没有合适的资源?快使用搜索试试~ 我知道了~
CSA云安全控制矩阵CCM3.01
试读
30页
需积分: 0 9 下载量 47 浏览量
更新于2022-08-03
收藏 1022KB PDF 举报
CSA云安全控制矩阵(Cloud Security Alliance Cloud Controls Matrix, CCM)是云服务提供商和消费者用来评估、管理和改进云安全的框架。CCM V3.01版本包含了更新的控制措施规范,旨在确保云环境中的应用程序和接口的安全,以及客户访问、数据完整性、数据安全/完整性和审计保障与合规性等多个方面的最佳实践。
1. 应用程序和接口安全(Application & Interface Security, AIS)
- AIS-01 强调了应用和API的设计、开发、部署和测试需遵循如OWASP等标准,并遵守法律、法规和监管要求。这包括对WEB应用的安全编码实践,确保代码质量,减少安全漏洞。
- AIS-02 在提供客户访问权限前,需明确安全、合同和监管要求,确保只有符合规定条件的客户能够访问数据、资产和信息系统,保护组织的敏感信息。
2. 数据完整性(Data Integrity)
- AIS-03 数据输入和输出的完整性校验至关重要,通过一致性和编辑检查,可以防止数据错误、损坏和滥用,确保数据在接口和数据库间的准确无误。
3. 数据安全/完整性(Data Security / Integrity)
- AIS-04 策略和规程的建立是为了跨系统接口、司法管辖区和业务功能保护数据的安全性,包括保密性、完整性和可用性。这要求组织制定严格的访问控制策略,防止未经授权的访问、修改和破坏数据。
4. 审计保障与合规性(Audit Assurance & Compliance, AAC)
- AAC-01 规定了应制定审计计划以应对业务流程中断,审计工作重点在于评估安全操作的实施效果。所有审计活动必须在事前得到同意,以确保公正性和透明度。
这些控制措施旨在构建一个全面的云安全防护体系,帮助组织满足合规性要求,降低风险,并提高云服务的可靠性。云安全联盟(CSA)作为全球性的非营利组织,通过其大中华区的邮箱和官网提供了资源和支持,以促进云安全领域的最佳实践和知识分享。
云安全控制矩阵 CCM 中英文版
Control 控制措施
CCM V3.0
Control ID
Updated Control Specification 更新的控制措施规范
Application & Interface Security 应用程序和接口安全
Application Security
应用程序安全
AIS-01
Applications and programming interfaces (APIs) shall be designed, developed, deployed, and tested in accordance with
leading industry standards (e.g., OWASP for web applications) and adhere to applicable legal, statutory, or regulatory
compliance obligations.应按照行业的主流标准(例如针对 WEB 应用的 OWASP),并遵守适用的法律、法规或其它监
管合规要求来设计、开发、部署并测试相关应用与程序的 API。
Customer Access
Requirements
客户访问要求
AIS-02
Prior to granting customers access to data, assets, and information systems, identified security, contractual, and regulatory
requirements for customer access shall be addressed.应在赋予客户对数据、资产和信息系统的访问权之前,确定客户访
问的安全、合同和监管的要求。
Data Integrity
数据完整性
AIS-03
Data input and output integrity routines (i.e., reconciliation and edit checks) shall be implemented for application interfaces
and databases to prevent manual or systematic processing errors, corruption of data, or misuse.应对应用程序接口和数据
库的数据输入和输出进行常规的完整性校验(即:一致性和编辑检查),以防止人为或系统性的处理错误、数据损坏
或误用。
Data Security / Integrity 安
全/完整性
AIS-04
Policies and procedures shall be established and maintained in support of data security to include (confidentiality, integrity
and availability) across multiple system interfaces, jurisdictions and business functions to prevent improper disclosure,
alteration, or destruction.应建立并保持策略和规程,以支持跨越多个系统接口、司法管辖区和职能部门的数据的安全
(包括保密性、完整性和可用性),防止对数据不正当泄露、修改和破坏。
CSA GCR
云安全联盟大中华区
邮箱: info@china-csa.org
官网:http://c-csa.cn/
云安全联盟大中华区
邮箱: info@china-csa.org
官网:http://c-csa.cn/
1
云安全联盟大中华区
邮箱: info@china-csa.org
官网:http://c-csa.cn/
1
云安全联盟大中华区
邮箱: info@china-csa.org
官网:http://c-csa.cn/
Audit Assurance & Compliance 审计保障与合规性
Audit Planning
审计策划
AAC-01
Audit plans shall be developed and maintained to address business process disruptions. Auditing plans shall focus on
reviewing the effectiveness of the implementation of security operations. All audit activities must be agreed upon prior to
executing any audits.应开发并维护审计计划以处理业务流程中断。审计计划应关注于对安全运营实施有效性的评审。
任何审计活动应在执行之前获得许可。
Independent Audits
独立审计
AAC-02
Independent reviews and assessments shall be performed at least annually to ensure that the organization addresses
nonconformities of established policies, standards, procedures, and compliance obligations.应至少每年实施一次独立的评
审和评估以确保组织处理了在建立策略、标准、规程和法律符合性方面的不符合情况。
Information System
