Cloud Computing Compliance Controls Catalogue (C5) : - Table of Content

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Cloud Computing ComplianCe Controls Catalogue (C5) | taBle oF Content

„ AM-02 Assignment of persons responsible


for assets 37
„ AM-03 Instruction manuals for assets 37
„ AM-04 Handing in and returning assets 37
„ AM-05 Classification of information 37
„ AM-06 Labelling of information and
handling of assets 38
„ AM-07 Management of data media 38
„ AM-08 Transfer and removal of assets 38

5.5 Physical security 39

„ PS-01 Perimeter protection 39


„ PS-02 Physical site access control 39
„ PS-03 Protection against threats from outside and from
the environment 39
„ PS-04 Protection against interruptions caused by power
failures and other such risks 40
„ PS-05 Maintenance of infrastructure and
devices 40

5.6 Operations 41

„ RB-01 Capacity management – planning 41


„ RB-02 Capacity management – monitoring 41
„ RB-03 Capacity management – data location 41
„ RB-04 Capacity management – control
of resources 42
„ RB-05 Protection against malware 42
„ RB-06 Data backup and restoration –
concept 42
„ RB-07 Data backup and restoration –
monitoring 43
„ RB-08 Data backup and restoration –
regular tests 43
„ RB-09 Data backup and restoration –
storage 43
„ RB-10 Logging and monitoring – concept 43
„ RB-11 Logging and monitoring – meta data 44
„ RB-12 Logging and monitoring – critical
assets 44
„ RB-13 Logging and monitoring – storage of the logs 44
„ RB-14 Logging and monitoring –
accountability 45
„ RB-15 Logging and monitoring –
configuration 45

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy