Sovereign Cloud Environment CRISP
1. Policy Overview¤
1.1 Sovereign Cloud Australia (AUCloud) provides an infrastructure to enable clients to host data and applications in a secure and resilient manner. AUCloud platforms are designed to meet the controls of the International Organisation for Standardization (ISO) 27001 (Information Security) standard and the PROTECTED controls as documented within the Australian Government’s Information Security Manual (ISM) and will meet the assurance requirements associated with data at these levels and other information security standards. The resulting Infrastructure-as-a-Service (IaaS) compute and storage services enable clients to host their data within environments that mitigate the underlying risks associated with their data.
1.2 National Institute for Standards in Technology (NIST) based cloud services are designed with distinct separations of ownership of the overall environment. Essentially, AUCloud provides and owns the infrastructure that supports the applications and data, whilst the clients own and have responsibility for, their individual applications, system configurations and associated data.
1.3 This separation of ownership also includes a separation of security ownership, accountability, and responsibility. The AUCloud environment will meet the controls as specified in the ISM as well as achieving applicable certifications and supporting assurance validations. To meet these criteria, it is necessary to identify the overall security requirement and then to agree the ownership, accountability, and responsibility boundaries between AUCloud and its clients.
1.4 This Community Rules Information Security Policy (CRISP) is the formal, top-level security document, which identifies those aspects that are within the remit of the AUCloud Chief Information Security Officer (CISO) and those that are within the remit of the data-owning client’s CISO. Specific information is contained within the security procedure sections of the appropriate Risk Management and Accreditation Document Set (RMADS) issued for each individual AUCloud service.
1.5 AUCloud IaaS is provided for the benefit of Australian Government (Federal, State and Local) including related entities and charitable organisations, Critical National Industries including Banking and Finance, Communications, Energy, Health, Transport and Water services, as well as organisations providing services to or on behalf of Government and Critical National Industries.
1.6 The CRISP addresses the responsibilities and required behaviours for clients and their users of AUCloud’s Community Environment that is designed to support data that clients have identified as requiring protection in line with ISM controls. Acceptance of the CRISP is agreement to comply with the separation of security requirements and responsibilities.
2. Security Policy¤
2.1 The CRISP, while being the overarching security policy for the AUCloud environment, does not address individual security requirements in detail. AUCloud shall provide corresponding security documentation for the infrastructure and the client shall provide similar documentation for their individual applications and data.
2.2 AUCloud has communicated the detailed security requirements of its services within its RMADS documentation. The RMADS documentation is provided to the end client’s CISO prior to their deployment and consumption of the AUCloud service, and the client remains at all times responsible for full compliance with the requirements of the security procedures contained within the RMADS documentation.
2.3 Each party (AUCloud and the end client) shall make the other party aware of any salient aspects of their own security policy.
2.4 The CRISP and AUCloud Information Security Policy shall be reviewed annually as a minimum, and in the event of any security incident. Changes, if required, shall be informed to the client. It is expected that the client shall also review their security policy at least annually and any relevant changes will be informed to AUCloud promptly.
3. Organisation of Information Security¤
3.1 AUCloud shall have designated Risk Owners and Security Officers with an overall Responsible Individual designated to own the security regime of each. The client shall have their own designated personnel in the relevant roles to own and co-ordinate their own security activities.
3.2 Formal processes shall exist between AUCloud and its client, suppliers and where relevant, its channel partners to co-ordinate their security activities. The client shall ensure that relevant co-ordination exists with their areas of responsibility. Liaison and co-ordination between the client and AUCloud shall be agreed as part of the formal contract using this CRISP.
3.3 The initial configuration and composition of the overall system shall be agreed between AUCloud and the client. Any subsequent changes or additions to the system will be addressed through a formal Change Management Process and agreed with the applicable accreditation authority as applicable. AUCloud shall not make any changes to technology that it has responsibility for other than those that are known, approved and scheduled, or those considered necessary to complete emergency maintenance or address a serious security incident. The client shall ensure that any changes to their existing applications or data processing arrangements will be subject to the documented requirements of their own change management process.