Regulatory Mapping 信息
系统合规映射
AAC-03
Organizations shall create and maintain a control framework which captures standards, regulatory, legal, and statutory
requirements relevant for their business needs. The control framework shall be reviewed at least annually to ensure
changes that could affect the business processes are reflected.组织应创建并维护一个用以搜集和业务需求相关的标准、
法律、法规和强制性要求的控制框架。控制框架应至少每年进行评审以确保可能影响业务流程的变化在框架中得到
体现。
Business Continuity Management & Operational Resilience 业务连续性管理与运营恢复
Business Continuity
Planning
业务连续性的策划
BCR-01
A consistent unified framework for business continuity planning and plan development shall be established, documented
and adopted to ensure all business continuity plans are consistent in addressing priorities for testing, maintenance, and
information security requirements. 应以文件化形式建立并采用一个关于业务连续性计划以及计划的开发所需的一致
性统一框架,以确保所有的业务连续性计划在测试、维护之前得以完成,并符合信息安全要求。
Requirements for business continuity plans include the following:业务连续性计划的要求包括以下方面:
• Defined purpose and scope, aligned with relevant dependencies 明确的目的和范围,并与相关依存条件一致
• Accessible to and understood by those who will use them 可被使用者获取并理解
• Owned by a named person(s) who is responsible for their review, update, and approval 评审、更新和批准的职责明确
到人
• Defined lines of communication, roles, and responsibilities 明确的沟通、角色和责任名单
• Detailed recovery procedures, manual work-around, and reference information 详细的恢复程序、手动应急措施和参
考信息
• Method for plan invocation 计划调用的方法
CSA GCR
云安全联盟大中华区
邮箱: info@china-csa.org
官网:http://c-csa.cn/
云安全联盟大中华区
邮箱: info@china-csa.org
官网:http://c-csa.cn/
2
云安全联盟大中华区
邮箱: info@china-csa.org
官网:http://c-csa.cn/
2
云安全联盟大中华区
邮箱: info@china-csa.org
官网:http://c-csa.cn/
Business Continuity
Testing
业务连续性的测试
BCR-02
Business continuity and security incident response plans shall be subject to testing at planned intervals or upon significant
organizational or environmental changes. Incident response plans shall involve impacted customers (tenant) and other
business relationships that represent critical intra-supply chain business process dependencies.业务连续性和安全事件响
应计划应按计划的周期或在组织和环境发生重大变化时进行测试。事件响应计划应包括受到事件影响,且代表关键
内部供应链业务流程的客户(租户)和其他业务关系。
Datacenter Utilities /
Environmental Conditions
数据中心设施/环境状况
BCR-03
Datacenter utilities services and environmental conditions (e.g., water, power, temperature and humidity controls,
telecommunications,and internet connectivity) shall be secured, monitored, maintained, and tested for continual
effectiveness at planned intervals to ensure protection from unauthorized interception or damage, and designed with
automated fail-over or other redundancies in the event of planned or unplanned disruptions.应按计划的时间间隔对数据
基础设施服务和环境条件(如:水、电、温湿度控制、通信以及因特网连接)的持续有效性进行保障、监控、维护
和测试,保证其免于受到非授权的窃取或破坏,并设计在面临计划内和计划外中断事态时的自动化故障转移或其他
方面的冗余机制。
Documentation
文档化
BCR-03
Information system documentation (e.g., administrator and user guides, and architecture diagrams) shall be made available
to authorized personnel to ensure the following:应确保信息系统文档(如:管理员指南、用户指南、架构图)对于授权
人员是可获取的,以确保:
• Configuring, installing, and operating the information system 配置、安装和运行信息系统;
• Effectively using the system's security features 有效使用系统的安全功能。
Environmental Risks
环境风险
BCR-05
Physical protection against damage from natural causes and disasters, as well as deliberate attacks, including fire, flood,
atmospheric electrical discharge, solar induced geomagnetic storm, wind, earthquake, tsunami, explosion, nuclear accident,
