SaaS Cloud Security Standards
SaaS Cloud Security Standards
# Classified - Confidential
# Classified - Confidential
# Classified - Confidential
# Classified - Confidential
# Classified - Confidential
This tab to be com
** If the SaaS application uses a standard TCCC approved integration pattern for authentication / authorization (e.g. SAML 2.0 via Azure AD or privileged
policies for mor
# Classified - Confidential
GRC-V.02 1. Governance, Risk, & Data Governance
Compliance
# Classified - Confidential
GRC-V.08 1. Governance, Risk, & Compliance
Compliance
# Classified - Confidential
IAM-V.07 2. Identity & Access Credential Lifecycle /
Management Provision
Management
# Classified - Confidential
IAM-V.10 2. Identity & Access User Access
Management Authentication
# Classified - Confidential
SO-V.01 8. Security Operations Incident
Management
# Classified - Confidential
Management
# Classified - Confidential
Applications utilizing Highly Restricted data must comply with the
# Classified - Confidential
SO-V-HRD.01 8. Security Operations Logging and
Monitoring
# Classified - Confidential
This tab to be completed by vendor
pproved integration pattern for authentication / authorization (e.g. SAML 2.0 via Azure AD or privileged User management via CyberArk) certain requirements are not app
policies for more information.
CR-V.01.1
For data in transit, all network communication must be encrypted using industry
standards.
Note - Please provide supporting documentation defining encryption standards
and technologies.
CR-V.02.1
CR-V.02.2
All data volume/storage must be encrypted to prevent outside snooping in
addition to preventing unauthorized access to data in the multi-tenant
environment. CR-V.02.3
CR-V.03.1
**User IDs and passwords must be transmitted in an encrypted format and
passwords must be stored in an encrypted format per the current Technical
Security Baseline standards (IPP 9.2.4.4). CR-V.03.2
Note - Please see the instruction section above for more details.
CR-V.04.1
CR-V.04.3
Data traversing public networks shall be encrypted per the Industry Standard, CR-V.05.1
protected from fraudulent activity, and unauthorized disclosure or modification
in such a manner to prevent compromising of data.
Personal data must be transmitted using firm approved encrypted systems and CV-V.06.1
must not be transmitted via e-mail.
GRC-V.01.1
GRC-V.01.2
Polices and procedures shall be established for labeling, handling, storing,
transmitting, retention/disposal, and security of TCCC data and objects which
contain data, per the TCCC Information Classification Standard and Protection
Measures. Mechanisms for label inheritance shall be implemented for objects GRC-V.01.3
that act as aggregate containers for data.
# Classified - Confidential
transmitting, retention/disposal, and security of TCCC data and objects which
contain data, per the TCCC Information Classification Standard and Protection
Measures. Mechanisms for label inheritance shall be implemented for objects
that act as aggregate containers for data.
GRC-V.01.4
GRC-V.02.1
GRC-V.03.1
Policies, process, and procedures shall be implemented to enforce and ensure
proper segregation of duties. In those events where user-role conflict of interest
constraint exist, technical controls shall be in place to mitigate any risks arising
from unauthorized or unintentional modification or misuse of the organization's
information assets.
GRC-V.04.1
GRC-V.05.4
GRC-V.05.1
Changes to the production environment shall be documented, tested, and
approved prior to implementation. Production software and hardware changes
may include applications, systems, databases, and network devices requiring
patches, service packs, and other updates and modifications.
GRC-V.06.4
GRC-V.07.1
GRC-V.07.2
Aligned with the enterprise-wide framework, independent reviews or formal risk
assessments shall be performed at least annually, or at planned intervals,
determining the likelihood and impact of all identified risks, using qualitative
and/or quantitative methods to ensure the organization is compliant with
policies, procedures, standards, and applicable regulatory requirements (i.e.,
internal/external audits, certifications, vulnerability, and penetration testing).
Classified - Confidential
Note - Supporting documentation required: Independent Third-Party
#
GRC-V.07.5
Vendors that are storing, transmitting, and/or processing payment card data (e.g. GRC-V.08.1
full payment card numbers, primary account numbers, etc.) must be in
compliance with the Payment Card Industry (PCI) Data Security Standard (DSS).
