<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cloud Accreditations - Techyaz.com</title>
	<atom:link href="https://techyaz.com/tag/cloud-accreditations/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Tips, Tutorials and How-to Topics</description>
	<lastBuildDate>Fri, 01 Jun 2018 12:46:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://techyaz.com/wp-content/uploads/2017/11/cropped-Site-icon-150x150.png</url>
	<title>Cloud Accreditations - Techyaz.com</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Understanding Cloud Security &#038; Data Protection</title>
		<link>https://techyaz.com/cloud/cloud-security/understanding-cloud-security-data-protection/</link>
					<comments>https://techyaz.com/cloud/cloud-security/understanding-cloud-security-data-protection/#respond</comments>
		
		<dc:creator><![CDATA[Shatakshi]]></dc:creator>
		<pubDate>Fri, 03 Nov 2017 10:44:16 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cloud Accreditations]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[cloud technology]]></category>
		<guid isPermaLink="false">http://techyaz.com/?p=1099</guid>

					<description><![CDATA[<p>These days lot of organizations are moving to cloud but one thing every customer ask and that is about Cloud Security. They have lot of questions on cloud security like Is our data secured in Cloud environment? Or Is your&#46;&#46;&#46;</p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/understanding-cloud-security-data-protection/">Understanding Cloud Security &#038; Data Protection</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>These days lot of organizations are moving to cloud but one thing every customer ask and that is about Cloud Security. They have lot of questions on cloud security like <strong>Is our data secured in Cloud environment?</strong> Or <strong>Is your data in Cloud hackable?</strong> Or <strong>Can your data be disclosed by the Cloud Service Provider?</strong></p>
<p>Here I am going to answer all these questions and explaining about Cloud Security in this context.</p>
<h3><span style="color: #000080;"><strong>Is your data secure in Cloud environment?</strong></span></h3>
<p><strong>Yes,</strong> your data will be secured in <a href="https://techyaz.com/cloud/what-is-cloud-computing/" target="_blank" rel="noopener">cloud environment</a> if you can design security solution/configurations leveraging public cloud providers features and third-party tools efficiently.</p>
<p>The amount of security configuration work you must do will varies, depending on what kind of cloud services you select and how sensitive your data is.</p>
<p>Security in Cloud creates a shared responsibility model between the customer and Cloud Service Provider (CSP). CSPs are responsible for securing the infrastructure (hardware, software, networks, and facilities of their Data center) that supports the cloud and you will be responsible for anything you put on the cloud or connect to the cloud (Data, Operating System, softwares, tools, License, Access, Credentials, authentication, encryption etc.)</p>
<h3><span style="color: #000080;"><strong>Is your data in Cloud Hackable?</strong></span></h3>
<p><strong>No,</strong> cloud systems are not hackable in terms of technology, hardware and network services provided by cloud provider. However, if security configurations are not done accurately by the user then loopholes in security may lead vulnerability in your cloud environment.</p>
<h3><span style="color: #000080;"><strong>Can your data be disclosed by the Cloud Service Provider?</strong></span></h3>
<p>Your content/data <strong>will not</strong> be disclosed unless service provider required to do so to comply with the law of the country or a valid and binding order of a governmental or regulatory body. Unless prohibited from doing so or there is clear indication of illegal conduct about the use of CSP’s products or services. CSP notifies customers before disclosing customer content so they can seek protection from disclosure.</p>
<p>To understand all above and similar security related concerns you should first understand Cloud Security. Let’s discuss what is cloud security and how many domains we need to take care from cloud security point of view.</p>
<h3><span style="color: #000080;"><strong>What is Cloud Security?</strong></span></h3>
<p>As every second your information/data travel through cloud and from different locations, networks and regions. We need to ensure it is not leaked in process of transmission from one place to other. Typically, all firms are well verse about physical and technical security of their On-premise data center. Similarly, cloud services and Infrastructure need to be secured to protect the confidentiality, integrity, and availability of your or your client data.</p>