volcanic activity, biological hazard, civil unrest, mudslide, tectonic activity, and other forms of natural or man-made disaster
shall be anticipated, designed, and have countermeasures applied.应预测、设计并应用物理防护措施以抵御自然灾害和
蓄意攻击,如火灾、洪水、大气放电、太阳磁暴、大风、地震、海啸、爆炸、核事故、火山活动、生物危机、内乱、
泥石流、构造活动和其他形式的自然或人为灾难。
Equipment Location
设备放置
BCR-06
To reduce the risks from environmental threats, hazards, and opportunities for unauthorized access, equipment shall be
kept away from locations subject to high probability environmental risks and supplemented by redundant equipment
located at a reasonable distance.为减少环境威胁和危害,以及未授权访问的风险,设备应远离高危环境,并将冗余设
备部署在合适的距离。
CSA GCR
云安全联盟大中华区
邮箱: info@china-csa.org
官网:http://c-csa.cn/
云安全联盟大中华区
邮箱: info@china-csa.org
官网:http://c-csa.cn/
3
云安全联盟大中华区
邮箱: info@china-csa.org
官网:http://c-csa.cn/
3
云安全联盟大中华区
邮箱: info@china-csa.org
官网:http://c-csa.cn/
Equipment Maintenance
设备维护
BCR-07
Policies and procedures shall be established, and supporting business processes and technical measures implemented, for
equipment maintenance ensuring continuity and availability of operations and support personnel.应建立设备维护的策略
和规程,并实施支持性业务流程和技术手段,以确保操作和支持人员的持续性和可用性。
Equipment Power Failures
设备电力失效
BCR-08
Protection measures shall be put into place to react to natural and man-made threats based upon a geographically-specific
Business Impact Assessment 应根据基于具体地理位置的业务影响评估的结果落实保护措施,以应对自然和人为威胁。
Impact Analysis
影响性分析
BCR-09
There shall be a defined and documented method for determining the impact of any disruption to the organization (cloud
provider, cloud consumer) that must incorporate the following:应定义并记录任何可确定中断对组织(云供应商、云客户)
带来的影响的方法,该方法须包含以下内容:
• Identify critical products and services 识别关键产品和服务;
• Identify all dependencies, including processes, applications, business partners, and third party service providers 识别所
有依赖关系,包括流程、应用系统、商业伙伴和第三方服务提供商;
• Understand threats to critical products and services 理解关键产品和服务面临的威胁;
• Determine impacts resulting from planned or unplanned disruptions and how these vary over time 确定计划内或计划
外的中断导致的影响,以及这些影响如何随时间而变化;
• Establish the maximum tolerable period for disruption 确定最长可容忍中断时间(MTPD);
• Establish priorities for recovery 确定恢复优先级;
• Establish recovery time objectives for resumption of critical products and services within their maximum tolerable
period of disruption 根据关键产品和服务的最长可容忍中断时间(MTPD)确定恢复时间目标(RTO);
• Estimate the resources required for resumption 确定恢复至正常状态所需的资源。
Policy 策略
BCR-10
Policies and procedures shall be established, and supporting business processes and technical measures implemented, for
appropriate IT governance and service management to ensure appropriate planning, delivery and support of the
organization's IT capabilities supporting business functions, workforce, and/or customers based on industry acceptable
standards (i.e., ITIL v3 and COBIT 5). Additionally, policies and procedures shall include defined roles and responsibilities
supported by regular workforce training.应建立适宜的 IT 治理和服务管理相关的策略和规程,并基于行业可接受标准
(如 ITIL v3 和 COBIT 5)实施支持性业务流程和技术手段,以保证适宜的策划、交付和支持组织的 IT 能力用于支持
业务职能、员工和/或客户。同时,策略和规程应包括确定的角色和职责,并辅以定期的员工培训。
CSA GCR
云安全联盟大中华区
邮箱: info@china-csa.org
官网:http://c-csa.cn/
云安全联盟大中华区
邮箱: info@china-csa.org
官网:http://c-csa.cn/
4
云安全联盟大中华区
邮箱: info@china-csa.org
官网:http://c-csa.cn/
4
云安全联盟大中华区
邮箱: info@china-csa.org
官网:http://c-csa.cn/
