Log in to Skyline

Controls for ‘Health and Social Care Cloud Security – Good Practice Guide’

Ref

Security Principle

NHS Guidance

Applies To

Controls

Ref

Security Principle

NHS Guidance

Applies To

Controls

1

Data in transit protection

The Cloud Provider should:-

  1. Utilise strong cryptography as defined by NIST SP800-57 to encrypt communication

  2. Undertake annual assessment against a recognised standard such as ISO to test the security of the communication

AWS

Utilise strong cryptography as defined by NIST SP800-57 to encrypt communication

AWS establishes and manages cryptographic keys for required cryptography employed within the system boundary. AWS produces, controls, and distributes symmetric cryptographic keys using U.S. National Institute of Standards and Technology (NIST)-approved key management technology and processes in the AWS information system.

AWS is designed to protect the confidentiality and integrity of transmitted data through the comparison of a cryptographic hash of data transmitted. This is done to help ensure that the message is not corrupted or altered in transit. Data that has been corrupted or altered in transit is immediately rejected.

AWS provides several methods for customers to securely handle their data.

Customers choose how their customer content is secured. We offer our customers strong encryption for customer content in transit or at rest, and we provide customers with the option to manage their own encryption keys.

Please refer to the AWS Security & Compliance Whitepapers (available at https://aws.amazon.com/compliance/resources/), and the following AWS Audit Reports, for additional details: PCI 3.2, ISO 27001, ISO 27017, ISO 27018, SOC 2 COMMON CRITERIA, SOC 1 & 2 CONTROLS, HIPAA, NIST 800-53, C5"

AWS offers the Amazon Virtual Private Cloud (VPC), which provides a private subnet within the AWS cloud, and the ability to use an IPsec Virtual Private Network (VPN) device to provide an encrypted tunnel between the Amazon VPC and your data center.

"AWS enables customers to open a secure, encrypted channel to AWS servers using HTTPS (TLS/SSL).

You can connect to an AWS access point (API endpoint) via HTTP or HTTPS using Secure Sockets Layer (SSL), a cryptographic protocol that is designed to protect against eavesdropping, tampering, and message forgery."

Undertake annual assessment against a recognised standard such as ISO to test the security of the communication

"AWS has established a formal audit program that includes continual, independent internal and external assessments to validate the implementation and operating effectiveness of the AWS control environment.

Internal and external audits are planned and performed according to the documented audit scheduled to review the continued performance of AWS against standards-based criteria and to identify general improvement opportunities. Standards-based criteria includes but is not limited to the ISO/IEC 27001, Federal Risk and Authorization Management Program (FedRAMP), the American Institute of Certified Public Accountants (AICPA): AT 801 (formerly Statement on Standards for Attestation Engagements [SSAE] 16), and the International Standards for Assurance Engagements No.3402 (ISAE 3402) professional standards.

Compliance reports from these assessments are made available to customers to enable them to evaluate AWS. The AWS Compliance reports identify the scope of AWS services and regions assessed, as well the assessor’s attestation of compliance. A vendor or supplier evaluation can be performed by leveraging these reports and certifications. Report are available to customers using AWS Artifact, a self-service portal for on-demand access to AWS’ compliance reports.

Please refer to the AWS Security & Compliance Whitepapers (available at https://aws.amazon.com/compliance/resources/), and the following AWS Audit Reports, for additional details: PCI 3.2, ISO 27001, ISO 27017, ISO 27018, SOC 2 COMMON CRITERIA, SOC 1 & 2 CONTROLS, HIPAA, NIST 800-53, C5"

The Service User should:-

  1. Utilise strong cryptography as defined by NIST SP800-57 to encrypt communications between the Cloud and the End-user

  2. Undertake regular (minimum yearly) penetration testing of the communication between the Cloud and the End-user

ISL

  1. TLS 1.2 always used in communications between the Cloud and the End-user;

  2. Regular (Annual) penetration testing performed by independent 3rd party

2

Asset protection and resilience

 

 

 

2.1

Physical location and legal jurisdiction

The Cloud Provider must:-

  1. Provide cloud infrastructure (which includes all hardware, software, networks and the physical data centres that house it all) within the UK, European Economic Area (EEA), a country deemed adequate by the European Commission, or in the US where covered by Privacy Shield

  2. Provide independent validation that the data centres are actually physically located within the UK, European Economic Area (EEA), a country deemed adequate by the European Commission, or in the US where covered by Privacy Shield

  3. State the legal jurisdiction(s) to which your data is subject to.

 

AWS

Provide cloud infrastructure (which includes all hardware, software, networks and the physical data centres that house it all) within the UK, European Economic Area (EEA), a country deemed adequate by the European Commission, or in the US where covered by Privacy Shield

"The AWS Cloud infrastructure is built around Regions and Availability Zones (“AZs”). A Region is a physical location in the world where we have multiple Availability Zones. Availability Zones consist of one or more discrete data centers, each with redundant power, networking and connectivity, housed in separate facilities. These Availability Zones offer you the ability to operate production applications and databases which are more highly available, fault tolerant and scalable than would be possible from a single data center. Please use this link for an up to date list of regions: https://aws.amazon.com/about-aws/global-infrastructure/

AWS customers can already transfer personal data from the EU to the US in a compliant way; The EU-US Privacy Shield aims to enable the compliant transfer of personal data from data controllers in the EU to data controllers (or processors) in the US. AWS offers customers a Data Processing Addendum, including Model Clauses (Data Processing Addendum) that was approved in 2015 by the EU data protection authorities, known as the Article 29 Working Party. This Data Processing Addendum enables our customers, when using AWS to transfer personal data outside the European Economic Area (EEA), to any country, including to the US. Additionally, WS is certified under the EU-US Privacy Shield. View the certification. More information here: https://aws.amazon.com/compliance/eu-us-privacy-shield-faq/"

Provide independent validation that the data centres are actually physically located within the UK, European Economic Area (EEA), a country deemed adequate by the European Commission, or in the US where covered by Privacy Shield

State the legal jurisdiction(s) to which your data is subject to.

"Customers can validate the security controls in place within the AWS environment through AWS certifications and reports, including the AWS Service Organization Control (SOC) 1 and 2 reports, ISO 27001 certification and PCI-DSS compliance reports. These reports and certifications are produced by independent third party auditors and attest to the design and operating effectiveness of AWS security controls.

Report are available to customers using AWS Artifact, a self-service portal for on-demand access to AWS’ compliance reports.

The local laws that apply in the jurisdiction where the content is located are an important consideration for some customers. However, customers also need to consider whether laws in other jurisdictions may apply to them depending upon where they – or their customers – are doing business. Customers should seek advice to understand the application of relevant laws to their business and operations.

Please use this link to access the AWS Customer Agreement: https://aws.amazon.com/agreement/"

The Service User should:-

  1. Only use Cloud Infrastructures to store and process data that are physically located within the UK, European Economic Area (EEA), a country deemed adequate by the European Commission, or in the US where covered by Privacy Shield

  2. Review the Cloud Provider’s T&Cs to ensure they are compliant with the Data Protection Act (DPA) and the General Data Protection Regulation (GDPR).

