CSP Controls Checklist
Overview
This lesson provides a comprehensive checklist of ISO 27017 controls for Cloud Service Providers.
CSP Control Implementation Checklist
Physical and Environmental Security
A.11.1 - Secure Areas
- Multiple physical security perimeters implemented
- 24/7 monitored access with biometric controls
- Visitor management and escort procedures
- Video surveillance with retention policy
- Intrusion detection systems active
- Security guard patrols scheduled
A.11.2 - Equipment
- Redundant power systems (N+1 UPS, generators)
- Climate control with monitoring
- Fire suppression systems tested
- Equipment secured in locked racks
- Asset tracking system implemented
- Secure disposal procedures for hardware
Infrastructure Security
A.12.1 - Operational Procedures
- Documented operational procedures
- Change management process
- Capacity monitoring and planning
- Environment separation (dev/test/prod)
- Regular backup verification
- Performance monitoring
A.12.4 - Logging and Monitoring
- Centralized logging (SIEM)
- Clock synchronization (NTP)
- Log retention policy (minimum 90 days)
- Log integrity protection
- Administrator action logging
- Security event alerting
A.12.6 - Technical Vulnerability Management
- Vulnerability scanning (weekly)
- Patch management process
- Vulnerability disclosure policy
- Security advisory monitoring
- Penetration testing (annual)
Virtualization Security
CLD.6.3.1 - Virtual Machine Hardening
- Hypervisor hardening standards
- Minimal VM templates
- VM image scanning
- VM access controls
- VM monitoring
- VM lifecycle management
CLD.6.3.2 - Virtual Machine Image Protection
- Image encryption
- Image signing/verification
- Private image repository
- Image vulnerability scanning
- Version control for images
- Regular image updates
Network Security
A.13.1 - Network Controls
- Network segmentation implemented
- Firewall rules documented
- DDoS protection active
- Network monitoring (IDS/IPS)
- VPN capabilities for customers
- Network access logging
CLD.9.5.2 - Virtual Network Protection
- Virtual network isolation per tenant
- Security group capabilities
- Network ACL capabilities
- Private connectivity options
- Network flow logging
Data Protection
A.10.1 - Cryptographic Controls
- Encryption at rest (AES-256)
- Encryption in transit (TLS 1.2+)
- Key management system (HSM)
- Customer-managed key support
- Cryptographic standards documented
- Key rotation procedures
A.12.3 - Backup
- Automated backup systems
- Backup encryption
- Geographic redundancy
- Regular restore testing
- Backup retention policy
- Customer backup options
Access Control
A.9.1 - Access Control Policy
- Access control policy documented
- Least privilege principle
- Segregation of duties
- Regular access reviews
- Privileged access management
- Multi-factor authentication
A.9.2 - User Access Management
- User provisioning process
- User deprovisioning process
- Access approval workflow
- Role-based access control
- Quarterly access reviews
CLD.13.1.4 - Cloud User Management Interfaces
- Secure management console (HTTPS)
- API authentication (OAuth 2.0)
- API rate limiting
- API access logging
- SDK security documentation
Incident Management
A.16.1 - Incident Management
- Incident response plan documented
- 24/7 incident response capability
- Incident classification criteria
- Customer notification procedures
- Incident logging and tracking
- Post-incident review process
A.16.1.2 - Reporting Security Events
- Security event reporting process
- Customer reporting channels
- Event severity classification
- SLA for event response
- Event notification templates
Compliance and Audit
A.18.1 - Legal and Regulatory
- Compliance requirements identified
- Privacy policy published
- Data processing agreements
- Subprocessor disclosure
- Data location documentation
- Regulatory compliance (GDPR, etc.)
A.18.2 - Information Security Reviews
- Annual compliance audits (SOC 2)
- ISO 27001 certification
- Penetration testing (annual)
- Internal audits (quarterly)
- Management reviews (quarterly)
- Compliance reporting to customers
Service Availability
A.17.1 - Business Continuity
- Business continuity plan
- Disaster recovery plan
- Recovery time objectives defined
- Recovery point objectives defined
- BC/DR testing (annual)
- Redundant infrastructure
A.17.2 - Redundancies
- Multi-region capability
- Automated failover
- Load balancing
- Data replication
- Power redundancy (N+1)
- Network redundancy
Customer Support
A.15.1 - Supplier Relationships
- Customer onboarding process
- Service Level Agreements
- Support response SLAs
- Escalation procedures
- Contract management
- Customer offboarding process
CLD.8.1.5 - Asset Removal/Return
- Data deletion procedures
- Data export capabilities
- Asset inventory for customers
- Deletion verification
- Certificate of destruction (if requested)
- Retention policy after termination
Documentation and Transparency
Required Customer Documentation:
- Security whitepaper
- Shared responsibility model
- Compliance certifications
- Service descriptions
- SLA terms
- Data processing agreement
- Incident notification policy
- Change management notification
Maturity Assessment
Level 1 - Initial
- Ad-hoc security controls
- Limited documentation
- Reactive security
Level 2 - Managed
- Documented processes
- Some automation
- Defined roles
Level 3 - Defined
- Standardized processes
- Integrated tools
- Proactive monitoring
Level 4 - Quantitatively Managed
- Metrics-driven
- Advanced automation
- Continuous improvement
Level 5 - Optimizing
- Industry-leading practices
- Full automation
- Innovation focus
Key Takeaways
- Comprehensive controls cover all security domains
- Documentation is essential for transparency
- Regular testing validates control effectiveness
- Continuous improvement is necessary
- Customer communication builds trust
Module 2 Complete
Congratulations on completing Module 2! You now understand:
- CSP security responsibilities
- Infrastructure and virtualization security
- Data segregation techniques
- SLA requirements
- Incident management
- Comprehensive CSP controls
Next Module: Cloud Service Customer Controls