Featured
Interoperability and Portability
Akash Verma (Continuous Assurance Engineering, Google Cloud)
In this presentation we explore the Interoperability and Portability (IPY) domain of the Cloud Control Matrix (CCM), which comprises four control specifications aimed at ensuring secure and seamless data exchange across multiple platforms and Cloud Service Providers (CSPs). These controls help Cloud Service Customers (CSCs) avoid vendor lock-in and foster an environment where interoperability and portability are not limited by security concerns.
In the Shared Security Responsibility Model (SSRM), both CSPs and CSCs independently share responsibility for ensuring interoperability and portability in the cloud ecosystem. CSPs are typically responsible for implementing standardized communication protocols, maintaining cross-platform compatibility, and ensuring secure data exchange. CSCs, on the other hand, must leverage these tools for secure data backup, transfer, and restoration, as well as manage the integration of cloud environments. Both parties are responsible for documenting data portability obligations, such as defining data ownership and migration procedures.
This presentation will help you understand how effective interoperability and portability controls contribute to a secure, flexible, and vendor-neutral cloud ecosystem.
All episodes
-
Business Continuity Management and Operational Resilience (BCR)
Debjyoti Mukherjee (Associate Director, Cloud Governance, RBC) and David Skrdla (Senior IT Auditor, CamGen Partners)
In this presentation, we introduce the CCM business Continuity Management and Operational Resilience domain, comprising eleven control specifications. This domain focuses on protecting the availability of essential business processes, infrastructure, and services. It aims to minimize disruptions and maintain business continuity, even in the face of unforeseen or disruptive events.
Implementing cloud security controls within this domain is vital for both Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs) to guarantee uninterrupted service delivery and maintain operational resilience. By securing the cloud environment, both parties can work towards ensuring business stability during times of crisis.
CSPs and CSCs have distinct yet interconnected roles when it comes to ensuring infrastructure resilience and business continuity in cloud environments. CSPs are responsible for planning, developing, and deploying resilient technologies, services, policies, and processes that support the continuity and operational resilience of the cloud. They must also clearly communicate their resilience and recovery capabilities to CSCs, ensuring transparency during a disruption. CSCs, on the other hand, must assess and manage potential risks to their data, resources, and assets hosted in the cloud. Based on risk analyses, CSCs should develop and implement robust business continuity strategies tailored to their needs. This includes formulating comprehensive business continuity plans and procedures, designed to guide their operations during disruptive events.
By fulfilling their respective responsibilities and working together, CSPs and CSCs can maintain a resilient and reliable cloud environment. This collaboration is essential for ensuring that businesses can continue their operations seamlessly, even in the face of challenges.
-
Change Control and Configuration Management
Geoff Bird (CISO, Mount Street) and Johan Olivier (Security and Compliance Director, Qorus Docs)
This presentation explores the Change Control and Configuration Management (CCCM) domain of the Cloud Control Matrix (CCM). With its nine control specifications, this domain focuses on mitigating risks associated with configuration changes to information technology (IT) assets by adherence to a robust change management process—regardless of whether IT assets are managed internally or externally. Proper handling of modifications is essential to ensure that changes do not introduce vulnerabilities or compromise the security and stability of cloud systems, which is critical for both Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs).
Both CSPs and CSCs utilize the CCM controls to ensure that a secure cloud environment is configured and maintained in accordance with agreed service requirements. This domain ensures that IT asset configurations are only modified by an approved baseline and that any changes are authorized by the appropriate change management authority, whether CSP or CSC.
-
Cryptography, Encryption and Key Management
Akshay Bhardwaj (Security Business Lead, Sprinklr Inc.) and Kerry Steele (Principal, Payments and Cloud Advisory, Coalfire Systems Inc.)
In this presentation we explore the Cryptography, Encryption, and Key Management (CEK) domain within the Cloud Control Matrix (CCM) that comprises twenty-one control specifications. The CEK domain focuses on safeguarding Cloud Service Customers' (CSCs) data through cryptographic techniques, encryption, and effective key management. It plays an essential role in ensuring compliance with encryption standards and maintaining the confidentiality and integrity of sensitive information in cloud environments.
