Controls

Every control we review and report on, mapped across the standards our customers rely on. Published in plain language — no internal jargon.

CSA Cloud Controls Matrix

106 controls

Application & Interface Security

AIS-01Application and Interface Security Policy and Procedures

Establish, document, approve, communicate, apply, evaluate, and maintain policies and procedures for application security.

preventive
AIS-02Application Security Baseline Requirements

Establish, document, and maintain baseline requirements for securing different applications.

preventive
AIS-03Application Security Metrics

Define and implement technical and operational metrics in alignment with business objectives.

detective
AIS-04Secure Application Design and Development

Define and implement a SDLC process for application design, development, deployment, and operation.

preventive
AIS-05Automated Application Security Testing

Implement a testing strategy, including criteria for acceptance of new information systems.

detective
AIS-06Automated Secure Application Deployment

Automate deployment of applications using secure and standardized practices.

preventive
AIS-07Application Vulnerability Remediation

Define and implement a process to remediate application security vulnerabilities.

corrective

Audit & Assurance

A&A-01Audit and Assurance Policy and Procedures

Establish, document, approve, communicate, apply, evaluate, and maintain audit and assurance policies and procedures.

preventive
A&A-02Independent Assessments

Conduct independent audit and assurance assessments at least annually.

detective
A&A-03Risk-Based Planning Assessment

Perform independent audit and assurance assessments according to risk-based plans and policies.

detective
A&A-04Requirements Compliance

Verify compliance with all applicable laws, statutes, regulations, and contractual requirements.

detective
A&A-05Audit Management Process

Define and implement an audit management process to support audit planning, risk analysis, security control assessment, conclusion, remediation, and reporting.

corrective
A&A-06Remediation

Establish, document, approve, communicate, apply, evaluate, and maintain a risk-based corrective action plan to remediate audit findings.

corrective

Business Continuity & Operational Resilience

BCR-01Business Continuity Management Policy and Procedures

Establish, document, approve, communicate, apply, evaluate, and maintain business continuity policies and procedures.

preventive
BCR-02Risk Assessment and Impact Analysis

Determine the impact of business disruptions and risks to establish criteria for developing business continuity and operational resilience strategies.

detective
BCR-03Business Continuity Strategy

Establish strategies to reduce the impact of, withstand, and recover from business disruptions within established risk appetite.

preventive
BCR-04Business Continuity Planning

Establish, document, approve, communicate, apply, evaluate, and maintain a business continuity plan.

preventive
BCR-05Documentation

Develop, identify, and acquire documentation relevant to support business continuity and operational resilience programs.

preventive
BCR-08Backup

Periodically back up data stored in the cloud and store backups in a secure location.

preventive
BCR-09Disaster Response Plan

Establish, document, approve, communicate, apply, evaluate, and maintain a disaster response plan.

corrective

Change Control & Configuration Management

CCC-01Change Management Policy and Procedures

Establish, document, approve, communicate, apply, evaluate, and maintain change management policies and procedures.

preventive
CCC-02Quality Testing

Follow a defined quality change control, approval and testing process with established baselines.

detective
CCC-03Change Management Technology

Manage the risks associated with applying changes to organization assets.

preventive
CCC-05Production Changes

Restrict the unauthorized addition, removal, update, and management of organization assets.

preventive
CCC-06Change Agreements

Include provisions limiting changes directly impacting CSCs owned environments.

preventive
CCC-07Change Management Baseline

Establish change management baselines for all relevant authorized changes on organization assets.

preventive

Cryptography, Encryption & Key Management

CEK-01Encryption and Key Management Policy and Procedures

Establish, document, approve, communicate, apply, evaluate, and maintain policies and procedures for encryption and key management.

preventive
CEK-02CEK Roles and Responsibilities

Define and document CEK roles and responsibilities.

preventive
CEK-03Data Encryption

Provide cryptographic protection to data at-rest and in-transit, using cryptographic libraries certified to approved standards.

preventive
CEK-04Encryption Algorithm

Use encryption algorithms that are appropriate for data protection, considering classification of data, risks, and sensitivity.

preventive
CEK-09Encryption Change Management

Establish a standard change management procedure for cryptographic keys and their associated changes.

preventive
CEK-10Encryption Change Cost Benefit Analysis

Manage and adopt changes to cryptography-, encryption-, and key management-related systems.

