rights. It describes rights profiles for the
functions provided by the cloud service.
The rights profiles are suitable for enabling cloud users to manage access
authorisations and permissions in accordance with the principle of least-
privilege and how it is necessary for the performance of tasks ("need-to-
know principle") and to implement the principle of functional separation
between operational and controlling functions ("separation of duties").
The Cloud Service Provider validates the functionality of the SDN functions
before providing new SDN features to cloud users or modifying existing
SDN features. Identified defects are assessed and corrected in a risk-
oriented manner.
If cloud customers operate virtual machines or containers with the cloud
service, the Cloud Service Provider must ensure the following aspects:
Basic criterion created on the basis of the previous optional, more extensive
requirement PS-04.
The basic requirement was divided into two basic criteria, which focus on
the contents of a concept and the implementation of this concept.
The previously required use of virus protection and repair programs, which
enable signature- and behavior-based detection and removal of malware,
was made more general in order to also enable the use of other protection
mechanisms that provide protection against malware.
For better readability, the relevant aspects have been provided with bullet
points.
For the scope and frequency of data backups, it was added that they must
meet the requirements for operational continuity of the Cloud Service
Provider.
Encryption of the data backup was previously an optional requirement,
which has now been incorporated into the basic criterion.
The part of the previous basic requirement for handling errors has been
adapted to the formulation for handling deviations in other basic criteria.
For better readability, the relevant aspects have been provided with bullet
points.
The aspects of time synchronisation and compliance with legal and
regulatory framework requirements were added.
For better readability, the relevant aspects have been provided with bullet
points. No extension of content.
Basic criterion newly included to ensure that within the scope of an audit
the implementation of the concepts required by OPS-10 and OPS-11 also
occurs.
The previous basic requirement RB-12 strongly interfered with the design of
the controls at the Cloud Service Provider without defining in more detail
what is meant by "dvanced logging and monitoring safeguards". Therefore
It was removed.
The previous basic requirement SIM-05 has been reclassified to the area of
regular operation and revised in such a way that it does not refer to an
explicit process, but generally requires the introduction of necessary
measures.
a) The Cloud Service Provider shall assess the level of severity of the
findings made in penetration tests according to defined criteria.
The revised basic criterion now deals more specifically with the treatment of
deviations, including a time limit for treatment.
The part on measures for critical authorization combinations that violate the
principle of separation of functions, which was previously designed
relatively open, has been defined more specifically.
No change.
No change.
No change.
Only references to other basic criteria updated, no change in content.
The basic requirements PI-01 and PI-04 were consolidated into one basic
criterion and a reference to the criteria for encryption was established
again.
In its previous form, the basic requirement was not applicable to all cloud
services. The focus was placed on providing meaningful documentation on
the interfaces used for this purpose.
The basic requirements PI-02 and PI-03 have been consolidated into one
basic criterion. The relevant contractual aspects will be more strongly
focused on than before. The previously required guidelines were rather
unusual in this area.
The previously required data deletion of data on data media is now part of
asset management (see basic criterion "AM-04 Decommissioning of
hardware").
The data deletion of cloud customers is now based on compliance with the
relevant contractual agreements.
The sentences have been shortened to make the basic criterion easier to
understand.
The basic criterion was revised according to the requirements of ISO/IEC
27034 and OWASP Secure Software Development Lifecycle.
Explicit checks for the existence of known vulnerabilities are now required.
The following aspects were added:
- Requirements for the proper information of cloud customers about the
type and scope of the change as well as the resulting obligations to
cooperate in accordance with the contractual agreements
- Requirements for the implementation and documentation of emergency
modifications, which must meet the same level of safety as normal
modifications.
It is explicitly allowed that automated test procedures can also be used, not
only manual (by humans).
The Basic Criterion has been extended to include the aspect of dealing with
identified errors and vulnerabilities.
This basic requirement has been deleted, as for emergency changes the
requirements are basically the same as for all other changes. Deviations
must now be regulated by the service provider in the change management
guideline (see change description in DEV-03). The previous basic
requirement related to the documentation of such changes. It intervened in
the design of the controls at the service provider.
The basic criterion has been extended to include the aspect of preventing
the spread of malware.
Due to the changes in the other basic criteria in this area, the former basic
requirement became obsolete.
• Requirements for the classification of third parties on the basis of the risk
assessment by the Cloud Service Provider and the determination of
whether the third party is a subcontractor (cf. Supplementary Information);
No change.