Under the Shared Security Responsibility Model (SSRM), Cloud Service Providers (CSPs) govern cryptography, encryption, and key management practices, ensuring they align with industry best practices and regulatory standards. CSPs manage the underlying infrastructure, provide secure key storage, and deliver encryption services. Meanwhile, CSCs take responsibility for encrypting their own sensitive data before uploading it to the cloud, managing their encryption keys, and assigning roles and responsibilities within their applications and data. They also oversee cryptographic risk and change management processes specific to their environment.
Collaboration between CSPs and CSCs in implementing CEK security controls is mutually beneficial. For CSPs, it strengthens the confidentiality and integrity of CSCs’ data, boosting the security and compliance of cloud services. For CSCs, working with CSPs ensures their unique cryptographic needs are addressed, reinforcing data protection and regulatory compliance. -
Data Security and Privacy Lifecycle Management
Arpitha Kaushik (Senior Manager Technical Risk, Marvell Technology Inc.) and Yazad Khandhadia (Head of Architecture, Emirates NBD)
In this presentation we explore the Data Security and Privacy Lifecycle Management (DSP) domain, which includes nineteen control specifications focused on privacy and data security. These controls are globally applicable and not tied to any specific industry, country, or regulation, though they reflect common elements from major privacy regulations. Serving as a valuable baseline, these controls may require organizations in specific regions or sectors to implement additional data protection measures.
The DSP domain covers the entire data lifecycle, from creation to disposal, addressing critical aspects like data privacy, classification, retention, and disposal according to applicable laws, regulations, and risk levels. These controls assist both Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs) in safeguarding data and ensuring compliance with relevant data protection laws.
In the Shared Security Responsibility Model (SSRM), CSPs are responsible for securing the cloud infrastructure and providing capabilities for secure data storage, access, and disposal. CSCs, in turn, are responsible for securing the data they store or process within the cloud, classifying it, leveraging CSP-provided tools like encryption, and ensuring compliance with data privacy regulations.
-
Identity and Access Management
Gaurav Gupta (Deputy CISO, Lord Abbett & Co) and Michael O. Bayere (Principal Officer, CSA Assurance, LLC)
In this presentation we introduce the Identity and Access Management (IAM) domain, which includes sixteen control specifications aimed at helping both Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs) follow security best practices for managing identities and access to cloud resources. Key practices, such as the principle of least privilege, segregation of duties, multi-factor authentication, and role-based and attribute-based access control, are essential for securing access to cloud functions and data.
Under the Shared Security Responsibility Model (SSRM), both CSPs and CSCs share the responsibility for establishing secure access to the cloud environment. CSPs are typically responsible for offering robust identity and access capabilities, controls, and mechanisms. CSCs, in turn, define user roles, enforce strong authentication methods, and manage the full identity lifecycle, including provisioning, modifying, and revoking access, while continuously monitoring for suspicious activities. Collaboration between CSPs and CSCs in implementing IAM controls ensures that necessary protections are in place to prevent unauthorized access to CSC data and cloud resources.
-
Infrastructure and Virtualization Security
Simon Leech (Director, Hewlett Packard Enterprise) and John B. Oseh (Information Security Consultant, Handensbanken Plc, UK)
In this presentation we delve into the Infrastructure and Virtualization Security (IVS) domain, which comprises nine control specifications designed to guide both Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs) in securing infrastructure and virtualization technologies. This domain covers the protection of hardware, software, networks, and facilities essential for delivering IT services, as well as the virtualization technologies that abstract hardware resources into virtual environments.
Under the Shared Security Responsibility Model (SSRM), both CSPs and CSCs are typically responsible for implementing IVS controls. CSPs are generally tasked with securing the underlying infrastructure, including platform technologies (like hypervisors and virtual machines), network virtualization, and providing capabilities for resource planning. CSCs are responsible for securing their allocated resources within the virtualized environment, such as hardening guest operating systems, applying security patches, and managing access to platforms and control interfaces.