preventive
CEK-12Key Management Processes

Establish and maintain encryption and key management roles and responsibilities.

preventive
CEK-13Key Rotation

Rotate cryptographic keys in accordance with the calculated cryptoperiod.

preventive

Datacenter Security

DCS-01Off-Site Equipment Disposal Policy and Procedures

Establish policies for the secure disposal of equipment used outside the organizations premises.

preventive
DCS-04Secure Area Policy and Procedures

Establish policies and procedures for maintaining a safe and secure working environment.

preventive
DCS-05Secure Media Transportation Policy and Procedures

Establish policies and procedures for the secure transportation of physical media.

preventive
DCS-08Equipment Identification

Use equipment identification as a method for connection authentication.

preventive
DCS-15Equipment Location

Locate equipment and information assets in an area to minimize risk of unauthorized access or tampering.

preventive

Data Security & Privacy Lifecycle Management

DSP-01Security and Privacy Policy and Procedures

Establish, document, approve, communicate, apply, evaluate, and maintain data security and privacy policies and procedures.

preventive
DSP-02Secure Disposal

Securely dispose of data as outlined in the data lifecycle management policies and procedures.

preventive
DSP-03Data Inventory

Create and maintain a data inventory, at least for any sensitive data and personal data.

preventive
DSP-04Data Classification

Classify data according to its type and sensitivity level.

preventive
DSP-05Data Flow Documentation

Create and maintain data flow documentation for sensitive data to identify sources, destinations, and data uses.

detective
DSP-07Data Protection by Design and Default

Develop systems, products, and business practices based upon the principle of security by design and industry best practices.

preventive
DSP-10Sensitive Data Transfer

Establish measures to protect and govern sensitive data transfers, including those with third parties.

preventive
DSP-17Sensitive Data Protection

Define and implement a process that protects sensitive data.

preventive

Governance, Risk and Compliance

GRC-01Governance Program Policy and Procedures

Establish, document, approve, communicate, apply, evaluate, and maintain policies and procedures for governance, risk, and compliance.

preventive
GRC-02Risk Management Program

Establish a formal, documented, and leadership-sponsored Enterprise Risk Management program.

preventive
GRC-03Organizational Policy Reviews

Review all relevant organizational policies at least annually.

detective
GRC-04Policy Exception Process

Establish a process for addressing exceptions to policies.

corrective
GRC-05Information Security Program

Develop and implement an information security program, including programs for all relevant areas.

preventive
GRC-06Governance Responsibility Model

Define and document governance roles and responsibilities across the organization.

preventive

Human Resources

HRS-01Background Screening Policy and Procedures

Establish, document, and maintain policies and procedures for background verification.

preventive
HRS-03Employment Agreement Process

Establish, document, and maintain a formal employment agreement process.

preventive
HRS-05Employment Termination

Define roles and responsibilities for performing employment termination.

corrective
HRS-09Training and Awareness

Establish, document, approve, communicate, apply, evaluate, and maintain a security awareness training program.

preventive
HRS-11Personal and Sensitive Data Awareness and Training

Make employees aware of their roles and responsibilities for maintaining awareness and compliance with established policies and regulations.

preventive
HRS-12Clean Desk Policy and Procedures

Establish and maintain a clean desk policy.

preventive

Identity & Access Management

IAM-01Identity and Access Management Policy and Procedures

Establish, document, approve, communicate, apply, evaluate, and maintain identity and access management policies and procedures.

preventive
IAM-02Strong Password Policy and Procedures

Establish and maintain strong password procedures.

preventive
IAM-03Identity Inventory

Manage and maintain an inventory of all identities.

detective
IAM-04Separation of Duties

Employ separation of duties for access authorization.

preventive
IAM-05Least Privilege

Employ the least privilege principle for access.

preventive
IAM-06User Access Provisioning

Define a user access provisioning process with clear approvals.

preventive
IAM-09Segregation of Privileged Access Roles

Define, implement, and evaluate processes and procedures for the segregation of privileged access roles.

preventive
IAM-12Safeguard Logs Integrity

Protect the integrity of access logs through appropriate access controls.

preventive
IAM-14Strong Authentication

Require multi-factor authentication for all access to sensitive data or systems.

preventive

Infrastructure & Virtualization Security

IVS-01Infrastructure and Virtualization Security Policy and Procedures

Establish, document, approve, communicate, apply, evaluate, and maintain infrastructure and virtualization security policies.