Restrict the reporting of security events to those directly related to the cloud
service provided by the Cloud Service Provider.
The previous basic requirement SIM-05 has been reclassified to the area of
Operations, see basic criterion OPS-13.
No change.
The previous basic requirement COM-03 has been deleted, since Cloud
Service Providers who are regularly audited according to this catalogue of
criteria fulfill them anyway.
Basic criterion based on the EU Cyber Security Act, Article 55 1.a newly
included.
Basic criterion newly included.
Basic criterion based on the EU Cyber Security Act, Article 55 1.d newly
included.
Basic criterion based on the EU Cyber Security Act, Article 55 1.e newly
included.
Basic criterion newly included in line with the existing basic requirement
IDM-01 regarding the users in the cloud customer's area of responsibility.
Basic criterion based on CSA Security Guidance for Critical Areas of Focus
in Cloud Computing v4.0, Section 7.2 newly included.
Basic criterion based on CSA Security Guidance for Critical Areas of Focus
in Cloud Computing v4.0, Section 8, p. 93 newly included.
-
Parameters of the top management for the risk appetite and the risk
tolerances of the cloud provider are included in the policy for the risk
management or a comparable official document. The timely implementation
of the mitigating safeguards is monitored by qualified personnel of the cloud
provider. The top management is informed of the status of the identified
risks and mitigating safeguards at least once every three months and in an
appropriate form.
-
The regular review is followed up by central bodies at the cloud provider.
Special approval procedure in the hiring process for employees and posts
for which particularly sensitive information is accessed are established.
-
The programme takes different profiles into account and includes further
information for posts and employees who have extensive authorisations or
access to sensitive data.
External employees of service providers and suppliers of the cloud
provider, who contribute to the development or operation of the cloud
service, are instructed in the specific security requirements of the cloud
provider as well as generally in the subject of information security.
The cloud provider checks on a random basis that the service providers
and suppliers have carried out the instruction in an appropriate manner.
The results of the audit are documented comprehensibly.
-
If adjustments to the non-disclosure or confidentiality agreements result
from the review, the internal and external employees of the cloud provider
must be informed about this and new confirmations shall be obtained.
AM-01:
In the event of a failure of assets which are of essential importance for the
availability of the cloud service (e. g. central network components), the
cloud provider is able to promptly detect which cloud customers are
affected by this in order to ensure a response to the malfunctions occurred
that complies with the service level agreement.
By means of technical safeguards, it is ensured that the inventory of the
assets is updated automatically at regular intervals.
MDM-01:
Central management and monitoring is performed by means of MDM
solutions, including a possibility for remote deletion.
A site plausibility check of the access is carried out.
An inventory list of mobile terminal devices with access to the cloud service
(among other things, with information of the operating system and patch
status, assigned employees, approval regarding BYOD) is maintained (see
AM-01).
MDM-01:
Central management and monitoring is performed by means of MDM
solutions, including a possibility for remote deletion.
A site plausibility check of the access is carried out.
An inventory list of mobile terminal devices with access to the cloud service
(among other things, with information of the operating system and patch
status, assigned employees, approval regarding BYOD) is maintained (see
AM-01).
-
MDM-01:
Central management and monitoring is performed by means of MDM
solutions, including a possibility for remote deletion.
A site plausibility check of the access is carried out.
An inventory list of mobile terminal devices with access to the cloud service
(among other things, with information of the operating system and patch
status, assigned employees, approval regarding BYOD) is maintained (see
AM-01).
-
-
The security concept includes the setup of different security zones which
are separated by security lines as monitored and secured gateways
between the zones.
The physical site access controls require two-factor authentication.
The environmental parameters are monitored. If the tolerable control range
is exceeded from below or above, alarm messages are generated and
forwarded to the responsible bodies.
PS-04:
The supply services are monitored. If the tolerable control range is
exceeded from below or above, alarm messages are generated and
forwarded to the responsible bodies. The cloud provider determines and
communicates the times of self- sufficient supply which are achieved by the
safeguards taken if the supply services fail or if extraordinary
events occur (e. g. heat waves, long lasting power failure) as well as the
maximum tolerable times for a failure of the supply services.
Contracts for maintaining the precautions with corresponding service
providers have been concluded (e. g. for the fuel of the emergency power
supply).