Ensure processes are in place to transition data from unsupported to supported GRC-V.09.1
systems and applications.
Perform (and document results of) an information audit to determine what GRC-V.10.1
personal data is being stored and/or processed.
Systems must be configured to log all successful and unsuccessful login attempts IAM-V.02.1
by accounts with privileged access. (IPP 12.4.1.2) These authentication logs must
be retained for a minimum of 180 days and in accordance with the Company’s
records retention guidelines. (IPP 12.4.2.1)
Intended Users shall be presented with a login notice before being given the IAM-V.04.1
opportunity to log onto a System. (IPP 9.4.2.2)
Systems shall be designed to not give any information beyond notification of an IAM-V.05.1
unsuccessful login attempt prior to successful login. (IPP 9.4.2.4)
IAM-V.06.1
IAM-V.06.2
**Solution shall support for the TCCC Business Owner to review User access
rights (180 days) and at least every 90 days for privileged access and SOX
relevant information (IPP 9.2.5.1). For access violations identified, remediation
must follow documented access control policies and procedures.
IAM-V.06.3
Note - Please see the instruction section above for more details.
# Classified - Confidential
rights (180 days) and at least every 90 days for privileged access and SOX
relevant information (IPP 9.2.5.1). For access violations identified, remediation
must follow documented access control policies and procedures.
Note - Please see the instruction section above for more details.
IAM-V.06.4
Systems must support complex and strong passwords, and shall be IAM-V.07.1
communicated to the User in an out-of-band method (e.g., application passwords
can be phoned or mailed to the User, but not provided through the application
interface) (IPP 9.2.4.3). **Solution shall support measures to expire User
passwords no more than 13 months (IPP 19.2.1.3). For access violations
identified, remediation must follow documented access control policies and IAM-V.07.2
procedures
**Newly assigned passwords (e.g., initial, reset, temporary) must be unique,
randomly generated, and expire upon first use or after no more than 7 calendar
days if not used. (IPP 9.2.4.1) IAM-V.07.3
• Solution shall support passwords with a minimum of 12
characters in length and a minimum of 1 alphabetic, 1 numeric,
and 1 symbolic character for Non-Privileged (personal) User
• Solution shall support strong passwords that are a minimum
of 15 characters in length and are
comprised of letters, numbers, and special characters for
Privileged Users and are required to change password every 90 days IAM-V.07.4
(IPP 9.2.3.3)
Note - Please see the instruction section above for more details.
Audit logs recording privileged User access activities, authorized and IAM-V.08.1
unauthorized access attempts, system exceptions, and information security
events (e.g. source, target, attack type, and payload, for investigation purposes)
shall be retained for 180 days, complying with applicable policies and
regulations. Audit logs shall be reviewed at least daily and event management
tools be implemented to help facilitate timely detection, investigation by root IAM-V.08.2
cause analysis, and response to incidents. Physical and logical User access to
audit logs shall be restricted to authorized personnel.
IAM-V.08.4
IAM-V.08.5
IAM-V.09.2
IAM-V.09.3
# Classified - Confidential
Solution shall support measures to strictly limit access to tenant data from non- IAM-V.10.1
authorized or non-enterprise managed devices (e.g., personal desktop
computers or personal mobile devices).
**Solution shall support measure to expire dormant accounts. User accounts IAM-V.11.1
that have not been used within a minimum of 90 days shall be
de-provisioned/expired unless an exception is approved. For access violations
identified, remediation must follow documented access control policies and
procedures.
Note - Please see the instruction section above for more details.
**Solution shall not support cyclical passwords for User accounts. Where IAM-V.12.1
technically feasible, Systems shall use password history techniques to maintain a
history of User’s passwords and disallow the reuse of passwords in the history
file. (IPP 9.4.3.3)
Access request to systems handling personal data must be approved and IAM-V.13.1
restricted to authorized individuals.
Access to personal data or functionality that process personal data must be IAM-V.14.1
restricted to users or systems with approved entitlements (RBAC).
