Review the service provider’s security when outsourcing. As a minimum, one should review if the provider: a) has a management system in place for information security along with any certifications in accordance with international standards, e.g. ISO/IEC 27001. b) provides details of the security architecture used to deliver the service.c) has development plans for future security functions for the service in response to technological advances and changes with threats over time. d) maintains a list of who is granted access to the organisation’s information, where and how it will be processed and stored, and the extent of mechanisms to segregate it from other customers. e) has security functions that meet the organisation’s needs. f) carries out security monitoring in order to detect security incidents that could impact the organisation. g) has procedures in place for managing incidents and for non-conformance and security reporting. h) has established incident management plans which works with the organisation’s own plans. i) has procedures for approving subcontractors and their use of subcontractors. j) has specified which activities should be performed when terminating the contract, including returning/moving/deleting the organisation’s information.
A process for reporting incidents is maintained to help staff report incidents efficiently and consistently.
Things to report as an incident include e.g.:
The personnel guidelines emphasize the obligation to report security incidents as soon as possible in accordance with the agreed process. The instructions also describe other operations in the event of an incident (e.g. recording seen error messages and other details).
A supplier agreement will be drawn up with all partners directly or indirectly involved in the processing of data. The aim is to ensure that there is no misunderstanding between the organization and the supplier of parties' obligations regarding to complying with security requirements.
The organization shall include in the supplier agreement, as appropriate:
The organization must clearly document all the digital services it provides to its customers according to the cloud service model.
The documentation for digital services must include the partners involved in the service supply chain. The partner listing must include supporting services (such as IaaS, such as AWS or MS Azure), other partners included in the main service provider's supply chain (such as outsourced development), and other services that complement the actual service (including IDaaS, CDN).
In the future, supply chain documentation can be used to review a more detailed division of safety responsibilities.
Management shall define responsibilities and establish procedures to ensure an effective and consistent response to security incidents.
Management must ensure e.g.:
The process must ensure e.g.:
A designated responsible person actively monitors the supplier's activities and services to ensure compliance with the security terms of the contracts and the proper management of security incidents.
Monitoring includes the following:
Organization must ensure in advance that the acquired data systems are secure. In order to ensure this, the supplier of the important data system to be acquired must be required to provide sufficient security-related clarifications already at the procurement stage.
The supplier must clarify at least the following:
In Cyberday, all frameworks’ requirements are mapped into universal tasks, so you achieve multi-framework compliance effortlessly.