BCM-05:
Simulated failures of the supply of computing centres are integrated into the
drills (see BCM-03).
The forecasts are taken into account in coordination with the service level
agreement for the planning and preparation of the provisioning.
To monitor the capacity and the availability, the cloud customer is provided
with relevant information via a self-service portal.
The cloud provider draws up regular reports on the performed audits, which
are reviewed and analysed by authorised bodies or committees.
Policies and instructions describe the technical safeguards for the secure
configuration and monitoring of the management console (both the self-
service of the customer and the cloud administration of the service
provider) in order to protect them against malware.
The update is performed with the highest frequency that is contractually
offered by the manufacturer(s).
The cloud provider draws up regular reports on the performed audits, which
are reviewed and analysed by authorised bodies or committees.
Policies and instructions describe the technical safeguards for the secure
configuration and monitoring of the management console (both the self-
service of the customer and the cloud administration of the service
provider) in order to protect them against malware.
The update is performed with the highest frequency that is contractually
offered by the manufacturer(s).
The data is backed up in encrypted form that conforms to the current state
of the art.
To monitor the data backup, the cloud customer is provided with the
relevant logs or the summary of the results via a self-service portal.
Upon customer request, the cloud provider informs the cloud customers of
the results of the restoration tests. Restoration tests are incorporated into
the business continuity management of the cloud provider.
-
-
Upon request of the cloud customer, the cloud provider offers customer-
specific logging (in terms of the scope and duration of the storage) and
makes it available to the customer.
Depending on the protection requirements and technical feasibility, the
logged data and the user data should be separated logically or physically.
Upon request of the cloud customer, the cloud provider makes the logs
affecting them available promptly and in an appropriate form so that they
can examine the incidents affecting them themselves.
The tests are carried out every six months. They must always be performed
by independent external auditors. Internal personnel for penetration tests
may support the external service providers.
-
Upon customer request, the cloud provider informs the cloud customer of
open vulnerabilities in an appropriate form.
The open vulnerabilities are remedied promptly without exception.
Upon request, the cloud customer must be informed of the standards used
and the safeguards taken to harden the system components.
IDM-02:
The cloud provider offers self- service options for cloud customers in order
to be able to grant user IDs independently.
IDM-03:
The cloud provider offers self- service options for cloud customers in order
to be able to grant and change user data access authorisations
independently.
-
-
-
The users sign a declaration in which they assure that they will treat
personal (or shared) authentication information confidentially and keep it
private (within the members of the group).
IDM-11:
Automatic controls are implemented, which are based on the following
rules:
• There is a lock of 15 minutes after 5 failed login attempts and the waiting
time is increased with each failed login attempt.
• Multiple logins of one and the same user are not possible.
• Upon login, there is an automatic lock after 15 minutes of inactivity.
• The minimum password length of privileged users is 14 characters and 8
characters for users without wide-ranging authorisations.
• Capital letters, lower-case letters, special characters and numbers must
be included.
• After 90 days, the user is forced to change the password with the next
login.
• Password history is 12.
-
-
-
-
-
-
-
-
-
For the procurement, products which were certified according to the
"Common Criteria for Information Technology Security Evaluation"
(abbreviated: Common Criteria - CC) according to evaluation level EAL 4
are preferred.
If uncertified products are procured although certified products are
available, this must be documented and justified.
-
-
-
-
-
-
-
Interfaces for an automated real- time monitoring of the service (minimum
capacity, availability as well as elimination of malfunctions) are established
to be able to monitor compliance with the service level agreements agreed
upon and to promptly respond to deviations. At least once a year, an audit
is performed by independent, external auditors or qualified personnel of the
cloud provider in order to review the effectiveness of the controls
established at the service provider, which are related to the contract
relationship, as well as the security requirements agreed upon.
Evidence can be demonstrated, for example in the form of reports
according to ISAE 3402/IDW PS 951.
The prompt addressing of audit findings is followed up by the cloud
provider.
-
Instructions are given as to how data of a suspicious system can be
collected in the event of a security incident so that it can be used as
evidence.
Moreover, there are analysis plans for typical security incidents as well as
an evaluation method so that the information collected will not lose its
evidentiary value during a subsequent legal appraisal.
The customer can either actively agree to solutions or the solution is agreed
upon after a certain period of time has expired.
Information about security incidents or confirmed security violations is made
available to all affected customers.
