SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
Bijender MISHRA (B.Tech, MBA,PMP ITIL SAP CISM ) bijendermishra@gmail.com
Cloud security governance
An organisation’s board is responsible (and accountable to shareholders,
regulators and customers) for the framework of standards, processes and
activities that, together, ensure the organisation benefits securely from Cloud
Computing
Every organisation which uses Cloud must develop, implement and maintain
a Cloud governance framework.
Trust boundaries in the Cloud
Organisations are responsible for their own information. The nature of Cloud
Computing means that at some point the organisation will rely on a third
party for some element of the security of its data. The point at which the
responsibility passes from your organisation to your supplier is called the
‘trust boundary’ and it occurs at a different point for IaaS, PaaS and SaaS .
Organisations need to satisfy themselves of the security and resilience of
their Cloud service providers; they also need to observe their Data Protection
Act obligations.
Cloud Controls Matrix
Many CSP’s has developed and maintains the Cloud Control Matrix, a set of
additional information security controls designed specifically for Cloud
services providers (CSP), and against which customers could seek to carry
out a security audit. BSI and the CSA have collaborated to offer a
certification scheme (designed as an extension to ISO27001) against which
CSPs can achieve independent certification.
Cloud security certification
Many SP’s offers an open Cloud Security certification
process: STAR (Security, Trust and Assurance Registry). This scheme starts
with self-assessment and progresses through process maturity to an
Bijender MISHRA (B.Tech, MBA,PMP ITIL SAP CISM ) bijendermishra@gmail.com
externally certified maturity scheme, supported by an open registry of
information about certified organisations.
Continuity and resilience in the Cloud
Cloud service providers are as likely to suffer operational outages as any
other organisation. Physical infrastructure can also be negatively affected.
Buyers of Cloud services should satisfy themselves that their CSPs are
adequately resilient against operational risks. ISO22301 is an appropriate
business continuity standard.
Data protection in the Cloud
Majority of organisations that store personal data in the Cloud, or which use
a CSP, are not absolved from compliance with the eighth principle of the
Data Protection Directive, which forbids export of personal data from the EEA
except to a country that has a recognised equivalent data protection
framework. While Canada’s PIPEDA is a recognised equivalent, the USA has
no such recognition yet.
G-Cloud
In a strategic effort to make Cloud services available to public sector
organisations, the many countries has set up the G-Cloud Programme, now
called the Digital Marketplace. Cloud services can be procured through the
CloudStore. In order to be listed, a Cloud Service provider has to go through
a formal accreditation process which builds on a fully-scoped ISO27001
certification, in addition to a specific selection and approval process. Impact
Levels are no longer relevant to describe the security properties and
accreditation of different services. Instead, in the OFFICIAL tier, the Country
has adopted the cloud security principles.
Under the new process, G-Cloud suppliers will need to provide statements
that correspond to "predefined assertions" drafted by the Government Digital
Service (GDS) that relate to their adherence to the cloud security principles.
The principles address issues such as the protection of data in transit,
information governance and the security offered within businesses' supply
chains.
The principles address issues such as the protection of data in transit,
information governance and the security offered within businesses' supply
chains. Many countries are now subject to a cloud first policy that requires
them to consider cloud-based IT solutions before other options.

Contenu connexe

Tendances

BigID Virtual MDM Data Sheet
BigID Virtual MDM Data SheetBigID Virtual MDM Data Sheet
BigID Virtual MDM Data SheetDimitri Sirota
 
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetBigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetDimitri Sirota
 
Convince your board: How to prepare your business for List X
Convince your board: How to prepare your business for List XConvince your board: How to prepare your business for List X
Convince your board: How to prepare your business for List XDave James
 
Inside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesInside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesUbisecure
 
BigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Inc
 
BigID Data Sheet: Smart Data Labeling and Tagging
BigID Data Sheet: Smart Data Labeling and TaggingBigID Data Sheet: Smart Data Labeling and Tagging
BigID Data Sheet: Smart Data Labeling and TaggingBigID Inc
 
BigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Inc
 
PR Lieberman Sailpoint Partnership_SailPoint FINAL
PR Lieberman Sailpoint Partnership_SailPoint FINALPR Lieberman Sailpoint Partnership_SailPoint FINAL
PR Lieberman Sailpoint Partnership_SailPoint FINALRic Weeks
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Updatekantarainitiative
 
Smart Analytics for The Big Unknown
Smart Analytics for The Big UnknownSmart Analytics for The Big Unknown
Smart Analytics for The Big UnknownAdrian Dumitrescu
 
WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM Sy...
WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM Sy...WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM Sy...
WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM Sy...育弘 林
 
Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...
Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...
Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...SLA-Ready Network
 
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.ForgeRock
 
BigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID Inc
 
Kantara a Global Context 2011
Kantara a Global Context 2011Kantara a Global Context 2011
Kantara a Global Context 2011kantarainitiative
 
BigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights AutomationBigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights AutomationBigID Inc
 