ISL

  1. We use only AWS London Region (EU-WEST-2);

  2. We have reviewed the AWS terms and privacy policies and the only potential risk to consider is the hosting location of the data centre. which is covered above.

2.2

Data centre security

The Cloud Provider should:-

  1. Hold and maintain certification to ISO 27001

AWS

"Customers can validate the security controls in place within the AWS environment through AWS certifications and reports, including the AWS Service Organization Control (SOC) 1, 2 and 3 reports, ISO 27001, 27017 and 27018 certifications and PCI DSS compliance reports.

Report are available to customers using AWS Artifact, a self-service portal for on-demand access to AWS’ compliance reports - https://aws.amazon.com/artifact/"

2.3

Data at rest protection

The Cloud Provider should:-

  1. Provide encryption facilities to ensure that no data is written to storage in an unencrypted form.

  2. Provide secure key management service providing strong cryptography as defined by the current version of NIST and FIPS standards. e.g. NIST SP800-57 Part 1’

  3. Confirm that the encryption utilises strong cryptography as defined by the current version of NIST SP800-57

  4. Undertake annual assessment against a recognised standard such as ISO or FIPS 140-2 to test the encryption

AWS

"AWS establishes and manages cryptographic keys for required cryptography employed within the AWS infrastructure. AWS produces, controls and distributes symmetric cryptographic keys using NIST approved key management technology and processes in the AWS information system.

Customers retain control and ownership of their data, thus it is their responsibility to choose to encrypt the data. Customers choose how their customer content is secured. We offer our customers strong encryption for customer content in transit or at rest, and we provide customers with the option to manage their own encryption keys.

AWS offers customers the ability to add an additional layer of security to data at rest in the cloud, providing scalable and efficient encryption features. This includes:

  • Data encryption capabilities available in AWS storage and database services, such as EBS, S3, Glacier, Oracle RDS, SQL Server RDS, and Redshift

  • Flexible key management options, including AWS Key Management Service, allowing you to choose whether to have AWS manage the encryption keys or enable you to keep complete control over your keys

AWS KMS and AWS CloudHSM use FIPS 140-2 validated hardware security modules to protect the security of your keys.

In addition, AWS provides APIs for you to integrate encryption and data protection with any of the services you develop or deploy in an AWS environment. "

"AWS cryptographic processes are reviewed by independent third party auditors for our continued compliance with SOC, PCI DSS, ISO 27001 and FedRAMP. 

Please refer to the AWS Security & Compliance Whitepapers (available at https://aws.amazon.com/compliance/resources/), and the following AWS Audit Reports, for additional details: PCI 3.2, ISO 27001, ISO 27017, ISO 27018, SOC 2 COMMON CRITERIA, SOC 1 & 2 CONTROLS, HIPAA, NIST 800-53, C5"

The Service User should:-

  1. Ensure that the encryption is appropriately configured when you implement the system on your chosen cloud provider.

  2. Ensure keys are managed by the data controller. Keys can be stored either locally or in an HSM service provided by the cloud supplier. The key management solution should utilise strong cryptography as defined by the current version of NIST and FIPS standards. e.g. NIST SP800-57 Part 1

ISL

  1. Encryption for data at rest is configured throughout the AWS services we use;

  2. Keys are managed by the AWS Key Management Service.

2.4

Data sanitisation

The Cloud Provider should:-

  1. Provide assertions regarding their data sanitisation approach.

  2. Show that the specified data sanitation approach has been validated by a suitably qualified independent third party.

AWS

"AWS classifies all media entering AWS facilities as Critical and treats it accordingly, as high impact, throughout its life-cycle. To destroy data on storage devices as part of the decommissioning process in accordance with the AWS security standard, the following equipment use procedures are followed:

-Every AWS datacenter facility contains one approved degaussing device and one approved disk destruction device;

-Equipment containing storage media is checked to ensure that any data or software has been removed or securely overwritten prior to disposal or reuse;

-The functionality of all media sanitization equipment is checked for operational readiness at regular intervals;

-All Solid State Drives (SSDs) are wiped prior to crushing;

-All hard drives and magnetic tapes are degaussed after being removed from a device and placed in a secure bin.

-Degaussing and destruction device functionality is tested on a periodic basis to verify that the intended sanitization is being achieved.

Portable storage devices (e.g. external hard drives, floppy disks, storage tapes, compact discs, digital video discs, USB flash/thumb drives, and diskettes except for those that are part of an approved device, such as a flash card that is part of a networking router) are not permitted for use within the system boundary.

When a storage device has reached the end of its useful life, AWS procedures include a decommissioning process that is designed to prevent customer data from being exposed to unauthorized individuals. AWS uses the techniques detailed in NIST 800-88 (“Guidelines for Media Sanitization”) as part of the decommissioning process.

AWS tracks, documents, and verifies media sanitization and disposal actions. All media removal and disposal is performed by designated AWS personnel. Content is destroyed on storage devices as part of the decommissioning process in accordance with AWS security standards.

AWS hosts are securely wiped or overwritten prior to provisioning for reuse. AWS media is securely wiped or degaussed and physically destroyed prior to leaving AWS Secure Zones.

To validate AWS’ secure wipe processes and procedures, third party auditors review the guidance within the AWS Media Protection policy, observe degaussing equipment and secure shred bins located within AWS facilities, observe historical tickets which tracked the destruction of a hard drive within a data center and the process of a device being wiped and removed from the environment.

Please refer to the AWS Security & Compliance Whitepapers (available at https://aws.amazon.com/compliance/resources/), and the following AWS Audit Reports, for additional details: PCI 3.2, ISO 27001, ISO 27017, ISO 27018, SOC 2 COMMON CRITERIA, SOC 1 & 2 CONTROLS, HIPAA, NIST 800-53, C5"

2.5

Equipment Disposal

The Cloud Provider should:-

  1. Hold certification to CSA CCM v3.0 OR ISO/IEC 27001

AWS

"Customers can validate the security controls in place within the AWS environment through AWS certifications and reports, including the AWS Service Organization Control (SOC) 1, 2 and 3 reports, ISO 27001, 27017 and 27018 certifications and PCI DSS compliance reports.

Report are available to customers using AWS Artifact, a self-service portal for on-demand access to AWS’ compliance reports - https://aws.amazon.com/artifact/"

"All media removal and disposal is performed by designated AWS personnel.

Please refer to the AWS Security & Compliance Whitepapers (available at https://aws.amazon.com/compliance/resources/), and the following AWS Audit Reports, for additional details: PCI 3.2, ISO 27001, ISO 27017, ISO 27018, SOC 2 COMMON CRITERIA, SOC 1 & 2 CONTROLS, HIPAA, NIST 800-53, C5"

2.6

Physical resilience and availability

 

The Cloud Provider should:-

  1. Provide a contractual commitment to SLAs, with remedies available should the SLA be missed.

  2. Prove that the data centres are certified to Uptime Institute Tier 2 or equivalent qualified provider such as those certified under the CREST scheme.

  3. Prove that the data centres are certified to Uptime Institute Tier 3 or equivalent qualified provider such as those certified under the CREST scheme.

  4. Provide two or more “availability zones” / Data Centres in-line with the requirements in 2.1.

AWS

Note (2) is N/A due to our our Silver Service Classification.

"AWS continuously monitors service usage to project infrastructure needs to support availability commitments and requirements. AWS maintains a capacity planning model to assess infrastructure usage and demands at least monthly, and usually more frequently (e.g., weekly). In addition, the AWS capacity planning model supports the planning of future demands to acquire and implement additional resources based upon current resources and forecasted requirements.

AWS does commit to high levels of availability in its service level agreements (SLAs). AWS provides availability SLAs of 100% for Amazon Route 53, 99.9% for Amazon CloudFront and Amazon S3, 99.95% for Amazon RDS, 99.99% for Amazon EC2, Amazon EBS, Amazon ECS, and Amazon Fargate for Amazon ECS, and up to 99% for S3 Standard-IA. In addition, we provide a Service Health Dashboard that shows the current operational status of each of our services in real-time, so that our uptime and performance are fully transparent.

Highly resilient systems, and therefore service availability, is a function of the system design. Through the use of Availability Zones and data replication, AWS customers can achieve extremely high recovery time and recovery point objectives, as well as service availability of 99.999% and more.

If availability and performance are important design considerations for an application, customers should deploy the application across multiple Availability Zones in the same region for fault tolerance and low latency. Some AWS services, such as Amazon S3, are built to leverage all Availability Zones within the region and have a durability objective of 99.999999999%. These services can be used for highly durable storage across Availability Zones and persistent volume (Amazon EBS) snapshots.

AWS offers service level agreements for certain AWS services. These may be updated from time to time. The service level agreements we currently offer are located at https://aws.amazon.com/compute/sla/, http://aws.amazon.com/s3-sla/, http://aws.amazon.com/cloudfront/sla, http://aws.amazon.com/route53/sla and http://aws.amazon.com/rds/sla. "

"AWS operates our data centers in alignment with the Tier III+ guidelines, but we have chosen not to have a certified Uptime Institute based tiering level so that we have more flexibility to expand and improve performance. AWS' approach to infrastructure performance acknowledges the Uptime Institute's Tiering guidelines and applies them to our global data center infrastructure design to ensure the highest level of performance and availability for our customers. AWS then improves on the guidelines provided by the Uptime Institute to scale for global operations and produce an operating outcome for availability and performance that far exceeds that which would be achieved through the Uptime Institute tiering guidelines alone. Although we do not claim alignment with Tier 4, we can ensure that our systems have a fault tolerant sequence of operations with self-correcting mitigations in place.

AWS has identified critical system components required to maintain the availability of the system and recover service in the event of outage. Critical system components are backed up across multiple, isolated locations known as Availability Zones. Each Availability Zone runs on its own physically distinct, independent infrastructure, and is engineered to be highly reliable. Availability Zones are connected to each other with fast, private fiber-optic networking, enabling you to easily architect applications that automatically fail-over between Availability Zones without interruption.

Please see the AWS Global Infrastructure page and the risk and compliance whitepaper for more details:

https://aws.amazon.com/about-aws/global-infrastructure/

https://d0.awsstatic.com/whitepapers/compliance/AWS_Risk_and_Compliance_Whitepaper.pdf"

"At the moment of writing, the number of Availability Zones in the EEA regions are: London (3), Ireland (3), Frankfurt (3), Paris (3).

Please refer to the aws global infrastructure page for more information - available at https://aws.amazon.com/about-aws/global-infrastructure/"

The Service User should:-

  1. Design for failure. Solutions should be architected for cloud such that they are resilient regardless of the underlying cloud infrastructure.

  2. Use at least one availability zone / Data Centre.

  3. Have resilient network links to the zone / Data Centre.

  4. Use multiple availability zones / Data Centres.

  5. Have resilient network links to each zone / Data Centres.

  6. Use different cloud vendors or multiple regions from the same vendor.

  7. Have resilient network links to each region / vendor.

  8. Ensure their system has DDoS protection. This may be provided by the Cloud vendor or a third party.

ISL

Note we are applying applicable guidance for our Silver Service Classification.

  1. Our serverless architecture is designed for resilience by leveraging the AWS PaaS. For example:

    • AWS Lambda runs our functions in multiple Availability Zones to ensure that it is available to process events in case of a service interruption in a single zone;

    • In Amazon S3 our data is automatically stored across multiple devices spanning a minimum of three Availability Zones, each separated by miles across an AWS Region;

    • Amazon DynamoDB automatically replicates our data across multiple Availability Zones in our AWS Region.

  2. N/A for Silver Service;

  3. N/A for Silver Service;

  4. We use multiple availability zones (see point 1)

  5. AWS Availability Zones are connected with low-latency, high-throughput, and highly redundant networking;

  6. N/A for Silver Service;

  7. N/A for Silver Service;

  8. N/A for Silver Service.

3

Separation between users

The Cloud Provider should:-

  1. Provide Supplier Assertions regarding their approach to user/customer environment separation.

  2. Undertake annual assessment against a recognised standard such as ISO, CyberEssentials to test the ‘separation between users/ customer environment’.

  3. Hold and maintain certification to ISO27017 for the Cloud Platform.

AWS

"Customer environments are logically segregated to prevent users and customers from accessing resources not assigned to them. Customers maintain full control over who has access to their data. Services which provide virtualized operational environments to customers (i.e., EC2) ensure that customers are segregated from one another and prevent cross-tenant privilege escalation and information disclosure via hypervisors and instance isolation.

Different instances running on the same physical machine are isolated from each other via the hypervisor. In addition, the Amazon EC2 firewall resides within the hypervisor layer, between the physical network interface and the instance's virtual interface. All packets must pass through this layer, thus an instance’s neighbors have no more access to that instance than any other host on the Internet and can be treated as if they are on separate physical hosts. The physical random-access memory (RAM) is separated using similar mechanisms.

Customer instances have no access to physical disk devices, but instead are presented with virtualized disks. The AWS proprietary disk virtualization layer automatically erases every block of storage before making it available for use, which protects one customer’s data from being unintentionally exposed to another. Customers can further protect their data using traditional filesystem encryption mechanisms, or, in the case of Amazon Elastic Block Store (EBS) volumes, by enabling AWS-managed disk encryption.

Please refer to the AWS Security & Compliance Whitepapers (available at https://aws.amazon.com/compliance/resources/), and the following AWS Audit Reports, for additional details: PCI 3.2, ISO 27001, ISO 27017, ISO 27018, SOC 2 COMMON CRITERIA, SOC 1 & 2 CONTROLS, HIPAA, NIST 800-53, C5"

"Customers can validate the security controls in place within the AWS environment through AWS certifications and reports, including the AWS Service Organization Control (SOC) 1, 2 and 3 reports, ISO 27001, 27017 and 27018 certifications and PCI DSS compliance reports.

Report are available to customers using AWS Artifact, a self-service portal for on-demand access to AWS’ compliance reports - https://aws.amazon.com/artifact/"

The Service User should:

  1. Undertake end-to-end Penetration testing of the solution.

  2. Implement a GPG13 compliant Protective Monitoring solution.

ISL

  1. Pen testing will be conducted by www.fidusinfosec.com on 15-18 Feb 21. Routine testing will be instigated in line with GPITF contractual obligations (annually) using an appropriate supplier.

  2. I have asked for written confirmation, but been told this is no longer required/relevant.

4

Governance framework

The Cloud Provider should:-

  1. Hold and maintain certification to CSA’s STAR programme OR ISO/IEC 27001.

  2. Prove that the scope of certification includes the governance framework goals set out below:

    1. A clearly identified, and named, board representative (or a person with the direct delegated authority) who is responsible for the security of the cloud service. This is typically someone with the title ‘Chief Security Officer’, ‘Chief Information Officer’ or ‘Chief Technical Officer’.

    2. A documented framework for security governance, with policies governing key aspects of information security relevant to the service.

    3. Security and information security are part of the service provider’s financial and operational risk reporting mechanisms, ensuring that the board would be kept informed of security and information risk.

    4. Processes to identify and ensure compliance with applicable legal and regulatory requirements.

AWS

"Customers can validate the security controls in place within the AWS environment through AWS certifications and reports, including the AWS Service Organization Control (SOC) 1, 2 and 3 reports, ISO 27001, 27017 and 27018 certifications and PCI DSS compliance reports.

Report are available to customers using AWS Artifact, a self-service portal for on-demand access to AWS’ compliance reports - https://aws.amazon.com/artifact/"

"AWS is responsible for ensuring that good commercial IT practices are utilized in the design, development and operation of AWS Products. AWS considers maintaining customer trust and confidence of the utmost importance and therefore defines the quality attributes of AWS Products in terms of Availability, Integrity and Confidentiality. AWS has established a quality management system which meets or exceeds the best practice guidelines established by the International Organization for Standardization (ISO).

In addition, the AWS control environment is subject to various internal and external risk assessments. AWS’ Compliance and Security teams have established an information security framework and policies based on the Control Objectives for Information and related Technology (COBIT) framework and have effectively integrated the ISO 27001 certifiable framework based on ISO 27002 controls, American Institute of Certified Public Accountants (AICPA) Trust Services Principles, the PCI DSS v3.2, and the National Institute of Standards and Technology (NIST) Publication 800-53 Rev 3 (Recommended Security Controls for Federal Information Systems). AWS maintains the security policy, provides security training to employees, and performs application security reviews. These reviews assess the confidentiality, integrity, and availability of data, as well as conformance to the information security policy.

AWS management leads an information security program that identifies and establishes security goals that are relevant to business requirements. Annual evaluations are performed to allocate the resources necessary for performing information security activities within AWS to meet or exceed customer and service specifications.

Please refer to the AWS Security & Compliance Whitepapers (available at https://aws.amazon.com/compliance/resources/), and the following AWS Audit Reports, for additional details: PCI 3.2, ISO 27001, ISO 27017, ISO 27018, SOC 2 COMMON CRITERIA, SOC 1 & 2 CONTROLS, HIPAA, NIST 800-53, C5"

5

Operational security

 

 

 

5.1

Configuration & change management

The Cloud Provider should:-

  1. Hold and maintain certification to CSA CCM v3.0 OR ISO/IEC 27001.

AWS

"Customers can validate the security controls in place within the AWS environment through AWS certifications and reports, including the AWS Service Organization Control (SOC) 1, 2 and 3 reports, ISO 27001, 27017 and 27018 certifications and PCI DSS compliance reports.

Report are available to customers using AWS Artifact, a self-service portal for on-demand access to AWS’ compliance reports - https://aws.amazon.com/artifact/"

The Service User should:-

  1. Maintain an accurate inventory of the assets which make up the service, along with their configurations and dependencies.

  2. Ensure changes to the service are assessed for potential security impact, and the implementation of changes are managed and tracked through to completion.

ISL

  1. We use AWS CloudFormation which enables AWS resources to be described in declarative code form known as a template. All of our templates are version controlled in a git repository. This allows us to track our inventory of assets over time;

  2. Changes to the service are controlled through our Change Management Polices and Processes defined in our Quality Management System.

5.2

Vulnerability Management

The Cloud Provider should:-

  1. Hold and maintain certification to CSA CCM v3.0 OR ISO/IEC 27001, ISO/IEC 27017.

  2. Manage vulnerabilities in a manner that aligns with ISO 30111 and show ISO / CSA compliance to validate the process.

  3. Prove that mitigations for discovered vulnerabilities are implemented for the server-less devices, hypervisors and supporting infrastructure, within the NCSC best practice timescales.

AWS

"Customers can validate the security controls in place within the AWS environment through AWS certifications and reports, including the AWS Service Organization Control (SOC) 1, 2 and 3 reports, ISO 27001, 27017 and 27018 certifications and PCI DSS compliance reports.

Report are available to customers using AWS Artifact, a self-service portal for on-demand access to AWS’ compliance reports - https://aws.amazon.com/artifact/"

"AWS Security performs regular vulnerability scans on the host operating system, web application, and databases in the AWS environment using a variety of tools. External vulnerability assessments are conducted by an AWS approved third party vendor at least quarterly, and identified issues are investigated and tracked to resolution. Vulnerabilities that are identified are monitored and evaluated and countermeasures are designed, implemented, and operated to compensate for known and newly identified vulnerabilities.

AWS Security teams also subscribe to newsfeeds for applicable vendor flaws and proactively monitor vendors’ websites and other relevant outlets for new patches. AWS customers also have the ability to report issues to AWS via the AWS Vulnerability Reporting website at: http://aws.amazon.com/security/vulnerability-reporting/.

AWS customers are responsible for all scanning, penetration testing, file integrity monitoring and intrusion detection for their Amazon EC2 and Amazon ECS instances and applications. Scans should include customer IP addresses and not AWS endpoints. AWS endpoints are tested as part of AWS compliance vulnerability scans.

The AWS Security team notifies and coordinates with the appropriate Service Teams when conducting security-related activities within the system boundary. Activities include, vulnerability scanning, contingency testing, and incident response exercises. AWS performs external vulnerability assessments at least quarterly and identified issues are investigated and tracked to resolution. Additionally, AWS performs unannounced penetration tests by engaging independent third-parties to probe the defenses and device configuration settings within the system.

AWS has been validated and certified by an independent auditor to confirm alignment with ISO 27001 certification standard.

Please refer to the AWS Security & Compliance Whitepapers (available at https://aws.amazon.com/compliance/resources/), and the following AWS Audit Reports, for additional details: PCI 3.2, ISO 27001, ISO 27017, ISO 27018, SOC 2 COMMON CRITERIA, SOC 1 & 2 CONTROLS, HIPAA, NIST 800-53, C5"

 

 

The Service User should:-

  1. Undertake patching or vulnerability management for the guest operating system and application components, within the NCSC best practice timescales set out below:-

    1. ‘Critical’ patches should be deployed within 24 hours

    2. ‘Important’ patches should be deployed within 2 weeks of a patch becoming available

    3. ‘Other’ patches deployed within 8 weeks of a patch becoming available

  2. Undertake regular (min yearly) penetration testing.

ISL

  1. As we use a serverless architecture we do not provision any operating systems or application components directly. This is all the responsibility of AWS for their PaaS components.

  2. Pen testing will be conducted by www.fidusinfosec.com on 15-18 Feb 21. Routine testing will be instigated in line with GPITF contractual obligations (annually) using an appropriate supplier.

5.3

Protective monitoring

The Cloud Provider should:-

  1. Hold and maintain certification to CSA CCM v3.0 OR ISO/IEC 27001 and ISO/IEC 27017

AWS

"AWS utilizes automated monitoring systems to provide a high level of service performance and availability. Proactive monitoring is available through a variety of online tools both for internal and external use. Systems within AWS are extensively instrumented to monitor key operational metrics. Alarms are configured to notify operations and management personnel when early warning thresholds are crossed on key operational metrics.

An on-call schedule is used such that personnel are always available to respond to operational issues. This includes a pager system so alarms are quickly and reliably communicated to operations personnel.

AWS provides near real-time alerts when the AWS monitoring tools show indications of compromise or potential compromise, based upon threshold alarming mechanisms determined by AWS service and Security teams. AWS correlates information gained from logical and physical monitoring systems to enhance security on an as-needed basis. Upon assessment and discovery of risk, Amazon disables accounts that display atypical usage matching the characteristics of bad actors.

The AWS Security team extracts all log messages related to system access and provides reports to designated officials. Log analysis is performed to identify events based on defined risk management parameters.

AWS logging and monitoring processes are reviewed by independent third party auditors for our continued compliance with SOC, PCI DSS, ISO 27001 and FedRAMP compliance."

The Service User should:-

  1. Put in place appropriate monitoring solutions to identify attacks against their applications or software.

ISL

  1. We use Amazon GuardDuty which is a threat detection service that continuously monitors for malicious activity and unauthorised behaviour.

5.4

Incident management

The Cloud Provider should:-

  1. Hold and maintain certification to CSA CCM v3.0 OR ISO/IEC 27001.

  2. Demonstrate robust, well tested and rehearsed incident management procedures.

AWS

"AWS' incident response program, plans and procedures have been developed in alignment with ISO 27001 standard. AWS has been validated and certified by an independent auditor to confirm alignment with ISO 27001 certification standard.

The AWS SOC reports provides details on the specific control activities executed by AWS. All data stored by AWS on behalf of customers has strong tenant isolation security and control capabilities.

Please refer to the AWS Security & Compliance Whitepapers (available at https://aws.amazon.com/compliance/resources/), and the following AWS Audit Reports, for additional details: PCI 3.2, ISO 27001, ISO 27017, ISO 27018, SOC 2 COMMON CRITERIA, SOC 1 & 2 CONTROLS, HIPAA, NIST 800-53, C5"

"AWS has implemented a formal, documented incident response policy and program. The policy addresses purpose, scope, roles, responsibilities, and management commitment.

AWS utilises a three-phased approach to manage incidents:

  1. Activation and Notification Phase: Incidents for AWS begin with the detection of an event.

  2. Recovery Phase - The relevant resolvers will perform break fix to address the incident.

  3. Reconstitution Phase – The call leader will declare the recovery phase complete after the relevant fix activities have been addressed. The post mortem and deep root cause analysis of the incident will be assigned to the relevant team. The results of the post mortem will be reviewed by relevant senior management and actions, such as design changes. will be captured in a Correction of Errors (COE) document and tracked to completion.

To ensure the effectiveness of the AWS Incident Management plan, AWS conducts incident response testing. This testing provides excellent coverage for the discovery of previously unknown defects and failure modes. In addition, it allows the Amazon Security and Service teams to test the systems for potential customer impact and further prepare staff to handle incidents such as detection and analysis, containment, eradication, and recovery, and post-incident activities.

The Incident Response Test Plan is executed annually, in conjunction with the Incident Response plan. The test plan includes multiple scenarios, potential vectors of attack, the inclusion of the systems integrator in reporting and coordination (when applicable), as well as varying reporting/detection avenues (i.e. customer reporting/detecting, AWS reporting/detecting).

AWS Incident Management planning, testing and test results are reviewed by third party auditors. 

Please refer to the AWS Security & Compliance Whitepapers (available at https://aws.amazon.com/compliance/resources/), and the following AWS Audit Reports, for additional details: PCI 3.2, ISO 27001, ISO 27017, ISO 27018, SOC 2 COMMON CRITERIA, SOC 1 & 2 CONTROLS, HIPAA, NIST 800-53, C5"

The Service User should:-

  1. Put in place monitoring solutions to identify attacks against their applications or software.

  2. Have an incident management process to rapidly respond to attacks.

ISL

  1. We use:

    1. Amazon GuardDuty which is a threat detection service that continuously monitors for malicious activity and unauthorised behaviour;

    2. AWS Security Hub which provides a comprehensive view of high-priority security alerts and compliance status.

  2. We have established Polices and Processes for incident management defined in our Quality Management System.

6

Personnel security

The Cloud Provider should:-

  1. Operate a personnel screening process that aligns with BS7858:2012 and show ISO / CSA compliance to validate the process.

AWS

"Background checks are performed as part of the Company’s hiring verification processes and include education, previous employment, and, in some cases, criminal and other background checks (including screening against global sanctions watchlists) as permitted by law and regulation for employees commensurate with the employee’s position and level of access to AWS facilities.

All persons working with AWS information must, at a minimum, meet the screening process for pre-employment background checks and sign a Non-Disclosure Agreement prior to being granted access to AWS information. All personnel supporting systems and devices within the system boundary must sign a non-disclosure agreement prior to being granted access.

In alignment with ISO 27001 standard, all AWS employees complete periodic role based training that includes AWS Security training and requires an acknowledgement to complete. Compliance audits are periodically performed to validate that employees understand and follow the established policies.

Please refer to the AWS Security & Compliance Whitepapers (available at https://aws.amazon.com/compliance/resources/), and the following AWS Audit Reports, for additional details: PCI 3.2, ISO 27001, ISO 27017, ISO 27018, SOC 2 COMMON CRITERIA, SOC 1 & 2 CONTROLS, HIPAA, NIST 800-53, C5"

The Service User should:-

  1. Ensure IT admin staff are strongly authenticated.

  2. Have a suitable auditing solution is in place to record all IT admin access to data and hosting environments.

ISL

  1. Strong authentication is a way of confirming a user’s identity when passwords are not enough. All IT admin staff are required to secure their user accounts with AWS Multi-Factor Authentication;

  2. We use:

    1. AWS CloudTrail to provide event history of our AWS account activity, including actions taken through the AWS Management Console, AWS SDKs, command line tools, and other AWS services;

    2. Amazon S3 server access logging to provide detailed records for the requests that are made to a bucket. 

7

Secure development

The Cloud Provider should:-

  1. Hold and maintain certification to:

    1. CESG CPA Build Standard, OR

    2. ISO/IEC 27034, OR

    3. ISO/IEC 27001, OR

    4. CSA CCM v3.0.

AWS

"The AWS system development lifecycle incorporates industry best practices which include formal design reviews by the AWS Security Team, threat modeling and completion of a risk assessment. Refer to the AWS Overview of Security Processes for further details.