It is contractually agreed upon between the cloud provider and the cloud
customer which data is made available to the cloud customer for their own
analysis in the event of security incidents.
-
-
-
-
In addition to the tests, drills are also carried out, which are, among other
things, based on scenarios resulting from security incidents that have
already occurred in the past.
-
The cloud provider has taken precautions for unscheduled audits.
SPN-02:
The audit is carried out at least every six months.
The audit also includes the compliance with the requirements of C5.
SPN-03:
Upon request of the cloud customer, the cloud provider provides
information of the results, impacts and risks of these audits and
assessments in an appropriate form. The cloud provider commits their
subcontractors to such audits, asks for the submission of the audit reports
in the same intervals and uses them for their own audits.
COM-03:
Upon request of the cloud customer, the cloud provider provides
information of the results, impacts and risks of these audits and
assessments in an appropriate form. If necessary, unscheduled audits can
be carried out by independent third parties.
-
-
-
-
-
-
-
The users sign a declaration in which they assure that they will treat
personal (or shared) authentication information confidentially and keep it
private (within the members of the group).
At least once a month, the activations of the emergency users and the
corresponding approvals are compared manually. Irregularities are
examined in order to determine any misuse of these users and to avoid this
in the future.
The activities of the emergency users are logged in an audit-proof manner.
The logging is sufficiently detailed so that an expert third party is able to
comprehend the activities.
-
-
-
Additional Criteria
C5:2020
-
-
-
-
-
-
-
The learning outcomes achieved through the awareness and training
programme are measured and evaluated in a target group-oriented
manner. The measurements cover quantitative and qualitative aspects. The
results are used to improve the awareness and training programme.
-
If the review results in adjustments to the confidentiality or non-disclosure
agreements, the Cloud Service Provider's internal and external employees
must be notified, and new confirmations must be obtained.
-
Physical assets of internal and external employees are managed centrally.
Logging and monitoring applications take the asset protection needs into
account in order to inform the responsible stakeholder of events that could
lead to a violation of the protection goals, so that the necessary measures
are taken with an appropriate priority. Actions for events on assets with a
higher level of protection take precedence over events on assets with a
lower need for protection.
The security requirements include time constraints for self-sufficient
operation in the event of exceptional events (e.g. prolonged power outage,
heat waves, low water in cold river water supply) and maximum tolerable
utility downtime.
The time limits for self-sufficient operation provide for at least 48 hours in
the event of a failure of the external power supply.
The cloud service is provided from more than two locations that provide
each other with redundancy. The locations are sufficiently far apart to
achieve georedundancy. If two locations fail at the same time, at least one
third location is still available to prevent a total service failure. The
georedundancy is designed in a way that ensures that the availability
requirements specified in the service level agreement are met.. The
functionality of the redundancy is checked at least annually by suitable tests
and exercises (cf. BCM-04 - Verification, updating and testing of business
continuity).
The cooling supply is designed in such a way that the permissible operating
and environmental parameters are also ensured on at least five
consecutive days with the highest outside temperatures measured to date
within a radius of at least 50 km around the locations of the premises and
buildings, with a safety margin of 3 K (in relation to the outside
temperature). The Cloud Service Provider has previously determined the
highest outdoor temperatures measured to date (cf. PS-00-1 Security
Concept).
The relevant logs or summarised results are available to the cloud customer
in a self-service portal for monitoring the data backup.
At the customer's request, the Cloud Service Provider inform the cloud
customer of the results of the recovery tests. Recovery tests are embedded
in the Cloud Service Provider's emergency management.
-
Personal data is automatically removed from the log data before the Cloud
Service Provider processes it as far as technically possible. The removal is
done in a way that allows the Cloud Service Provider to continue to use the
log data for the purpose for which it was collected.
The system components for logging and monitoring are designed in such a
way that the overall functionality is not restricted if individual components
fail.
The tests are carried out every six months. They must always be performed
by independent external auditors. Internal personnel for penetration tests
may support the external service providers.
-
-
Access to the data processed, stored or transmitted in the cloud service by
internal or external employees of the Cloud Service Provider requires the
prior consent of an authorised department of the cloud customer, provided
that the cloud customer's data is not encrypted, encryption is disabled for
access, or contractual agreements do not explicitly exclude such consent.
For the consent, the cloud customer's department is provided with
meaningful information about the cause, time, duration, type and scope of
the access supporting assessing the risks associated with the access.