<p>In Cloud context, security is a shared responsibility between the Cloud Service Provider (CSP) and its users/customers. CSPs take care of physical and logical security of its underlying hardware until Hypervisor layer. However, anything above Operating System is Client responsibility because customer owns the data and service provider has no access to it. Although it also varies in each model of Cloud Computing for some services.</p>
<p>Cloud Security is all about leveraging security features and tools to design and build a secure cloud environment to protect the privacy and integrity of cloud customers and their data. Cloud Security is blend of technologies and policies designed to adhere and regulate compliance rules and protect information, data applications and infrastructure associated with <a href="https://techyaz.com/cloud/what-is-cloud-computing/" target="_blank" rel="noopener">Cloud Computing</a> use.</p>
<h3><span style="color: #000080;"><strong>Cloud Security Categories</strong></span></h3>
<p>From cloud security perspective, below are the cloud security domains or categories that needs to be considered while building cloud environment.</p>
<ol>
<li><strong>Physical Security</strong></li>
<li><strong>Network security</strong></li>
<li><strong>System Security</strong></li>
<li><strong>Application Security</strong></li>
<li><strong>Data Security</strong></li>
<li><strong>Identity and Access management</strong></li>
<li><strong>Encryptions</strong></li>
<li><strong>Security operations</strong></li>
</ol>
<p>Each ownership for each type of security in cloud varies in each model of Cloud. You can see who is responsible for  what in each cloud model in below image.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-large wp-image-1100" src="http://techyaz.com/wp-content/uploads/2017/11/cloud-security-1024x410.png" alt="cloud security" width="1024" height="410" srcset="https://techyaz.com/wp-content/uploads/2017/11/cloud-security-1024x410.png 1024w, https://techyaz.com/wp-content/uploads/2017/11/cloud-security-300x120.png 300w, https://techyaz.com/wp-content/uploads/2017/11/cloud-security-768x307.png 768w, https://techyaz.com/wp-content/uploads/2017/11/cloud-security.png 1204w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<ol>
<li><strong>Physical Security- </strong>is the protection of hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution. CSPs are responsible to take care of this security.</li>
<li><strong>Network Security – </strong>Includes data security in transit to and from the public cloud provider. It means designing and building network configuration and its elements allowing a secure access to cloud resources from your on-premise Data centers, Office, Internet etc. This security is shared responsibility between CSPs &amp; Customer.</li>
<li><strong>System Security- </strong>This capability covers operating system hardening, protection and policy control. The host security at PaaS and SaaS Level are transferred to CSP.</li>
<li><strong>Application Security – </strong>It’s a shared responsibility in cloud context to protect the application running over the cloud. Based on type of cloud model application security is managed, for e.g in SaaS cloud provider will manage the security of the application. While at the PaaS level platform security will be managed by CSP and deployed application will be customer responsibility.</li>
<li><strong>Data Security – </strong>Data security capability includes securing data in transit and at rest it to avoid data loss and exposure.</li>
<li><strong>Identity and Access management- </strong>This capability evolves around authentication, verification and authorization of cloud resources.</li>
<li><strong>Encryptions – </strong>As all communications between regions is across public Internet infrastructure; therefore, appropriate encryption methods should be used to protect sensitive data.</li>
<li><strong>Security operations- </strong>Governance and strategic direction on security policies, risk assessment and its maintenance.</li>
</ol>
<h3><span style="color: #000080;"><strong>Choose Cloud Service Provider considering Data Security, Information Security and Quality Assurance?</strong></span></h3>
<p>Its depends on data and its criticality in terms of sensitivity, availability &amp; durability requirement. For choosing most reliable cloud service provider we must consider <a href="https://techyaz.com/cloud/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/" target="_blank" rel="noopener">CSP’s accreditations, security certifications and third party audit assessment reports</a>. All major cloud service provider share their policies accreditation on data privacy, security, durability, availability information on their respective portals under valid Non-disclosure agreement. These certifications are global and can be achieved through periodic rigorous external audit accredited certification bodies based on <strong>NIST</strong> (National Industrial Security Program Operating Manual) global standards.</p>