Retention Policy 保 存 策
略
BCR-11
Policies and procedures shall be established, and supporting business processes and technical measures implemented, for
defining and adhering to the retention period of any critical asset as per established policies and procedures, as well as
applicable legal, statutory, or regulatory compliance obligations. Backup and recovery measures shall be incorporated as
part of business continuity planning and tested accordingly for effectiveness.应建立定义了所有关键资产保存期限的策略
和规程,并实施支持性业务流程和技术手段。每一项策略、规程以及适用的法律、法规和合规性义务应得到遵从。
备份与恢复措施也应该作为 BCP 的一个组成部分,并通过有效性测试。
Change Control & Configuration Management 变更控制和配置管理
New Development /
Acquisition
新开发/获取
CCC-01
Policies and procedures shall be established, and supporting business processes and technical measures implemented, to
ensure the development and/or acquisition of new data, physical or virtual applications, infrastructure network and systems
components, or any corporate, operations and/or datacenter facilities have been pre-authorized by the organization's
business leadership or other accountable business role or function.应建立策略和规程,并实施支持性业务流程和技术手
段,以确保开发和/或获取新数据、物理或虚拟应用、基础网络设施和系统组件、或任何公司的、运营的和/或数据
中心的设施时,得到组织的业务领导或其他负责的业务角色或部门的预授权。
Outsourced Development
外包开发
CCC-02
External business partners shall adhere to the same policies and procedures for change management, release, and testing
as internal developers within the organization (e.g. ITIL service management processes).外部业务伙伴应和组织内部开发
者一样遵守相同的变更、发布和测试策略和规程(如:ITIL 服务管理流程)。
Quality Testing
质量测试
CCC-03
Organization shall follow a defined quality change control and testing process (e.g. ITIL Service Management) with
established baselines, testing, and release standards that focus on system availability, confidentiality, and integrity of
systems and services.组织应遵循已定义的质量变更控制和测试流程(如:ITIL 服务管理),基于已建立的关注于系统
可用性、保密性和系统/服务完整性的基线、测试和发布标准。
Unauthorized Software
Installations 非 授权 软件
安装
CCC-04
Policies and procedures shall be established, and supporting business processes and technical measures implemented, to
restrict the installation of unauthorized software on organizationally-owned or managed user end-point devices (e.g., issued
workstations, laptops, and mobile devices) and IT infrastructure network and systems components.应建立策略和规程,并
实施支持性业务流程和技术手段,以限制在组织拥有或管理的用户终端设备(如:配发的工作站、笔记本电脑和移
动设备)、IT 基础网络设施和系统组件上安装非授权软件。
CSA GCR
云安全联盟大中华区
邮箱: info@china-csa.org
官网:http://c-csa.cn/
云安全联盟大中华区
邮箱: info@china-csa.org
官网:http://c-csa.cn/
5
云安全联盟大中华区
邮箱: info@china-csa.org
官网:http://c-csa.cn/
5
云安全联盟大中华区
邮箱: info@china-csa.org
官网:http://c-csa.cn/
剩余29页未读,继续阅读
资源推荐
资源评论
2018-06-10 上传
145 浏览量
131 浏览量
2020-03-12 上传
2021-10-12 上传
124 浏览量
2022-01-26 上传
2024-01-25 上传
2019-08-17 上传
2022-04-26 上传
5星 · 资源好评率100%
5星 · 资源好评率100%
2019-06-08 上传
162 浏览量
5星 · 资源好评率100%
112 浏览量
152 浏览量
2016-11-16 上传
2022-01-14 上传
资源评论
葡萄的眼泪
- 粉丝: 19
- 资源: 303
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 没用333333333333333333333333333333
- 基于Vue和SpringBoot的企业员工管理系统2.0版本设计源码
- 【C++初级程序设计·配套源码】第2期-基本数据类型
- 基于Java和Vue的kopsoftKANBAN车间电子看板设计源码
- 影驰战将PS3111 东芝芯片TT18G23AIN开卡成功分享,图片里面画线的选项很重要
- 【C++初级程序设计·配套源码】第1期-语法基础
- 基于JavaScript、CSS、HTML的简易DOM版飞机游戏设计源码
- 基于Java开发的日程管理FlexTime应用设计源码
- SM2258XT-BGA144-4BGA180-6L-R1019 三星KLUCG4J1CB B0B1颗粒开盘工具 , EC, 3A, 94, 43, A4, CA 七彩虹SL300这个固件有用
- GJB 5236-2004 军用软件质量度量
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功