AWS has procedures in place to manage new development of resources. Refer to ISO 27001 standard, Annex A, domain 14 for additional details. AWS has been validated and certified by an independent auditor to confirm alignment with ISO 27001 certification standard.

Please refer to the AWS Security & Compliance Whitepapers (available at https://aws.amazon.com/compliance/resources/), and the following AWS Audit Reports, for additional details: PCI 3.2, ISO 27001, ISO 27017, ISO 27018, SOC 2 COMMON CRITERIA, SOC 1 & 2 CONTROLS, HIPAA, NIST 800-53, C5"

8

Supply chain security

The Cloud Provider should:-

  1. Hold and maintain certification to:

    1. ISO/IEC 27001, or

    2. ISO/PAS 28000:2007

  2. Prove that the scope of certification includes supply chain security.

AWS

 

9

Secure user management

 

 

 

9.1

Authentication of [admin] users to management interfaces and support channels

The Cloud Provider should:-

  1. Provide Supplier Assertions regarding their approach to strong authentication.

  2. List all the channels by which the service provider would accept management or support requests from you (telephone phone, web portal, email etc.).

  3. Undertake annual assessment against a recognised standard such as ISO, CyberEssentials to test the ‘Authentication of users to management interfaces and support channels’.

AWS

"Controls in place limit access to systems and data and provide that access to systems or data is restricted and monitored per the AWS access policy. In addition, customer data is and server instances are logically isolated from other customers by default. Privileged user access controls are reviewed by an independent auditor during the AWS SOC, ISO 27001, PCI, ITAR, and FedRAMP audits.

AWS provides a centralized mechanism called AWS Identity and Access Management (IAM) for creating and managing individual users within your AWS Account. A user can be any individual, system, or application that interacts with AWS resources, either programmatically or through the AWS Management Console or AWS Command Line Interface (CLI). Each user has a unique name within the AWS Account, and a unique set of security credentials not shared with other users. AWS IAM eliminates the need to share passwords or keys, and enables you to minimize the use of your AWS Account credentials.

The AWS Identity and Access Management (IAM) service provides identity federation to the AWS Management Console. Multi-factor authentication is an optional feature that a customer can utilize. Refer to the AWS website for additional details - http://aws.amazon.com/mfa.

AWS Identity and Access Management (IAM) supports identity federation for delegated access to the AWS Management Console or AWS APIs. With identity federation, external identities (federated users) are granted secure access to resources in your AWS account without having to create IAM users. These external identities can come from your corporate identity provider (such as Microsoft Active Directory or from the AWS Directory Service).

AWS supports a very important and powerful use case with AWS Identity and Access Management (IAM) roles in combination with IAM users to enable cross-account API access or delegate API access within an account. This functionality gives better control and simplifies access management when managing services and resources across multiple AWS accounts. You can enable cross-account API access or delegate API access within an account or across multiple accounts without having to share long-term security credentials.

Please refer to the AWS Security & Compliance Whitepapers (available at https://aws.amazon.com/compliance/resources/), and the following AWS Audit Reports, for additional details: PCI 3.2, ISO 27001, ISO 27017, ISO 27018, SOC 2 COMMON CRITERIA, SOC 1 & 2 CONTROLS, HIPAA, NIST 800-53, C5"

"AWS develops and maintains customer support procedures that include metrics to verify performance. When a customer contacts AWS to report that AWS services do not meet their quality objectives, their issues are immediately investigated and, where required, commercially reasonable actions are taken to resolve them.

The customer support quality system includes, but is not limited to, procedures for reviewing and evaluating customer complaints, engaging necessary internal AWS resources and teams, and communicating the final disposition of the issue back to the customer.

Depending on contract requirements, AWS maintains procedures for notifying customers of customer-impacting issues using the AWS Service Health Dashboard (available at http://status.aws.amazon.com/). The AWS Service Health Dashboard publishes up-to-the-minute information on service availability, where customers can subscribe to an RSS feed to be notified of interruptions to each individual service and a full status history of each individual service health.

AWS Support provides support for users of Amazon Web Services. All users have access to account and billing help in the AWS Support Center within the AWS Console. In addition, customers with some support plans have access to additional features, including AWS Trusted Advisor and an API for programmatic access to support cases and Trusted Advisor.

"Customers can validate the security controls in place within the AWS environment through AWS certifications and reports, including the AWS Service Organization Control (SOC) 1, 2 and 3 reports, ISO 27001, 27017 and 27018 certifications and PCI DSS compliance reports.

Report are available to customers using AWS Artifact, a self-service portal for on-demand access to AWS’ compliance reports - https://aws.amazon.com/artifact/"

The Service User should:-

  1. Ensure that a list of authorised individuals from your organisation who can use those mechanisms is maintained and regularly reviewed.

  2. Use 2FA to obtain access to the system.

  3. Configure logging of access attempts.

  4. Regularly review the access attempts to identify unusual behaviour

ISL

  1. We have established Polices and Processes for user access management defined in our Quality Management System;

  2. All admin users are required to secure their accounts with AWS Multi-Factor Authentication;

  3.  All AWS IAM user and root user sign-in events generate records in CloudTrail log files.

  4. AWS CloudTrail allows us to review account activity history for IAM users and roles.

9.2

Separation and access control within management interfaces

The Cloud Provider should:-

  1. Provide Supplier Assertions regarding how management interfaces are protected and what functionality they expose.

  2. Undertake annual assessment against a recognised standard such as ISO, CyberEssentials to test the ‘Access Control to management Interfaces’.

AWS

"In order to allow for a more comprehensive monitoring of inbound and outbound communications and network traffic, AWS has strategically placed a limited number of access points to the cloud.

These customer access points are called API endpoints, and they allow secure HTTP access (HTTPS), which allows you to establish a secure communication session with your storage or compute instances within AWS. To support customers with FIPS cryptographic requirements, the SSL-terminating load balancers in AWS GovCloud (US) are FIPS 140-2-compliant.

In addition, AWS has implemented network devices that are dedicated to managing interfacing communications with Internet service providers (ISPs). AWS employs a redundant connection to more than one communication service at each Internet-facing edge of the AWS network. These connections each have dedicated network devices.

API calls to launch and terminate instances, change firewall parameters, and perform other functions are all signed by customers’ Amazon Secret Access Key, which could be either the root AWS Account’s Secret Access Key or the Secret Access key of a user created with AWS Identity and Access Management (IAM). Without access to customers’ Secret Access Key, Amazon EC2 API calls cannot be made on a customer’s behalf. In addition, API calls can be encrypted with TLS/SSL to maintain confidentiality and customers can use TLS/SSL-protected API endpoints. AWS IAM policies enable customers to further control which specific APIs an AWS IAM user has permission to call to manage a specific resource.

In AWS, assuming a role is a security principle that enables the user to assign policies that grant permissions to perform actions on AWS resources. Unlike with a user account, you don’t sign in to a role. Instead, you are already signed in as a user, and then you switch to the role, temporarily giving up your original user permissions and assuming the permissions of the role. When you are done using the role, you revert to your user’s permissions again.

Please refer to the AWS Security & Compliance Whitepapers (available at https://aws.amazon.com/compliance/resources/), and the following AWS Audit Reports, for additional details: PCI 3.2, ISO 27001, ISO 27017, ISO 27018, SOC 2 COMMON CRITERIA, SOC 1 & 2 CONTROLS, HIPAA, NIST 800-53, C5"

"Customers can validate the security controls in place within the AWS environment through AWS certifications and reports, including the AWS Service Organization Control (SOC) 1, 2 and 3 reports, ISO 27001, 27017 and 27018 certifications and PCI DSS compliance reports.

Report are available to customers using AWS Artifact, a self-service portal for on-demand access to AWS’ compliance reports - https://aws.amazon.com/artifact/"

The Service User should:-

  1. Ensure that authorised individuals from your organisation who can use those mechanisms are managed by the ‘principle of least privilege’, typically using a RBAC mechanism.

ISL

  1. We use AWS IAM roles to define what management interfaces are available to users.

10

[End User] Identity and authentication

Notes

  1. The recommended approach is either two factor authentication OR TLS client certificate;

  2. “Identity federation with your existing identity provider“ does not apply to this solution.

 

Two factor authentication

The Cloud Provider should:-

  1. Allow users to authenticate with a username and either a hardware/software token, or ‘out of band’ challenge (e.g. SMS)

  2. Provide details of the authentication scheme.

  3. Undertake annual assessment against a recognised standard such as ISO, CyberEssentials to test the ‘2FA’.

AWS

"AWS Identity and Access Management (IAM) provides you with controls and features to provide confidence that authenticated and authorised users have access to specified services and interfaces. AWS IAM allows you to create multiple users and manage the permissions for each of these users within your AWS Account. A user is an identity (within an AWS Account) with unique security credentials that can be used to access AWS Services.

AWS IAM eliminates the need to share passwords or keys, and makes it easy to enable or disable a user’s access as appropriate.

AWS IAM enables you to implement security best practices, such as least privileged, by granting unique credentials to every user within your AWS Account and only granting permission to access the AWS services and resources required for the users to perform their jobs. AWS IAM is secure by default; new users have no access to AWS until permissions are explicitly granted.

Multi-factor authentication is an optional feature that a customer can utilize. Refer to the AWS website for additional details - http://aws.amazon.com/mfa.

Please refer to the AWS Security & Compliance Whitepapers (available at https://aws.amazon.com/compliance/resources/), and the following AWS Audit Reports, for additional details: PCI 3.2, ISO 27001, ISO 27017, ISO 27018, SOC 2 COMMON CRITERIA, SOC 1 & 2 CONTROLS, HIPAA, NIST 800-53, C5"

"Customers can validate the security controls in place within the AWS environment through AWS certifications and reports, including the AWS Service Organization Control (SOC) 1, 2 and 3 reports, ISO 27001, 27017 and 27018 certifications and PCI DSS compliance reports.

Report are available to customers using AWS Artifact, a self-service portal for on-demand access to AWS’ compliance reports - https://aws.amazon.com/artifact/"

TLS client certificate

The Cloud Provider should:-

  1. Show that they use TLS 1.2 or above with an X.509v3 client certificate that identifies an individual user.

  2. Undertake annual assessment against a recognised standard such as ISO, CyberEssentials to test the 'TLS 1.2+ using an X.509v3 client certificate'

AWS

N/A - TLS client certificate not used

TLS client certificate

The Service User should:-

  1. Ensure the secure creation and management of certificates.

  2. Ensure there are safeguards in place on end user devices to protect them.

  3. Implement processes to revoke lost or compromised credentials.

ISL

N/A - TLS client certificate not used

11

External interface protection

The Cloud Provider should:-

  1. Implement a Protective Monitoring solution.

  2. Undertake annual assessment against a recognised standard such as ISO, CyberEssentials to test the ‘external interface protection‘.

AWS

"Boundary protection devices that employ rule sets, access control lists (ACL), and configurations enforce the flow of information between network fabrics.

Several network fabrics exist at Amazon, each separated by devices that control the flow of information between fabrics. The flow of information between fabrics is established by approved authorisations, which exist as access control lists (ACL) which reside on these devices.

These devices control the flow of information between fabrics as mandated by these ACLs. ACLs are defined, approved by appropriate personnel, managed and deployed using AWS ACL-manage tool.

Amazon’s Information Security team approves these ACLs. Approved firewall rule sets and access control lists between network fabrics restrict the flow of information to specific information system services. Access control lists and rule sets are reviewed and approved, and are automatically pushed to boundary protection devices on a periodic basis (at least every 24 hours) to ensure rule-sets and access control lists are up-to-date.

AWS Network Management is regularly reviewed by independent third-party auditors as a part of AWS ongoing compliance with SOC, PCI DSS, and ISO 27001.

Regular internal and external vulnerability scans are performed on the host operating system, web application and databases in the AWS environment utilizing a variety of tools. Vulnerability scanning and remediation practices are regularly reviewed as a part of AWS continued compliance with PCI DSS and FedRAMP.

AWS utilizes a wide variety of automated monitoring systems to provide a high level of service performance and availability. AWS monitoring tools are designed to detect unusual or unauthorized activities and conditions at ingress and egress communication points. These tools monitor server and network usage, port scanning activities, application usage, and unauthorized intrusion attempts. The tools have the ability to set custom performance metrics thresholds for unusual activity.

Please refer to the AWS Security & Compliance Whitepapers (available at https://aws.amazon.com/compliance/resources/), and the following AWS Audit Reports, for additional details: PCI 3.2, ISO 27001, ISO 27017, ISO 27018, SOC 2 COMMON CRITERIA, SOC 1 & 2 CONTROLS, HIPAA, NIST 800-53, C5"

"Customers can validate the security controls in place within the AWS environment through AWS certifications and reports, including the AWS Service Organization Control (SOC) 1, 2 and 3 reports, ISO 27001, 27017 and 27018 certifications and PCI DSS compliance reports.

Report are available to customers using AWS Artifact, a self-service portal for on-demand access to AWS’ compliance reports - https://aws.amazon.com/artifact/"

The Service User should:-

  1. Ensure their system has Web Application Firewall (WAFs) protection. This may be provided by the Cloud vendor or a third party.