preventive
IVS-03Network Security

Monitor, encrypt, and restrict communications between environments to only authenticated and authorized connections.

preventive
IVS-04OS Hardening and Base Controls

Harden host and guest OS, hypervisors, or infrastructure control plane.

preventive
IVS-06Network Defense

Implement defense in depth at the network level, using techniques such as segmentation and micro-segmentation.

preventive
IVS-08Network Architecture Documentation

Establish, document, approve, communicate, apply, and maintain a network architecture documentation.

preventive

Interoperability & Portability

IPY-01Interoperability and Portability Policy and Procedures

Establish, document, approve, communicate, apply, evaluate, and maintain interoperability and portability policies.

preventive
IPY-02Application Interface Availability

Provide application programming interfaces (APIs) to ensure the availability of application interfaces.

preventive
IPY-03Secure Interoperability and Portability Management

Implement cryptographically secure and standardized network protocols.

preventive

Logging & Monitoring

LOG-01Logging and Monitoring Policy and Procedures

Establish, document, approve, communicate, apply, evaluate, and maintain policies for logging and monitoring.

preventive
LOG-03Security Monitoring and Alerting

Identify and monitor security-related events and incidents.

detective
LOG-05Audit Logs Monitoring and Response

Monitor security audit logs to detect activity outside of typical or expected patterns.

detective
LOG-06Clock Synchronization

Ensure reliable time synchronization between all relevant systems.

preventive
LOG-08Log Records

Define and implement requirements for audit log events.

preventive
LOG-09Log Protection

Secure audit logs and event data.

preventive

Security Incident Management, E-Discovery, & Forensics

SEF-01Security Incident Management Policy and Procedures

Establish, document, approve, communicate, apply, evaluate, and maintain policies for security incident management.

preventive
SEF-02Service Management Policy and Procedures

Establish policies for incident response.

preventive
SEF-03Incident Response Plans

Establish and maintain an Incident Response Plan.

corrective
SEF-04Incident Response Testing

Test and update Incident Response Plans at planned intervals.

detective
SEF-05Incident Response Metrics

Establish and monitor information security event metrics.

detective
SEF-07Incident Response Communication

Establish incident response communication capabilities.

corrective

Supply Chain Management, Transparency & Accountability

STA-01SSRM Policy and Procedures

Establish, document, approve, communicate, apply, evaluate, and maintain supply chain security management policies.

preventive
STA-03SSRM Guidance

Develop supply-chain security and risk management guidance.

preventive
STA-05Supply Chain Agreements

Establish supply chain agreements with third parties.

preventive
STA-06Supply Chain Governance Reviews

Review supply chain agreements at least annually.

detective
STA-07Supply Chain Data Security Assessment

Define and implement a process for conducting security assessments periodically for all organizations within the supply chain.

detective
STA-09Primary Service and Contractual Agreement

Supply chain agreements should address cybersecurity and include relevant security and data protection requirements.

preventive

Threat & Vulnerability Management

TVM-01Threat and Vulnerability Management Policy and Procedures

Establish, document, approve, communicate, apply, evaluate, and maintain threat and vulnerability management policies.

preventive
TVM-02Malware Protection Policy and Procedures

Establish anti-malware policy and measures.

preventive
TVM-03Vulnerability Remediation Schedule

Define and implement a vulnerability remediation schedule based on risk.

corrective
TVM-07Vulnerability Identification

Identify and track security vulnerabilities in applicable systems.

detective
TVM-08Vulnerability Prioritization

Prioritize remediation based on risk and asset criticality.

detective
TVM-10Vulnerability Management Reporting

Establish, monitor, and report on vulnerability management metrics.

detective

Universal Endpoint Management

UEM-01Endpoint Device Policy and Procedures

Establish, document, approve, communicate, apply, evaluate, and maintain policies for managing endpoints.

preventive
UEM-03Compatibility

Define and implement a process to maintain compatibility with regulatory or legal requirements.

preventive
UEM-06Automatic Lock Screen

Configure endpoints to enforce automatic lock-screen policies.

preventive
UEM-07Operating Systems

Manage changes to endpoint operating systems, patch levels, and applications through a centralized change management system.

preventive
UEM-08Storage Encryption

Protect information from unauthorized disclosure on managed endpoint devices with storage encryption.

preventive
UEM-11Remote Locate

Enable the ability to remotely locate lost or stolen endpoint devices.

preventive