Personal data fields stored in databases and any non-database data stores IAM-V.16.1
containing personal data being used by applications must be registered in a
standard inventory repository.
All credentials used by apps processing personal data must be stored in IAM-V.17.1
centralized TCCC approved credential storage system.
Network and Solution architecture diagrams must clearly identify high-risk SD-V.02.1
environments and data flows that may have regulatory compliance impacts. All
termination of network encryption shall be clearly identified. These architecture
diagrams shall be made available on request.
SD-V.02.2
# Classified - Confidential
The service provider shall provide notification to the TCCC Security Operations SO-V.01.1
(KO-CIRT at kocirt@coca-cola.com or +1-404-515-2478, their local help desk,
and the business owner of the data that was protected) for anomalous activity,
identified breaches, and security events. (IPP 10.1.2.12)
SO-V.01.3
SO-V.03.2
SO-V.04.1
SO-V.05.1
SO-V.05.2
System should log, monitor, and collect relevant security event data, (e.g.,
source, target, attack type, and payload) for investigation purposes.
# Classified - Confidential
System should log, monitor, and collect relevant security event data, (e.g.,
source, target, attack type, and payload) for investigation purposes.
SO-V.05.3
TA-V.01.1
A security awareness training program shall be in place for all contractors, third-
party users, and employees of the organization and mandated when appropriate. TA-V.01.2
All individuals with access to organizational data shall receive appropriate
awareness training and regular updates in organizational procedures, process,
and policies relating to their function relative to the organization.
TA-V.01.3
Policies and procedures shall be established and mechanism implemented for VTM-V.01.1
detecting and addressing standard vulnerabilities within the below timeframe
per the Security Patch Management Standard, or similar change management
standard:
Severity 5: 14 days
Severity 4: 30 days
Severity 3: 180 days VTM-V.01.2
Severity 2: Optional
Severity 1: Optional
Incase the mentioned timelines are not met, vendors should be able to provide
their agreed upon timelines.
VTM-V.01.3
Note - Please find further details in the severity definition section.
Policies and procedures shall be established and mechanism implemented for VTM-V.02.1
malware protection. Ensure that all anti-malware programs are capable of
detecting, removing, and protecting against all known types of malicious or
unauthorized software with antivirus signature and definition updates at least
every 12 hours. Software must not be more than one major revision behind
current software version.
VTM-V.02.2
Web-facing High Business Impact (HBI) applications, PI, and SPI shall be VTM-V.03.1
protected by a standard WAF (Web Application Firewall).
VTM-V.04.1
VTM-V.04.2
Perform periodic scanning of operating systems, databases, and server
applications for vulnerability and configuration compliance using suitable
vulnerability management tools as per the industry standard. Policies and VTM-V.04.3
procedures shall be established and mechanism implemented for maintaining
vulnerability scan results for at least one year and provide, as needed, for audit
and review purposes.
VTM-V.04.4
# Classified - Confidential
Applications utilizing Highly Restricted data must comply with the below requirements in addition to baseline security requirements
For HBI and Highly Restricted data, segregation of duties shall be implemented IAM-V-
and maintained across all infrastructure and application layers e.g., a Server HRD.01.1
Administrator or Host Service Account shall not have privileged access to an
application running on the server. Similarly, an Application Administrator or
Application Service Account shall not have administrative access to the
middleware or server configurations.
Solution shall limit access to TCCC managed devices for High Business Impact AM-V-
Application and Highly Restricted Data. HRD.01.1
CR-V-HRD.01.1
For data in transit, network communication must be encrypted for Highly
Restricted, HBI, and SPI. Highest Level Data Classification requirements must be
adhered to when there are multiple data classifications. All termination of
network encryption shall be clearly identified.
CR-V-HRD.02.1
For SPI, HBI, and Highly Restricted data, all cryptographic keys shall be managed
by TCCC. Policies and procedures shall be established and measures
implemented for segregation of duties between PKI administration and System
Administration.
Host/file integrity (protection module) is required for any systems storing and VTM-V-
transmitting Highly Restricted Data to detect any unauthorized changes to data HRD.01.1
or system configuration.