  2. Ensure that the implemented design protects data by ensuring it is at least two ‘firewall’ hops from the external network, architected in such a way that the compromise of one firewall will not affect the other.

  3. Correctly implement firewall rulesets using the "Deny All" First and then Add Exceptions principle.

ISL

  1. We use Amazon API Gateway with AWS WAF;

  2. Though all access is currently via internet (not HSCN). If/When HSCN access implemented access from the HSCN there are two firewall hops:

    1. Redcentrics' HSCN firewall;

    2. AWS WAF.

  3. AWS Security Groups and Network ACLs implement this principle as standard.

12

Secure service administration

The Cloud Provider should:-

  1. Provide Supplier Assertions regarding their service management architecture.

  2. Ensure access is only available over a secure channel.

  3. Limit management actions to authorised staff.

  4. Audit all management actions.

  5. Regularly (daily) review the logs to identify any irregular activities.

  6. Have separate user accounts for administration and normal user activities. They should not user their administration accounts for normal business activities.

  7. Not be able to browse the internet or open their external email in the same processing context as they manage systems.

  8. Protect the integrity of the end user devices used to manage the service.

  9. Undertake annual assessment against a recognised standard such as ISO, CyberEssentials to test the ‘secure service administration’.

AWS

"Amazon personnel with a business need to access the management plane are required to first use multi-factor authentication, distinct from their normal corporate Amazon credentials, to gain access to purpose-built administration hosts. These administrative hosts are systems that are specifically designed, built, configured, and hardened to protect the management plane. All such access is logged and audited. When an employee no longer has a business need to access the management plane, the privileges and access to these hosts and relevant systems are revoked.

AWS developers and administrators on the Amazon Corporate network who need to access AWS cloud components must explicitly request access through the AWS access management system. All requests are reviewed and approved by the appropriate owner or manager.

AWS employs automated mechanisms to facilitate the monitoring and control of remote access methods. Auditing occurs on the systems and devices, which are then aggregated and stored in a proprietary tool for review and incident investigation.

The AWS Production network is segregated from the Amazon Corporate network and requires a separate set of credentials for logical access. The Amazon Corporate network relies on user IDs, passwords, and Kerberos, while the AWS Production network requires SSH public-key authentication through a bastion host.

Please refer to the AWS Security & Compliance Whitepapers (available at https://aws.amazon.com/compliance/resources/), and the following AWS Audit Reports, for additional details: PCI 3.2, ISO 27001, ISO 27017, ISO 27018, SOC 2 COMMON CRITERIA, SOC 1 & 2 CONTROLS, HIPAA, NIST 800-53, C5"

"Customers can validate the security controls in place within the AWS environment through AWS certifications and reports, including the AWS Service Organization Control (SOC) 1, 2 and 3 reports, ISO 27001, 27017 and 27018 certifications and PCI DSS compliance reports.

Report are available to customers using AWS Artifact, a self-service portal for on-demand access to AWS’ compliance reports - https://aws.amazon.com/artifact/"

13

Audit information for users

The Cloud Provider should:-

  1. Record system events in near real-time to provide an audit log.

  2. Ensure that the audit logs are tamperproof.

  3. Ensure that the retention period for the logs can be defined by the customer.

  4. Provide a secure facility to forward / export the logs off the cloud infrastructure.

  5. Provide facilities to allow logs pertaining to their own systems to be human readable.

  6. Undertake annual assessment against a recognised standard such as ISO, CyberEssentials to test the ‘auditing facility’.

AWS

"AWS has identified auditable event categories across systems and devices within the AWS system. Service teams configure the auditing features to record continuously the security-related events in accordance with requirements. Audit records contain a set of data elements in order to support necessary analysis requirements. In addition, audit records are available for AWS Security team or other appropriate teams to perform inspection or analysis on demand, and in response to security-related or business-impacting events.

AWS deploys monitoring devices throughout the environment to collect critical information on unauthorised intrusion attempts, usage abuse, and network and application bandwidth usage.

AWS provides near real-time alerts when the AWS monitoring tools show indications of compromise or potential compromise, based upon threshold alarming mechanisms determined by AWS service and Security teams.

Processes are implemented to protect audit information and audit tools from unauthorised access, modification, and deletion. Audit records contain a set of data elements in order to support necessary analysis requirements. In addition, audit records are available to authorised users for inspection or analysis on demand, and in response to security-related or business-impacting events. System activities, including administrator access and approvals, are logged, retained for a defined period of time and protected from unauthorised modifications.

AWS has been validated and certified by an independent auditor to confirm alignment with ISO 27001 certification standard. AWS SOC reports provides additional details on the specific control activities executed by AWS to prevent unauthorised access to AWS resources.

Please refer to the AWS Security & Compliance Whitepapers (available at https://aws.amazon.com/compliance/resources/), and the following AWS Audit Reports, for additional details: PCI 3.2, ISO 27001, ISO 27017, ISO 27018, SOC 2 COMMON CRITERIA, SOC 1 & 2 CONTROLS, HIPAA, NIST 800-53, C5"

"Auditing for most layers and controls above the physical controls remains the responsibility of the customer. The definition of AWS-defined logical and physical controls is documented in the SOC 1 Type II report, and the report is available for review by audit and compliance teams. AWS ISO 27001 and other certifications are also available for auditors to review.

Customers retain control of their own guest operating systems, software and applications and are responsible for developing logical monitoring of the conditions of these systems. In alignment with ISO 27001 standards, AWS information systems utilize internal system clocks synchronized via NTP (Network Time Protocol).

AWS CloudTrail provides a simple solution to log user activity that helps alleviate the burden of running a complex logging system. Refer to aws.amazon.com/cloudtrail for additional details.

AWS Cloudwatch provides monitoring for AWS cloud resources and the applications customers run on AWS. Refer to aws.amazon.com/cloudwatch for additional details. AWS also publishes our most up-to-the-minute information on service availability on the Service Health Dashboard. Refer to status.aws.amazon.com."

"Customers can validate the security controls in place within the AWS environment through AWS certifications and reports, including the AWS Service Organization Control (SOC) 1, 2 and 3 reports, ISO 27001, 27017 and 27018 certifications and PCI DSS compliance reports.

Report are available to customers using AWS Artifact, a self-service portal for on-demand access to AWS’ compliance reports - https://aws.amazon.com/artifact/"

The Service User should:-

  1. Use the audit data as part of an effective pro-active monitoring regime.

ISL

  1. Our QMS defines polices and processes for security monitoring using audit logs.

14

Secure use of the service

The Service User should:-

  1. Use a security hardened master operating system image to build guest servers.

  2. Utilise integrated security monitoring and policy management facilities to help detect threats and weaknesses, due to poor design or mis-configuration.

  3. Undertake annual assessment against a recognised standard such as ISO, CyberEssentials to test the ‘security monitoring’.

ISL

  1. N/A because we don’t maintain any servers due to the serverless nature of the application.

  2. We use Amazon GuardDuty and AWS Security Hub;

  3. We are certified for both CyberEssentials Plus and ISO27001.

Skyline is designed and developed by Informatica