<p>Some of the Most popular <a href="https://techyaz.com/cloud/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/" target="_blank" rel="noopener">Cloud Service Provider Accreditations and Certification</a> for cloud computing compliance and security are given in attached article. Read it to understand Cloud Accreditations and Certification that will finally help you to choose right Cloud Service Provider.</p>
<p>I hope you like this article. Please follow us on our <a href="https://www.facebook.com/Techyaz/">facebook page</a> and on <a href="https://twitter.com/Tech_yaz">Twitter </a>handle to get latest updates.</p>
<p><span style="color: #800000;"><em><strong>Reference Links:</strong></em></span> <a href="https://azure.microsoft.com/en-in/support/trust-center/">Azure</a> , <a href="https://aws.amazon.com/security/">AWS</a>  ,<a href="https://cloud.google.com/security/compliance/">Google</a> ,<a href="https://www.ibm.com/cloud-computing/bluemix/compliance/">IBM</a></p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/understanding-cloud-security-data-protection/">Understanding Cloud Security &#038; Data Protection</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techyaz.com/cloud/cloud-security/understanding-cloud-security-data-protection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Top 5 Cloud Service Provider Accreditations and Third-Party Auditor Reports</title>
		<link>https://techyaz.com/cloud/cloud-security/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/</link>
					<comments>https://techyaz.com/cloud/cloud-security/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/#respond</comments>
		
		<dc:creator><![CDATA[Shatakshi]]></dc:creator>
		<pubDate>Thu, 02 Nov 2017 14:00:13 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[audit]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cloud Accreditations]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[cloud technology]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://techyaz.com/?p=1094</guid>

					<description><![CDATA[<p>Cloud Service provider is responsible for protecting its infrastructure that runs all the services in the cloud. The Infrastructure is combination of hardware, software, networking, facilities etc. It is not possible for all customers to visit and inspect physical and&#46;&#46;&#46;</p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/">Top 5 Cloud Service Provider Accreditations and Third-Party Auditor Reports</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Cloud Service provider is responsible for <a href="https://techyaz.com/cloud/understanding-cloud-security-data-protection/" target="_blank" rel="noopener">protecting its infrastructure</a> that runs all the services in the cloud. The Infrastructure is combination of hardware, software, networking, facilities etc. It is not possible for all customers to visit and inspect physical and technical security of the cloud data center hence all CSPs publish several third-party auditors report to validate its compliance. CSPs  provide reports from third-party auditors who have verified their compliance with a variety of computer security standards and regulations that is known as Cloud Service Provider Accreditation.</p>
<p><img decoding="async" class="aligncenter  wp-image-1097" src="http://techyaz.com/wp-content/uploads/2017/11/Cloud-Accreditations-1024x576.jpg" alt="Cloud Accreditations" width="525" height="295" srcset="https://techyaz.com/wp-content/uploads/2017/11/Cloud-Accreditations-1024x576.jpg 1024w, https://techyaz.com/wp-content/uploads/2017/11/Cloud-Accreditations-300x169.jpg 300w, https://techyaz.com/wp-content/uploads/2017/11/Cloud-Accreditations-768x432.jpg 768w, https://techyaz.com/wp-content/uploads/2017/11/Cloud-Accreditations.jpg 1280w" sizes="(max-width: 525px) 100vw, 525px" /></p>
<h3><span style="color: #000080;">Compliance Program provided by Cloud Services Providers</span></h3>
<p>Cloud Service providers ensure robust controls to secure their infrastructure, to protect client data. As virtual systems build over the cloud Infrastructure need also to be secured and it comes with shared responsibility and compliance. Cloud Data center environment comes with audit friendly features and standards to ensure client satisfaction about their data security. The IT infrastructure that CSP provides to its customers is designed and managed in orientation with security best practices and a variety of IT security standards due to economies of scale, including but not limited to the following:</p>
<p><span style="color: #800000;"><strong>AWS (Amazon) Security Certifications /Accreditation </strong></span></p>
<ul>
<li><a href="https://techyaz.com/cloud/what-is-cloud-computing/" target="_blank" rel="noopener">Cloud Computing</a> Compliance Controls Catalogue (C5)</li>