The users sign a declaration in which they assure that they treat personal
(or shared) authentication information confidentially and keep it exclusively
for themselves (within the members of the group).
Access to the non-production environment requires two-factor or multi-
factor authentication. Within the non-production environment, users are
authenticated using passwords, digitally signed certificates, or procedures
that provide at least an equivalent level of security.
-
-
The private keys used for encryption are known to the customer exclusively
and without exception in accordance with applicable legal and regulatory
obligations and requirements.
-
-
-
-
In procurement, products are preferred which have been certified according
to the "Common Criteria for Information Technology Security Evaluation"
(short: Common Criteria - CC) according Evaluation Assurance Level EAL
4. If non-certified products are to be procured for available certified
products, a risk assessment is carried out in accordance with OIS-07.
-
-
-
-
-
The procedures for monitoring compliance with the requirements are
supplemented by automatic procedures relating to the following aspects:
-
There are instructions as to how the data of a suspicious system can be
collected in a conclusive manner in the event of a security incident. In
addition, there are analysis plans for typical security incidents and an
evaluation methodology so that the collected information does not lose its
evidential value in any subsequent legal assessment.
#N/A
The contract between the Cloud Service Provider and the cloud customer
regulates which data is made available to the cloud customer for his own
analysis in the event of security incidents.
-
-
-
-
In addition to the tests, exercises are also carried out which, among other
things, have resulted in scenarios from security incidents that have already
occurred in the past.
-
The Cloud Service Provider grants its cloud customers contractually
guaranteed information and audit rights.
-
-
-
The procedures for identifying such vulnerabilities also include annual code
reviews or security penetration tests by qualified external third parties.
-
-
-
At startup and runtime of virtual machine or container images, an integrity
check is performed that detects image manipulations and reports them to
the cloud customer.
-
Description of Changes for the Additional Criteria
-
Removed due to the following reasons:
(a) the definition of risk appetite and risk tolerances concerns the policy and
thus the basic criterion OIS-06
b) the monitoring of the timely implementation of mitigating measures has
not been specified in detail so far and can only be checked to a limited
extent.
c) communication with the management is already covered by the basic
criterion COM-04.
-
Removed, as it was only an organisational requirement, which does not
contribute significantly to increasing the level of safety.
-
Consideration of different profiles through target group orientation in the
basic criterion already given. Instead, the measurement and evaluation of
learning outcomes has been added.
Requirement for review of external service providers reclassified to criteria
of the SSO area.
-
Dealing with changes from the previous basic requirement shifted to an
additional criterion and the possibility of information instead of renewed
conclusion granted in order to be able to conduct the procedure less
formally.
The former optional requirement for the basic requirement MDM-01 has
been deleted, as mobile devices are now also considered assets and the
requirements contained therein have been transferred to the basic criteria
AM-01 and AM-02 and the additional criterion AM-05.
The former optional requirement to the basic requirement MDM-01 has
been deleted, as mobile devices are now also considered assets and the
requirements contained therein have been transferred to the basic criteria
AM-01 and AM-02.
-
Since mobile devices are now also regarded as assets, the additional
criterion has been formulated more generally on the basis of the previously
optional, more extensive MDM-01 requirement.
No change.
No change.
No change.
Since the basic requirement has been divided into two basic criteria, an
additional criterion for the automatic monitoring of the configuration of the
protection mechanisms has been added to supplement the basic criterion
for the implementation of protection against malware.
No change.
No change.
-
Additional criterion newly included.
Linguistic adaptation and alignment with the wording in other criteria without
substantive changes.
No change.
-
No change.
-
-
Additional criterion newly included to regulate the handling when accessing
data of cloud customers.
No change.
Additional criterion newly included.
-
-
Extension of the former optional requirement to all data (no longer related
to the protection requirements).
-
-
-
-
-
Additional criterion now also allows certifications > EAL 4.
For deviations, an explicit risk management certificate was produced.
-
-
-
-
-
The aspects relevant for automatic monitoring were specified in more detail.
The second part of the previously optional, more extensive requirement has
been deleted, since it is redundant to the basic criterion SSO-01.
-
No change.
No change.
-
-
-
-
No change.
-
The focus of the additional criterion was placed on audits initiated by cloud
customers.
The additional criterion was therefore rewritten with regard to aspects for
automatic monitoring.
-
-
-
Additional criterion newly included.
-
-
-
Additional criterion newly included.