Cloud service providers (CSP) are finding it increasingly difficult to distinguish their services from other providers.
For customers, the increased use of cloud services—and the heightened awareness of data use and privacy—makes it equally difficult to understand which provider will best safeguard their information.
The Cloud Computing Compliance Criteria Catalogue (C5) by the German Federal Office for Information Security (BSI) combines cloud computing and information security in a comprehensive framework. It provides baseline security controls geared towards safeguarding data and structuring how it’s secured and managed in the cloud.
C5 guidelines push for a risk-oriented approach to guide the CSP in identifying critical data, services, and processes. Then, customers have the ability to incorporate these findings into their risk management program.
Living in the cloud is risky. C5 provides guidelines on shared responsibilities for all parties including vendors, auditors, users, security providers, and customers. C5’s setup alters access responsibility over an application or infrastructure, which parts of the services are provided by the CSP on behalf of the customer, and which parts are implemented by the tenant on top of the provided service layers.
Below, we cover the background and components of C5, as well as how it can provide time- and cost-saving measures while increasing customer security and trust.
What Is C5?
C5 was developed in 2016; it’s a set of compliance criteria intended for cloud service providers with European customers or offices in the European Union (EU).
The overall objective of C5 is to increase the transparency of data protection in the cloud as organizations move away from traditional application and infrastructure responsibilities and towards a spectrum of evolving applications, services, and virtualized infrastructure.
This transparency helps cloud users know whether the CSP has fulfilled their requirements. These requirements can include:
- Consideration of security elements from identity and access management—securing the authorization and authentication of users to prevent unauthorized access
- Availability—timeliness and reliability of access to and use of data
- Isolation—tracking of changes and transactions without adversely affecting their execution
- Cybersecurity threats—safeguards to protect against malicious attacks
- Monitoring—reviewing and managing operational workflows
The C5 framework also combines existing security standards from international certifications such as:
- Information Security Management (ISO) and International Electrotechnical Commission (IEC) 27001
- Trust Services Criteria (TSC) established by the Association of International Certified Professional Accountants (AICPA)
- Cloud Controls Matrix of the Cloud Security Alliance (CSA CCM)
Benefits of C5
Built-In Security
Along with using existing security standards, C5 also applies its own security criteria. It’s divided into 17 domains, and an objective is assigned to each domain alongside a total of 121 requirements that specify the general procedures and controls needed to satisfy the objectives.
Within the 121 requirements are a set of basic criteria and additional criteria. In their description of the system, the CSP is required to explain if the basic or additional criteria are applicable, as they relate to the design of the cloud service or procedures of the CSP. While this documentation can be cumbersome, it establishes trust with customers by holding the CSP to a higher security standard.