This document is the table of contents for the Cloud Computing Compliance Controls Catalogue (C5). It lists the section headings and control objectives covered in the full document. The sections include asset management, physical security, and operations. Some example control objectives listed are assignment of asset responsibilities, perimeter protection, capacity management planning, data backup and restoration monitoring, and logging and monitoring configuration.
This document is the table of contents for the Cloud Computing Compliance Controls Catalogue (C5). It lists the section headings and control objectives covered in the full document. The sections include asset management, physical security, and operations. Some example control objectives listed are assignment of asset responsibilities, perimeter protection, capacity management planning, data backup and restoration monitoring, and logging and monitoring configuration.
This document is the table of contents for the Cloud Computing Compliance Controls Catalogue (C5). It lists the section headings and control objectives covered in the full document. The sections include asset management, physical security, and operations. Some example control objectives listed are assignment of asset responsibilities, perimeter protection, capacity management planning, data backup and restoration monitoring, and logging and monitoring configuration.
This document is the table of contents for the Cloud Computing Compliance Controls Catalogue (C5). It lists the section headings and control objectives covered in the full document. The sections include asset management, physical security, and operations. Some example control objectives listed are assignment of asset responsibilities, perimeter protection, capacity management planning, data backup and restoration monitoring, and logging and monitoring configuration.
Cloud Computing ComplianCe Controls Catalogue (C5) | taBle oF Content
AM-02 Assignment of persons responsible
for assets 37 AM-03 Instruction manuals for assets 37 AM-04 Handing in and returning assets 37 AM-05 Classification of information 37 AM-06 Labelling of information and handling of assets 38 AM-07 Management of data media 38 AM-08 Transfer and removal of assets 38
5.5 Physical security 39
PS-01 Perimeter protection 39
PS-02 Physical site access control 39 PS-03 Protection against threats from outside and from the environment 39 PS-04 Protection against interruptions caused by power failures and other such risks 40 PS-05 Maintenance of infrastructure and devices 40
5.6 Operations 41
RB-01 Capacity management – planning 41
RB-02 Capacity management – monitoring 41 RB-03 Capacity management – data location 41 RB-04 Capacity management – control of resources 42 RB-05 Protection against malware 42 RB-06 Data backup and restoration – concept 42 RB-07 Data backup and restoration – monitoring 43 RB-08 Data backup and restoration – regular tests 43 RB-09 Data backup and restoration – storage 43 RB-10 Logging and monitoring – concept 43 RB-11 Logging and monitoring – meta data 44 RB-12 Logging and monitoring – critical assets 44 RB-13 Logging and monitoring – storage of the logs 44 RB-14 Logging and monitoring – accountability 45 RB-15 Logging and monitoring – configuration 45