CLD-01: Cloud Services
Mechanisms exist to facilitate the implementation of cloud management controls to ensure cloud instances are secure and in-line with industry practices.
Control Question: Does the organization facilitate the implementation of cloud management controls to ensure cloud instances are secure and in-line with industry practices?
General (24)
| Framework | Mapping Values |
|---|---|
| AICPA TSC 2017:2022 (used for SOC 2) (source) | CC6.1-POF5 |
| CSA CCM 4 | IPY-01 IPY-04 IVS-06 IVS-07 IVS-08 STA-05 STA-06 |
| CSA IoT SCF 2 | CLS-01 CLS-05 CLS-12 |
| ISO 27002 2022 | 5.23 |
| ISO 27017 2015 | 7.2.2 CLD.12.1.5 CLD.12.4.5 |
| MPA Content Security Program 5.1 | TS-1.9 |
| NIST 800-171 R2 (source) | 3.1.22 NFO–PL-8 |
| NIST 800-207 | NIST Tenet 1 |
| PCI DSS 4.0.1 (source) | 1.2.1 12.8.1 |
| PCI DSS 4.0.1 SAQ A (source) | 12.8.1 |
| PCI DSS 4.0.1 SAQ A-EP (source) | 1.2.1 12.8.1 |
| PCI DSS 4.0.1 SAQ B (source) | 12.8.1 |
| PCI DSS 4.0.1 SAQ B-IP (source) | 12.8.1 |
| PCI DSS 4.0.1 SAQ C (source) | 12.8.1 |
| PCI DSS 4.0.1 SAQ C-VT (source) | 12.8.1 |
| PCI DSS 4.0.1 SAQ D Merchant (source) | 1.2.1 12.8.1 |
| PCI DSS 4.0.1 SAQ D Service Provider (source) | 1.2.1 12.8.1 |
| PCI DSS 4.0.1 SAQ P2PE (source) | 12.8.1 |
| Shared Assessments SIG 2025 | J.1 |
| SCF CORE Fundamentals | CLD-01 |
| SCF CORE Mergers, Acquisitions & Divestitures (MA&D) | CLD-01 |
| SCF CORE ESP Level 1 Foundational | CLD-01 |
| SCF CORE ESP Level 2 Critical Infrastructure | CLD-01 |
| SCF CORE ESP Level 3 Advanced Threats | CLD-01 |
US (11)
| Framework | Mapping Values |
|---|---|
| US CJIS Security Policy 5.9.3 (source) | 5.10.1.4 |
| US CMMC 2.0 Level 1 (source) | AC.L1-B.1.IV |
| US CMMC 2.0 Level 2 (source) | AC.L2-3.1.22 |
| US CMMC 2.0 Level 3 (source) | AC.L2-3.1.22 |
| US DHS CISA TIC 3.0 | 3.UNI.EUSSE |
| US DHS ZTCF | CLO-02 |
| US FAR 52.204-21 | 52.204-21(b)(1)(iv) |
| US HIPAA HICP Large Practice | 4.L.A |
| US IRS 1075 | 2.E.6.1 3.3.1 |
| US SSA EIESR 8.0 | 5.8 5.12 |
| US - CA CCPA 2025 | 7123(c)(5)(B) |
EMEA (10)
| Framework | Mapping Values |
|---|---|
| EMEA Austria | Sec 14 Sec 15 |
| EMEA Belgium | 16 |
| EMEA Germany C5 2020 | COS-01 COS-02 |
| EMEA Israel CDMO 1.0 | 11.2 |
| EMEA Saudi Arabia CSCC-1 2019 | 4-2 |
| EMEA Saudi Arabia IoT CGIoT-1 2024 | 4-2-1 |
| EMEA Saudi Arabia ECC-1 2018 | 4-2-1 4-2-2 4-2-3 4-2-3-2 4-2-4 |
| EMEA Saudi Arabia SACS-002 | TPC-43 |
| EMEA Saudi Arabia SAMA CSF 1.0 | 3.3.4 3.3.8 3.4.3 |
| EMEA South Africa | 19.1 19.2 |
APAC (4)
| Framework | Mapping Values |
|---|---|
| APAC Australia ISM June 2024 | ISM-1437 ISM-1529 ISM-1579 ISM-1580 ISM-1581 |
| APAC India SEBI CSCRF | PR.IP.S13 |
| APAC Japan ISMAP | 4.1 4.2 7.2.2.19.PB 8.1.5.P 8.1.2.7.PB 9.5.P 9.5.1.P 9.5.2.P 9.5.2.1.PB 12.4.5.P 13.1.4.P 15.1.1.16.B |
| APAC New Zealand NZISM 3.6 | 22.1.20.C.01 22.1.20.C.02 22.1.20.C.03 22.1.20.C.04 22.1.20.C.05 22.1.21.C.01 22.1.21.C.02 22.1.21.C.03 22.1.21.C.04 22.1.21.C.05 22.1.21.C.06 22.1.21.C.07 22.1.24.C.01 22.1.24.C.02 22.1.24.C.03 22.1.24.C.04 22.1.25.C.01 22.1.25.C.02 22.1.26.C.01 22.1.26.C.02 22.1.26.C.03 22.1.27.C.01 23.1.54.C.01 23.1.54.C.02 23.2.19.C.01 |
Americas (1)
| Framework | Mapping Values |
|---|---|
| Americas Bermuda BMACCC | 5.11 |
Capability Maturity Model
Level 0 — Not Performed
There is no evidence of a capability to facilitate the implementation of cloud management controls to ensure cloud instances are secure and in-line with industry practices.
Level 1 — Performed Informally
Cloud Security (CLD) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- Cloud-based technologies are governed no differently from on-premise network assets (e.g., cloud-based technology is viewed as an extension of the corporate network).
- A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies.
Level 2 — Planned & Tracked
Cloud Security (CLD) efforts are requirements-driven and governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: o Identify cybersecurity and data protection controls that are appropriate to address applicable statutory, regulatory and contractual requirements for cloud security management. o Use an informal process to govern cloud-specific cybersecurity and data privacy-specific tools. o A secure infrastructure, including a managed security zone to house cybersecurity and data privacy tools. o A standardized virtualization format. o Cloud access points, including a managed security zone with o Data handling & portability, including a managed security zone to house cybersecurity and data privacy tools o Integrity of multi-tenant CSP assets, including a managed security zone to house cybersecurity and data privacy tools o Integrity of VM images, including a managed security zone to house cybersecurity and data privacy tools. o Processing and storage of service location, including a managed security zone to house cybersecurity and data privacy tools.
- Cloud security management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure, resilient and compliant practices.
- IT/cybersecurity personnel:
- A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies.
- IT personnel have a documented architecture for cloud-based technologies to support cybersecurity and data protection requirements.
- Cybersecurity and data privacy requirements are identified and documented for cloud-specific sensitive/regulated data processing, storing and/ or transmitting, including restrictions on data processing and storage locations.
- Technologies exist to support:
Level 3 — Well Defined
Cloud Security (CLD) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: o Ensure the cloud security architecture supports the organization's technology strategy to securely design, configure and maintain cloud employments. o Ensure multi-tenant CSP assets (physical and virtual) are designed and governed such that provider and customer (tenant) user access is appropriately segmented from other tenant users. o Ensure CSPs use secure protocols for the import, export and management of data in cloud-based services. o Implement a dedicated subnet to host security-specific technologies on all cloud instances, where technically feasible.
- The Chief Information Security Officer (CISO), or similar function with technical competence to address cybersecurity concerns, analyzes the organization's business strategy to determine prioritized and authoritative guidance for cloud security practices.
- The CISO, or similar function, develops a security-focused Concept of Operations (CONOPS) that documents management, operational and technical measures to apply defense-in-depth techniques across the organization to ensure that cloud security is incorporated.
- A Governance, Risk & Compliance (GRC) function, or similar function, provides governance oversight for the implementation of applicable statutory, regulatory and contractual cybersecurity and data protection controls to protect the confidentiality, integrity, availability and safety of the organization's applications, systems, services and data to ensure that compliance requirements for cloud security are identified and documented.
