Evaluate cloud security controls per ISO/IEC 27017:2015 for cloud service providers and cloud customers, covering shared responsibility, data protection, and cloud-specific risks
ISO 27017 Clause 5: Clear delineation of security responsibilities (IaaS/PaaS/SaaS)
Governance: Cloud usage policies, approved services, security baselines
Due diligence: Verify cloud provider third-party attestations
CLD.6.2.1: Track all cloud resources (VMs, storage, databases, APIs)
Secure cloud configuration: Disable unnecessary services, enable logging
CLD.6.3.1: Unusual usage may indicate compromise or resource abuse
Network isolation: VPCs, subnets, security groups, NACLs
CLD.12.4.1: CloudTrail, Azure Monitor, GCP Cloud Logging for audit trails
CLD.12.4.5: Hypervisor security, storage isolation, network segmentation
CLD.6.1.1: Service Level Agreements define expectations and remedies
CLD.9.2.2: AES-256 encryption with key management (KMS, Key Vault, Cloud KMS)
CLD.9.2.1: Protect data moving between client, cloud, and services
Data classification: Public, internal, confidential, PHI/PII
CLD.12.3.1: Geo-redundant backups protect against regional failures
CLD.9.2.4: MFA required for privileged and administrative access
CLD.9.2.3: Grant minimum permissions necessary for job function
IAM roles: Define permissions by job role, not individual users
CLD.16.1.5: Cloud IR covers account compromise, data breaches, misconfigurations
CLD.12.3.1: RPO/RTO defined and validated through DR testing
CLD.11.2.8: Cryptographic erasure or provider-certified data destruction
Please answer all required questions to see your results