-
Threat and Vulnerability Management
Simon Leech (Director, Hewlett Packard Enterprise) and John B. Oseh (Information Security Consultant, Handensbanken Plc, UK)
In this presentation we cover the Threat and Vulnerability Management (TVM) domain, which features ten control specifications aimed at helping both Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs) proactively identify and mitigate security threats and vulnerabilities in the cloud environment. These controls are designed to address evolving threats that could impact assets, security architectures, and solution components.
According to the Shared Security Responsibility Model (SSRM), CSPs and CSCs share responsibilities for implementing TVM controls. CSPs are responsible for identifying, assessing, reporting, and remediating vulnerabilities related to infrastructure, network devices, virtualization technologies, operating systems, and platform applications. CSCs, on the other hand, focus on vulnerabilities in their applications and APIs, including security settings and access misconfigurations.
Effective collaboration between CSPs and CSCs in implementing TVM controls enhances the overall cloud security posture by addressing vulnerabilities throughout the entire cloud infrastructure, from the underlying platforms to the deployed applications.
-
Governance, Risk Management and Compliance
David Souto Real (Enterprise Security Architect, Airbus) and David Skrdla (Senior IT Auditor, CamGen Partners)
In this presentation we introduce the*Governance, Risk Management, and Compliance (GRC) domain of CCM, which consists of eight control specifications. These controls are designed to help Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs) ensure that their governance, enterprise risk management (ERM), information security management, and compliance programs effectively address cloud-related concerns.
CSPs and CSCs are typically responsible for implementing their own governance, risk, and compliance controls to manage their cloud-based products, services, assets, and processes. The development of a GRC program is unique to each organization, tailored to its specific operations and needs.
Implementing GRC controls enables cloud organizations to effectively direct and manage their resources by providing a structured framework for risk management, regulatory compliance, and aligning security practices with business objectives.
-
Human Resources - Security Implementation Best Practices
Johan Olivier (Security and Compliance Director, QorusDocs)
In this presentation we focus on the Human Resources (HRS) security domain, which comprises thirteen control specifications designed to help cloud organizations manage risks associated with insider threats. These controls ensure that personnel handling sensitive data are trustworthy, properly trained, and equipped to maintain the security posture of the organization, reducing risks like unauthorized access and data breaches caused by human factors.
Under the Shared Security Responsibility Model (SSRM), both Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs) independently implement HRS security controls. This includes conducting background checks, providing continuous security training, and ensuring employees are aware of cloud security risks and best practices.
By implementing HRS controls, cloud organizations can enhance the security of their services through the employment of well-trained, vetted staff, mitigating the risks of security incidents due to human error or malicious actions.
-
Application and Interface Security
Ankit Sharma (Security Officer, Compute BU Cisco Systems) and Duronke Owoleso (CRO, The Security Bench)
In this presentation, we introduce the CCM's Application and Interface Security (AIS) domain. With seven control specifications, the AIS domain is focused on securing the software and interfaces used within cloud environments. It helps organizations identify and mitigate risks during the design and development phases of their cloud-based applications.
Effective implementation of cloud security controls in this domain is crucial for Cloud Service Providers (CSPs) to safeguard the integrity, confidentiality, and availability of their applications and interfaces. Ensuring a robust security posture at this level is critical to protecting the entire cloud landscape.
Following the Shared Security Responsibility Model (SSRM), the responsibility for securing cloud infrastructure is divided between CSPs and Cloud Service Customers (CSCs). CSPs must secure the foundational infrastructure by offering secure applications and APIs, adhering to secure coding practices, establishing application security baselines, and conducting automated security testing. They are also responsible for maintaining secure runtime environments. On the other hand, CSCs are tasked with securing their applications and interfaces, ensuring proper configuration, upgrading systems as needed, and integrating security measures into new versions of applications in line with best practices and the chosen cloud deployment model.
When both CSPs and CSCs align their efforts within the AIS domain, they help create a more secure cloud environment. This reduces the risk of application vulnerabilities and strengthens the confidentiality and integrity of data. Collaboration between the two parties fosters improved communication, enabling quicker responses to emerging threats and more efficient incident resolution.