VTM-V-
HRD.02.1
Policies and procedures shall be established and mechanisms implemented for
detecting and addressing High Business Impact and Highly Restricted data
vulnerabilities within the below timeframe per the IRM Security Patch
Management Standards and Policies.
Severity 5: 7 days
Severity 4: 14 days
Severity 3: 90 days
Severity 2: Optional
Severity 1: Optional
Incase the mentioned timelines are not met, vendors should be able to provide
their agreed upon timelines.
VTM-V-
HRD.03.1
VTM-V-
HRD.03.2
For Highly Restricted Data and HBI, vulnerability scanning shall be performed at VTM-V-
least daily within operating systems, databases, and server applications. Scanning HRD.03.3
shall include vulnerability and configuration compliance, using the industry
approved vulnerability management tool.
# Classified - Confidential
For Highly Restricted Data and HBI, vulnerability scanning shall be performed at
least daily within operating systems, databases, and server applications. Scanning
shall include vulnerability and configuration compliance, using the industry
approved vulnerability management tool. VTM-V-
HRD.03.4
VTM-V-
HRD.03.5
SO-V-HRD.01.1
Continual security monitoring for unauthorized activity and attempted intrusion
is required for HBI and all Systems that process or store Highly Restricted
information using standard TCCC approved technologies (IPS, IDS, anomaly
detection, Security Analytics, etc.). Any attempted intrusion logs shall be sent to
TCCC SOC.
SD-V-HRD.01.1
SD-V-HRD.01.2
Systems and applications classified as Highly Restricted shall have a dedicated
computing environment isolated using physical or logical methods. Logical
methods of isolation shall be based on the Architecture and Technical Security
Baselines identified by Information Technology. (IPP 9.4.6.1)
SD-V-HRD.01.3
SO-V-HRD.02.1
Proper forensic procedures, including chain of custody, are required for the
presentation of evidence to support potential legal action subject to the relevant SO-V-HRD.02.2
jurisdiction after an information security incident. Upon notification, customers
and/or other external business partners impacted by a security breach shall be
given the opportunity to participate, as is legally permissible, in the forensic
investigation. SO-V-HRD.02.3
SO-V-HRD.02.4
# Classified - Confidential
completed by vendor
eged User management via CyberArk) certain requirements are not applicable as these would be covered by the standard integration pattern. Refer to TCCC
more information.
# Classified - Confidential
If not, please provide your retention policy and secure data
disposal documentation.
# Classified - Confidential
Do you conduct annual application penetration tests of your
cloud infrastructure regularly as prescribed by industry best
practices and guidance?
Do you retain all logs for all login attempts for a minimum
time period of 90 days or as required by the tenant?
# Classified - Confidential
Do you support tenant's access review policy?
# Classified - Confidential
Are policies and procedures established and measures
implemented to strictly limit access to your sensitive data
and tenant data from portable and mobile devices (e.g.,
laptops, cell phones, and personal digital assistants (PDAs)),
which are generally higher-risk than non-portable devices
(e.g., desktop computers at the provider organization’s
facilities)?
# Classified - Confidential
Have you suffered any security breach in the last 5 years?
# Classified - Confidential
Does your incident response plan comply with industry
standards for legally admissible chain-of-custody
management processes and controls?
# Classified - Confidential
the below requirements in addition to baseline security requirements
Consensus Assessment Answers
Consensus Assessment Questions
Yes No N/A
# Classified - Confidential
Are your security vulnerability assessment tools approved as
per industry standards?
Do you have external third party services conduct
vulnerability scans and periodic penetration tests on your
applications and networks?
Do you use file integrity (host) and network intrusion
detection (IDS) tools for you SaaS solution to help facilitate
timely detection, investigation by root cause analysis, and
response to incidents?
# Classified - Confidential
overed by the standard integration pattern. Refer to TCCC
# Classified - Confidential
# Classified - Confidential
# Classified - Confidential
# Classified - Confidential
# Classified - Confidential
# Classified - Confidential
# Classified - Confidential
Consensus Assessment Answers
Notes/Comments
# Classified - Confidential
# Classified - Confidential