D320 (C838) Laws, Regulations, and Organizations Rated A+
1. (ISC)2 - International Information System Security Certification Consor-
tium: A security certification granting organization that has a long history of cer-
tifications that were difficult to get. This difficulty has made their certificates seen
as having higher value in the industry.
2. (ISC)2 Cloud Secure Data Life Cycle: Based on CSA Guidance. 1. Create; 2.
Store; 3. Use; 4. Share; 5. Archive; 6. Destroy.
3. (SAS) 70: was a recognized standard of the American Institute of Cer-
tified Public Accountants (AICPA) in response to the issues that also lead to
Sarbanes-Oxley (SOX). Deprecated in 2011 by the Statement on Standards for
Attestation Engagements (SSAE) No. 16.
4. AICPA: established SAS 70 and later SAAE 16.
5. AICPA: American Institute of Certified Public Accountants
6. Organizational Normative Framework (ONF): Concepts of ISO 27034. There
is only one for an organization but potentially as many ANF's as applications.
7. ASHRAE - American Society of Heating, Refrigerating and Air-Condition-
ing Engineers: a professional association seeking to advance heating, ventilation,
air conditioning and refrigeration systems design and construction.
8. Biba: an access control model designed to preserve data integrity. It has 3 goals.
Maintain internal and external consistency; prevent unauthorized data modification
even by authorized parties; prevent data modification by unauthorized individuals.
9. Capability Maturity Model (CMM): a development model where the maturity
relates to the formality and optimization of processes. When applied to cloud
security it would focus on those aspects as they relate to cloud security.
10. Child Online Protection Act (COPA): An attempt to restrict access by minors
to material defined as harmful to minors. A permanent injunction against the law
in 2009.
11. Cloud Access Security Brokers (CASBs): monitors network activity between
users and cloud applications and enforces security policy and blocking malware.
12. Cloud Security Alliance (CSA): publishes the Notorious Nine: 1) Data breach-
es; 2) Data Loss; 3) Account service traffic hijacking; 4) Insecure Interfaces and
APIs; 5) Denial of Service; 6) Malicious Insiders; 7) Abuse of Cloud Services; 8)
Insufficient Due Diligence; 9) Shared technology Vulnerabilities. There are also
implications and controls associated with each.
13. CSA STAR - Cloud Security Alliance (CSA) Security, Trust, and Assurance
Registry (STAR): uses the Consensus Assessments Initiative Question-
, D320 (C838) Laws, Regulations, and Organizations Rated A+
naire (CAIQ), Cloud Controls Matrix (CCM), and GDPR Self-Assessment as inputs
to certify an organization to Level 1.
Level 2 integrates the CSA Cloud Controls Matrix and the AICPA Trust Service
Principles - AT 101 for STAR attestation.
STAR Certification for level to uses the CSA Cloud Controls Matrix and the
requirements of the ISO/IEC 27001:2013 management system standard together
with the CSA Cloud Controls Matrix.
Certification certificates follow normal ISO/IEC 27001 protocol for a 3rd party
assessment.
14. Cloud Security Alliance Cloud Controls Matrix (CSA CCM): Composed of
17 domains covering key elements of cloud. It contains 170 objectives within the
domains. They integrate with the STAR program.
15. COBIT or Control Objectives for Information and Related Technologies: a
framework for IT governance and management. Initially used to achieve compli-
ance with Sarbanes-Oxley and focused on IT controls. Since 2019 the emphasis
has shifted to information governance. It is focused on these 5 principles: 1:
Meeting Stakeholder Needs; 2: Covering the Enterprise End-to-End; 3: Applying
a Single Integrated Framework; 4: Enabling a Holistic Approach; and 5: Separating
Governance from Management.
16. Common Criteria and the EAL: is assigned to an IT product after it has been
evaluated by an independent lab. The level indicates the degree and type of testing
with 1 the least and 7 the most. contains 60 functional requirements in 11
classes and is an accepted standard among the military organizations of the US
and many allies.
17. Consensus Assessments Initiative Questionnaire (CAIQ): an initiative of
the Cloud Security Alliance to provide an industry-accepted documentation of
security controls and as of 2020 is combined with the Cloud Controls Matrix.
They can be used as evidence for entry to the CSA STAR registry.
18. Digital Millennium Copyright Act (DMCA): controversial act intended to align
the US copyright act with the requirements of treaties and the World Intellectual
Property Organization.
19. DLP (Data Loss Prevention): is ensured by a set of tools, procedures, and
policy to ensure sensitive, proprietary, and PII is not lost or misused. It helps to
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Scores. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.49. You're not tied to anything after your purchase.