Security Compliance: CCM Questions
More digestible questions based off of the Cloud Controls Management v4.0.3 compliance framework.
A&A
Does the organization have independent audits performed on a regular basis according to relevant compliance standards?
Are the results of these audits reported to the proper officials and used for remediation?
AIS
Does the organization maintain requirements for application security and how to maintain the security of proprietary applications?
BCR
Does the organization maintain a business continuity and disaster response plan?
Is this plan tested and updated regularly?
CCC
Are baselines for all organizational assets and policies for changing configurations of these assets established and regularly updated?
Is there a plan for detecting unauthorized changes and rolling back unwanted changes?
CEK
Are secure cryptographic technologies implemented and maintained in order to protect passwords, cryptographic keys, and other sensitive information?
DCS
Is all sensitive information stored, transported, and disposed of carefully? (This can include physical and digital storage, transportation, and disposal.)
DSP
Is the management, security, and ownership of personal or sensitive data defined and documented?
HRS
Are employees vetted, trained, and informed properly before receiving access to sensitive information?
Are work spaces and sites secured?
IAM
Are secure user policies implemented?
This includes strong authentication policies, least privilege policies, and strong information and user management policies.
IVS
Are work environments separated logically and is the communication between those environments secured properly?
LOG
Are physical and information systems logged and monitored for anomalous activity?
SEF
Is there an established security incident response plan that is regularly reviewed and tested?
TVM
Are there policies and procedures to prevent and remediate vulnerabilities and malware?
Are these policies and procedures tested and updated regularly?
UEM
Are endpoints secured?
Is usage of these endpoints controlled and monitored?
Last updated