User Management, Enablement, Directory
User Management, Enablement, DirectoryUser Management, Enablement, Directory
User Management, Enablement, DirectoryUbisecure
 
BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy BigID Inc
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huangKen Huang
 

Tendances (20)

BigID Virtual MDM Data Sheet
BigID Virtual MDM Data SheetBigID Virtual MDM Data Sheet
BigID Virtual MDM Data Sheet
 
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetBigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
 
Convince your board: How to prepare your business for List X
Convince your board: How to prepare your business for List XConvince your board: How to prepare your business for List X
Convince your board: How to prepare your business for List X
 
Inside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with SmartphonesInside Security - Strong Authentication with Smartphones
Inside Security - Strong Authentication with Smartphones
 
BigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance Automated
 
BigID Data Sheet: Smart Data Labeling and Tagging
BigID Data Sheet: Smart Data Labeling and TaggingBigID Data Sheet: Smart Data Labeling and Tagging
BigID Data Sheet: Smart Data Labeling and Tagging
 
BigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & Orchestration
 
PR Lieberman Sailpoint Partnership_SailPoint FINAL
PR Lieberman Sailpoint Partnership_SailPoint FINALPR Lieberman Sailpoint Partnership_SailPoint FINAL
PR Lieberman Sailpoint Partnership_SailPoint FINAL
 
Kantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG UpdateKantara - Consent & Information Sharing WG Update
Kantara - Consent & Information Sharing WG Update
 
Smart Analytics for The Big Unknown
Smart Analytics for The Big UnknownSmart Analytics for The Big Unknown
Smart Analytics for The Big Unknown
 
WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM Sy...
WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM Sy...WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM Sy...
WDSI 2015-Design and Implementation of a Policy-based Service-oriented DRM Sy...
 
Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...
Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...
Arthur van der Wees, Arthur's Legal on Making Cloud SLAs readily usable in th...
 
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
 
BigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access Intelligence
 
Kantara a Global Context 2011
Kantara a Global Context 2011Kantara a Global Context 2011
Kantara a Global Context 2011
 
BigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights AutomationBigID Datasheet: CCPA Data Rights Automation
BigID Datasheet: CCPA Data Rights Automation
 
Wilson Consulting Group
Wilson Consulting GroupWilson Consulting Group
Wilson Consulting Group
 
User Management, Enablement, Directory
User Management, Enablement, DirectoryUser Management, Enablement, Directory
User Management, Enablement, Directory
 
BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huang
 

Similaire à Cloud Security Governance

Ensuring PCI DSS Compliance in the Cloud
Ensuring PCI DSS Compliance in the CloudEnsuring PCI DSS Compliance in the Cloud
Ensuring PCI DSS Compliance in the CloudCognizant
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Happiest Minds Technologies
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management Padma Jella
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...Symantec
 
New Era in Insurance - Cloud Computing
New Era in Insurance - Cloud ComputingNew Era in Insurance - Cloud Computing
New Era in Insurance - Cloud ComputingNIIT Technologies
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Cloud Standards Customer Council
 
SaaS Platform Securing
SaaS Platform SecuringSaaS Platform Securing
SaaS Platform SecuringLeo TechnoSoft
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-clouddrewz lin
 
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The CloudSimplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The CloudHappiest Minds Technologies
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb finalChristophe Monnier
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01promediakw
 
Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...
Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...
Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...Amazon Web Services
 
Presentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloudPresentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloudHassan EL ALLOUSSI
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkIOSR Journals
 
Financial Services-ready Public Cloud white paper [march 9, 2020]
Financial Services-ready Public Cloud white paper [march 9, 2020]Financial Services-ready Public Cloud white paper [march 9, 2020]
Financial Services-ready Public Cloud white paper [march 9, 2020]Scott Satterwhite
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelinesamburyj3c9
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the CloudRapidScale
 

Similaire à Cloud Security Governance (20)

Ensuring PCI DSS Compliance in the Cloud
Ensuring PCI DSS Compliance in the CloudEnsuring PCI DSS Compliance in the Cloud
Ensuring PCI DSS Compliance in the Cloud
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
 
New Era in Insurance - Cloud Computing
New Era in Insurance - Cloud ComputingNew Era in Insurance - Cloud Computing
New Era in Insurance - Cloud Computing
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
 
SaaS Platform Securing
SaaS Platform SecuringSaaS Platform Securing
SaaS Platform Securing
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-cloud
 
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The CloudSimplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb final
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
 
Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...
Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...
Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...
 
Presentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloudPresentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloud
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 
Financial Services-ready Public Cloud white paper [march 9, 2020]
Financial Services-ready Public Cloud white paper [march 9, 2020]Financial Services-ready Public Cloud white paper [march 9, 2020]
Financial Services-ready Public Cloud white paper [march 9, 2020]
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the Cloud
 
Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732Iam cloud security_vision_wp_236732
Iam cloud security_vision_wp_236732
 

Plus de BIJ MISHRA

IT Alignment Is Not Enough
IT Alignment Is Not EnoughIT Alignment Is Not Enough
IT Alignment Is Not EnoughBIJ MISHRA
 
Major Common ERP Mistakes
Major Common ERP MistakesMajor Common ERP Mistakes
Major Common ERP MistakesBIJ MISHRA
 
10 Principles of Change Management
10 Principles of Change Management10 Principles of Change Management
10 Principles of Change ManagementBIJ MISHRA
 
What is Emotional Intelligence
What is Emotional IntelligenceWhat is Emotional Intelligence
What is Emotional IntelligenceBIJ MISHRA
 
How to Choose a Data Center
How to Choose a Data CenterHow to Choose a Data Center
How to Choose a Data CenterBIJ MISHRA
 
An introduction of CRM
An introduction of CRMAn introduction of CRM
An introduction of CRMBIJ MISHRA
 
How to move or copy your old emails
How to move or copy your old emailsHow to move or copy your old emails
How to move or copy your old emailsBIJ MISHRA
 

Plus de BIJ MISHRA (7)

IT Alignment Is Not Enough
IT Alignment Is Not EnoughIT Alignment Is Not Enough
IT Alignment Is Not Enough
 
Major Common ERP Mistakes
Major Common ERP MistakesMajor Common ERP Mistakes
Major Common ERP Mistakes
 
10 Principles of Change Management
10 Principles of Change Management10 Principles of Change Management
10 Principles of Change Management
 
What is Emotional Intelligence
What is Emotional IntelligenceWhat is Emotional Intelligence
What is Emotional Intelligence
 
How to Choose a Data Center
How to Choose a Data CenterHow to Choose a Data Center
How to Choose a Data Center
 
An introduction of CRM
An introduction of CRMAn introduction of CRM
An introduction of CRM
 
How to move or copy your old emails
How to move or copy your old emailsHow to move or copy your old emails
How to move or copy your old emails
 

Cloud Security Governance

  • 1. Bijender MISHRA (B.Tech, MBA,PMP ITIL SAP CISM ) bijendermishra@gmail.com Cloud security governance An organisation’s board is responsible (and accountable to shareholders, regulators and customers) for the framework of standards, processes and activities that, together, ensure the organisation benefits securely from Cloud Computing Every organisation which uses Cloud must develop, implement and maintain a Cloud governance framework. Trust boundaries in the Cloud Organisations are responsible for their own information. The nature of Cloud Computing means that at some point the organisation will rely on a third party for some element of the security of its data. The point at which the responsibility passes from your organisation to your supplier is called the ‘trust boundary’ and it occurs at a different point for IaaS, PaaS and SaaS . Organisations need to satisfy themselves of the security and resilience of their Cloud service providers; they also need to observe their Data Protection Act obligations. Cloud Controls Matrix Many CSP’s has developed and maintains the Cloud Control Matrix, a set of additional information security controls designed specifically for Cloud services providers (CSP), and against which customers could seek to carry out a security audit. BSI and the CSA have collaborated to offer a certification scheme (designed as an extension to ISO27001) against which CSPs can achieve independent certification. Cloud security certification Many SP’s offers an open Cloud Security certification process: STAR (Security, Trust and Assurance Registry). This scheme starts with self-assessment and progresses through process maturity to an
  • 2. Bijender MISHRA (B.Tech, MBA,PMP ITIL SAP CISM ) bijendermishra@gmail.com externally certified maturity scheme, supported by an open registry of information about certified organisations. Continuity and resilience in the Cloud Cloud service providers are as likely to suffer operational outages as any other organisation. Physical infrastructure can also be negatively affected. Buyers of Cloud services should satisfy themselves that their CSPs are adequately resilient against operational risks. ISO22301 is an appropriate business continuity standard. Data protection in the Cloud Majority of organisations that store personal data in the Cloud, or which use a CSP, are not absolved from compliance with the eighth principle of the Data Protection Directive, which forbids export of personal data from the EEA except to a country that has a recognised equivalent data protection framework. While Canada’s PIPEDA is a recognised equivalent, the USA has no such recognition yet. G-Cloud In a strategic effort to make Cloud services available to public sector organisations, the many countries has set up the G-Cloud Programme, now called the Digital Marketplace. Cloud services can be procured through the CloudStore. In order to be listed, a Cloud Service provider has to go through a formal accreditation process which builds on a fully-scoped ISO27001 certification, in addition to a specific selection and approval process. Impact Levels are no longer relevant to describe the security properties and accreditation of different services. Instead, in the OFFICIAL tier, the Country has adopted the cloud security principles. Under the new process, G-Cloud suppliers will need to provide statements that correspond to "predefined assertions" drafted by the Government Digital Service (GDS) that relate to their adherence to the cloud security principles. The principles address issues such as the protection of data in transit, information governance and the security offered within businesses' supply chains. The principles address issues such as the protection of data in transit, information governance and the security offered within businesses' supply chains. Many countries are now subject to a cloud first policy that requires them to consider cloud-based IT solutions before other options.