- A Chief Information Officer (CIO), or similar function, defines the authoritative architecture for use with on-premise, cloud-native and hybrid models, providing governance oversight for operations planning, deployment and maintenance of cloud-based technology assets supporting cybersecurity and data protection requirements.
- A Chief Technology Officer (CTO), or similar function, aligns with the CIO’s architectural model to evaluate and implement new cloud-based technologies.
- A steering committee is formally established to provide executive oversight of the cybersecurity and data privacy program, including cloud security, as well as establish a clear and authoritative accountability structure for cloud security operations.
- Roles and associated responsibilities for governing cloud instances, including provisioning, maintaining and deprovisioning, are formally assigned.
- A Shared Responsibility Matrix (SRM), or similar Customer Responsibility Matrix (CRM), is documented for each Cloud Service Providers (CSPs) instance that takes into account differences between Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) methodologies.
- IT architects, in conjunction with cybersecurity architects:
- A Change Advisory Board (CAB), or similar function, governs changes to cloud-based systems, applications and services to ensure their stability, reliability and predictability.
- CAB review processes identify and prevent use of unapproved CSPs.
- A dedicated IT infrastructure team, or similar function, enables the implementation of cloud management controls to ensure cloud instances are both secure and compliant, leveraging industry-recognized secure practices that are CC|P-specific.
- Cybersecurity and data privacy requirements are identified and documented for each CSP instance to address sensitive/regulated data processing, storing and/ or transmitting and provide restrictions on data processing and storage locations.
- A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on external systems.
Level 4 — Quantitatively Controlled
See C|P-CMM3. There are no defined C|P-CMM4 criteria, since it is reasonable to assume a quantitatively-controlled process is not necessary to facilitate the implementation of cloud management controls to ensure cloud instances are secure and in-line with industry practices.
Level 5 — Continuously Improving
See C|P-CMM4. There are no defined C|P-CMM5 criteria, since it is reasonable to assume a continuously-improving process is not necessary to facilitate the implementation of cloud management controls to ensure cloud instances are secure and in-line with industry practices.
Assessment Objectives
- CLD-01_A01 the organization facilitates the implementation of cloud management controls to ensure cloud instances are securely configured and maintained.
- CLD-01_A02 secure baseline configurations exist for cloud-based systems, applications and services to protect the confidentiality, integrity and availability of data being stored, processed and/or transmitted.
- CLD-01_A03 cloud management operations are conducted according to documented policies, standards, procedures and/or other organizational directives.
- CLD-01_A04 adequate resources (e.g., people, processes, technologies, data and/or facilities) are provided to support cloud management operations.
- CLD-01_A05 responsibility and authority for the performance of cloud management-related activities are assigned to designated personnel.
- CLD-01_A06 personnel performing cloud management-related activities have the skills and knowledge needed to perform their assigned duties.
Evidence Requirements
- E-AST-06 Asset Inventories - Cloud Service Provider (CSP)
-
Documented evidence of an inventory of the organization's cloud-based services (e.g., SaaS, IaaS, PaaS, etc.).
Asset Management
Technology Recommendations
Micro/Small
- SCF Integrated Controls Management (ICM) model (https://securecontrolsframework.com/integrated-controls-management)
- Data Protection Impact Assessment (DPIA)
- Secure Baseline Configurations (SBC)
Small
- SCF Integrated Controls Management (ICM) model (https://securecontrolsframework.com/integrated-controls-management)
- Data Protection Impact Assessment (DPIA)
- Secure Baseline Configurations (SBC)
Medium
- SCF Integrated Controls Management (ICM) model (https://securecontrolsframework.com/integrated-controls-management)
- Data Protection Impact Assessment (DPIA)
- Secure Baseline Configurations (SBC)
Large
- SCF Integrated Controls Management (ICM) model (https://securecontrolsframework.com/integrated-controls-management)
- Data Protection Impact Assessment (DPIA)
- Secure Baseline Configurations (SBC)
Enterprise
- SCF Integrated Controls Management (ICM) model (https://securecontrolsframework.com/integrated-controls-management)
- Data Protection Impact Assessment (DPIA)
- Secure Baseline Configurations (SBC)