-
Audit and Assurance
Ashwin Chaudhary (CEO, Accedere Inc.) and Swaminathan R (VP Compliance Audits, Accedere Inc.)
In this presentation we introduce the Audit and Assurance (A&A) domain within the Cloud Control Matrix (CCM). The A&A domain, consisting of six control specifications, plays a pivotal role in guiding both Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs) to build the confidence required for critical decision-making, communication, and reporting. This domain focuses on key processes, including those embedded in the CCM, and ensures they are evaluated through rigorous assessment, verification, and validation activities.
Designed to support the audit management processes of both CSPs and CSCs, the A&A domain facilitates audit planning, risk analysis, security control assessments, and remediation. It further enables effective reporting and evaluation of attestations and supporting evidence, ensuring transparent and reliable oversight.
The Shared Security Responsibility Model (SSRM) clearly outlines the responsibilities of CSPs and CSCs in implementing the A&A controls within cloud environments. Each party is independently accountable for establishing comprehensive audit and assurance policies, conducting regular security assessments, and adhering to relevant standards and regulatory requirements. By aligning their A&A controls with the SSRM, both CSPs and CSCs can independently fulfill their assurance needs over the control processes defined by the CCM. -
Security Incident Management, E-Discovery, and Cloud Forensics
Alana James-Aikins (Senior Security Advisor, Cyber CGI) and Tulika Ghosh (Vice President, Global Investment Banking Company)
In this presentation we introduce the Security Incident Management, E-Discovery, and Cloud Forensics (SEF) domain, which comprises eight control specifications critical for managing and responding to security incidents, conducting e-discovery, and performing forensics in the cloud. These controls enable both Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs) to detect, analyze, and respond to security incidents in a timely manner, minimizing disruption to business operations.
Under the Shared Security Responsibility Model (SSRM), both CSPs and CSCs are responsible for developing incident response plans, defining roles and responsibilities, implementing incident metrics, reporting to stakeholders, and escalating procedures to efficiently manage security incidents. Collaboration is key, with CSPs offering insights into infrastructure-level causes of incidents, while CSCs provide data, application, and user-specific context for thorough investigation and resolution.
-
Universal Endpoint Management
Michael Ratemo (Principal Security Consultant, Cyber Security Simplified) and John B. Oseh (Information Security Consultant, Handelsbanken Plc. UK)
In this presentation we explore Universal Endpoint Management (UEM) domain of the Cloud Controls Matrix, which includes fourteen control specifications focused on mitigating risks associated with endpoints, including mobile devices. The primary concerns in endpoint security relate to user behavior and awareness regarding acceptable use policies for devices, whether they are managed, unmanaged, enterprise-owned, or personal.
Under the Shared Security Responsibility Model (SSRM), both Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs) have independent yet complementary roles in implementing UEM controls. CSPs are responsible for managing endpoint capabilities, including maintaining inventories, approving acceptable services and applications, and implementing security measures like automatic lock screens, firewalls, anti-malware, and data loss prevention technologies. CSCs, in turn, must securely manage their own devices, ensure compliance with CSP security policies, and protect their data.
-
Interoperability and Portability
Akash Verma (Continuous Assurance Engineering, Google Cloud)
In this presentation we explore the Interoperability and Portability (IPY) domain of the Cloud Control Matrix (CCM), which comprises four control specifications aimed at ensuring secure and seamless data exchange across multiple platforms and Cloud Service Providers (CSPs). These controls help Cloud Service Customers (CSCs) avoid vendor lock-in and foster an environment where interoperability and portability are not limited by security concerns.
In the Shared Security Responsibility Model (SSRM), both CSPs and CSCs independently share responsibility for ensuring interoperability and portability in the cloud ecosystem. CSPs are typically responsible for implementing standardized communication protocols, maintaining cross-platform compatibility, and ensuring secure data exchange. CSCs, on the other hand, must leverage these tools for secure data backup, transfer, and restoration, as well as manage the integration of cloud environments. Both parties are responsible for documenting data portability obligations, such as defining data ownership and migration procedures.
This presentation will help you understand how effective interoperability and portability controls contribute to a secure, flexible, and vendor-neutral cloud ecosystem.