CSA: Implementing CCM: Human Resources Controls

Source URL: https://cloudsecurityalliance.org/articles/implementing-ccm-human-resources-controls
Source: CSA
Title: Implementing CCM: Human Resources Controls

Feedly Summary:

AI Summary and Description: Yes

Summary: The text provides a detailed overview of the Cloud Controls Matrix (CCM), specifically the Human Resources (HRS) domain, which plays a crucial role in cloud computing security. It outlines how both cloud service customers (CSCs) and providers (CSPs) can utilize CCM to assess and improve their security posture and highlights the importance of controlling insider risks through structured policies and training.

Detailed Description: The Cloud Controls Matrix (CCM) serves as a comprehensive framework for managing cloud security controls. It is structured into 17 domains, with the Human Resources (HRS) domain being critically important for mitigating insider risks, which contribute to a significant number of security breaches. Here are the key insights:

– **Purpose of CCM**:
– Aids in assessing and guiding security in cloud setups.
– Helps cloud service customers and providers implement appropriate security controls.

– **Usage by Cloud Service Customers (CSCs)**:
– Evaluate the security posture of current or prospective cloud vendors.
– Benchmark vendor compliance against relevant standards like ISO 27001.
– Define roles and responsibilities in their engagements with cloud providers.

– **Usage by Cloud Service Providers (CSPs)**:
– Establish and maintain robust cloud security programs.
– Benchmark their security capabilities against competitors.
– Combine documentation of controls for various compliance standards.

– **Human Resources (HRS) Domain Specifics**:
– Contains 13 control specifications, which include policies for background checks, acceptable use of technology, and security training.
– Address gaps associated with human error, which constitutes a significant percentage of security incidents.

– **Key Components of HRS Controls**:
– **Security and Privacy Training**: Ongoing training is vital to instill a security-first mindset among employees.
– **Personnel Conduct Controls**: These include protocols for acceptable technology use, clean desk policies, and remote working specifics.

– **Addressing Insider Risks**:
– Emphasizes the importance of background checks and implementing screening processes before granting access to sensitive systems.
– Highlights the necessity of training and clear expectations about handling sensitive data.

– **Mitigation Strategies for Risks**:
– Implementation of acceptable use policies to prevent inappropriate technology use.
– Establishing clear asset return processes during employee exit to safeguard information integrity.

– **Shared Security Responsibility Model (SSRM)**:
– Clarifies security responsibilities between CSPs and CSCs to prevent miscommunication, which can lead to security lapses.
– Reiterates the need for both parties to implement HRS controls effectively and together.

– **Importance of Continuous Training**:
– Regular training for employees, especially new hires, is essential to combat the constant threat of data breaches and ensure that best practices are ingrained in organizational culture.

In conclusion, the Cloud Controls Matrix, particularly the HRS domain, is vital for both cloud service customers and providers to maintain strong security postures against insider threats and ensure compliance with regulatory frameworks. Organizations are encouraged to regularly review and implement the guidelines to enhance their security practices effectively.