<li>FedRAMP Partner Package</li>
<li>Global Financial Services Regulatory Principles IRAP Package</li>
<li>ISO 27001:2013 Certification and Statement of Applicability (SoA)</li>
<li>ISO 27017:2015 Certification and Statement of Applicability (SoA)</li>
<li>ISO 27018:2014 Certification and Statement of Applicability (SoA)</li>
<li>ISO 9001:2015 Certification</li>
<li>MAS TRM Guidelines Workbook</li>
<li>PCI DSS Attestation of Compliance (AOC) and Responsibility Summary</li>
<li>PSN Connection Compliance Certificate (CoCo)</li>
<li>PSN Service Provision Compliance Certificate</li>
<li>Quality Management System Overview</li>
<li>Service Organization Controls (SOC) 1 Report</li>
<li>Service Organization Controls (SOC) 2 Report</li>
<li>Service Organization Controls (SOC) 3 Report</li>
<li>SOC Continued Operations</li>
</ul>
<p><strong> </strong><span style="color: #800000;"><strong>Microsoft Azure Security and Compliance Certifications / Accreditation</strong></span><strong> </strong></p>
<ul>
<li>ISO 27001, FedRAMP, SOC 1 and SOC 2.</li>
<li>The Content Delivery and Security Association (CDSA)</li>
<li>Criminal Justice Information Services (CJIS)</li>
<li>The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) CSACCM</li>
<li>EU Model Clause</li>
<li>FDA 21 CFR Part 11(The US Food and Drug Administration (FDA) Code of Federal</li>
<li>Regulations (CFR) Title 21 Part 11)</li>
<li>FedRAMP(Federal Risk and Authorization Management Program (FedRAMP)</li>
<li>The Family Educational Rights and Privacy Act (FERPA)</li>
<li>FIPS 140-2. Federal Information Processing Standard (FIPS) Publication 140-2</li>
<li>The Health Insurance Portability and Accountability Act (HIPAA)</li>
<li>IRAP (Australian Government Information Security Registered Assessors Program)</li>
<li>ISO/IEC 27001/27002:2013</li>
<li>Multi-Level Protection Scheme (MLPS) is based on the Chinese state standard issued by the Ministry of Public Security</li>
<li>Multi-Tier Cloud Security Standard for Singapore (MTCS SS),</li>
<li>Payment Card Industry (PCI) Data Security Standards (DSS) version 3.0</li>
<li>TCS CCCPPF Trusted Cloud Service certification developed by the China Cloud Computing Promotion and Policy Forum (CCCPPF)</li>
<li>UK G-Cloud.<strong> </strong></li>
</ul>
<p><span style="color: #800000;"><strong>Google Security and Compliance Certifications / Accreditation</strong></span></p>
<ul>
<li>SSAE16 / ISAE 3402 Type II:</li>
<li>SOC 1</li>
<li>SOC 2</li>
<li>SOC 3 public audit report</li>
<li>ISO 27017, Cloud Security</li>
<li>ISO 27018, Cloud Privacy</li>
<li>FedRAMP ATO for Google App Engine</li>
<li>PCI DSS v3.2</li>
<li>HIPAA</li>
<li>CSA STAR</li>
<li>MTCS Tier 3 Certification (Singapore)</li>
<li>Google Cloud Platform and the EU Data Protection Directive<strong> </strong></li>
</ul>
<p><span style="color: #800000;"><strong>IBM Security and Compliance Certifications / Accreditation</strong></span></p>
<ul>
<li>FedRAMP</li>
<li>FISMA</li>
<li>FFIEC</li>
<li>SOC Reports</li>
<li>ISO 27001</li>
<li>ISO 27017</li>
<li>ISO 27018</li>
<li>Cloud Security Alliance</li>
<li>PCI Compliance</li>
<li>HIPAA</li>
<li>HITRUST Assessment</li>
<li>GSMA (DAL09, PAR01)</li>
<li>CJIS Standards</li>
<li>EU Model Clauses</li>
<li>Privacy Shield</li>
<li>IBM ISO Management System Certifications</li>
</ul>
<p><span style="color: #800000;"><strong><em>Related Read:</em></strong></span></p>
<ul>
<li><strong><a href="https://techyaz.com/cloud/what-is-cloud-computing/" target="_blank" rel="noopener">What is Cloud Computing?</a></strong></li>
<li><strong><a href="https://techyaz.com/cloud/understanding-cloud-security-data-protection/" target="_blank" rel="noopener">Understanding Cloud Security &amp; Data Protection in Cloud</a></strong></li>
</ul>
<p>I hope you like this article. Please follow our <a href="https://www.facebook.com/Techyaz/" target="_blank" rel="noopener">Facebook</a> page and <a href="https://twitter.com/Tech_yaz">Twitter </a>handle to get latest updates.</p>
<p><em><strong><span style="color: #800000;">Reference Links:</span></strong></em> <a href="https://azure.microsoft.com/en-in/support/trust-center/">Azure</a> , <a href="https://aws.amazon.com/security/">AWS</a>  ,<a href="https://cloud.google.com/security/compliance/">Google</a> ,<a href="https://www.ibm.com/cloud-computing/bluemix/compliance/">IBM</a></p>
<p>The post <a href="https://techyaz.com/cloud/cloud-security/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/">Top 5 Cloud Service Provider Accreditations and Third-Party Auditor Reports</a> appeared first on <a href="https://techyaz.com">Techyaz.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://techyaz.com/cloud/cloud-security/top-5-cloud-service-provider-accreditations-third-party-auditor-reports/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