3.4 The Protective Monitoring of the AUCloud Management Platform environment shall be implemented to identify and manage security incidents. AUCloud shall contact the relevant authorities (e.g. Australian Cyber Security Centre (ACSC) or AusCERT) in the event of any such incident as well as invoking the defined Incident Management Process. Clients shall be informed in the event of any such incidents in accordance with the agreed Incident Management Process, using the client contacts notified within the Security Incident Reporting Matrix.
3.5 The client shall be responsible for complying with all applicable reporting requirements with respect to their applications and data.
3.6 The client shall promptly inform AUCloud when they detect any Security Incidents in accordance with the Incident Management Process. This shall include proactive notifications of current ongoing security incidents, and reactive notifications for previous security incidents.
3.7 AUCloud and the client shall agree with the relevant assurance and certification bodies the frequency of review of any accreditation or certification status (if applicable).
3.8 AUCloud services will be assessed for risk using the ISO 27001 standard as part of AUCloud going through ASD’s Information Security Registered Assessor Program (IRAP) security assessment. This risk assessment shall be reviewed annually to ensure that the AUCloud risk situation is current and valid. There shall be additional assessments in the event of any major security incident. Any changes to the risk profile shall be informed to the client. The client shall conduct their own risk assessment and shall review their own assessment at least annually in line with information security requirements.
3.9 AUCloud has responsibility for ensuring that the cloud infrastructure provides the relevant level of security, including security monitoring (for the Management Platform) and Incident Management. AUCloud shall also ensure that all personnel who have access to the infrastructure have obtained and retain a minimum-security clearance of Negative Vetting Level 1 as defined by the Australian Government’s Protective Security Policy Framework.
3.10 The client shall have responsibility for ensuring that their applications and data are provided with the relevant level of security and that access to those applications and their data is restricted to those who require such access and who have completed formal employment screening/suitability checks.
4. Connectivity Options¤
4.1 Access to the AUCloud Management Portal is provided using geo-location services and restricted to Australian IP addresses. AUCloud and the client shall agree if any changes are required to this control for access beyond non-Australian IP addresses.
4.2 AUCloud shall provide the following connectivity options for clients connecting to the AUCloud platform:
Direct fibre connection where a client resides in the same data centre facility; Network service provider where a client has a connection within an AUCloud data centre; Virtual Private Network (VPN) connection through the client’s edge services gateway.
4.3 AUCloud shall provide suitable encryption options, typically IPSec or MACsec, to clients connecting to the AUCloud platform based upon the connectivity method selected. Encryption technologies shall be implemented in line with the requirements of the ISM.
4.4 Clients connecting to AUCloud services shall also have the option of utilising AUCloud’s Protective Monitoring service for the continuous monitoring of the client’s environment.
5. Asset Management¤
5.1 The AUCloud infrastructure comprises several separate environments, each designed for different sectors and employing different security controls. All elements of each environment shall be inventoried and classified to meet the stated requirements of the sector and data classification. All environments shall be assessed for security control effectiveness in relation to data Confidentiality, Integrity and Availability.
5.2 The client shall identify all their assets to be used within and to access the AUCloud environment and will assess them to ensure their suitability with regard to data Confidentiality, Integrity and Availability.
5.3 AUCloud shall label and handle all management information assets that they have control of and responsibility for, in accordance with the sensitivity and/or protective marking of each asset.
5.4 The client shall have sole responsibility for the labelling and handling of their information assets, and any other assets associated with their applications. The client shall also be responsible for assessing and complying with their own data aggregation requirements, and for assessing if this aggregation affects their defined security levels.
5.5 AUCloud shall be responsible for assessing the overall implications of aggregation of data across its cloud infrastructure.
6. Physical & Environmental Security¤
6.1 AUCloud shall have responsibility for ensuring that all physical and environmental controls are in place in those areas where the infrastructure, or management access to that infrastructure, is made. They are also responsible for ensuring that the relevant level of physical access controls to such areas is in place.
6.2 The client shall have responsibility for ensuring that the relevant security and physical access controls are in place at all locations where access to their data is made from.
6.3 AUCloud shall provide appropriate training, guidance and security controls to its personnel who are to undertake their duties within secure areas. The client shall be responsible for providing any training, guidance or security controls needed for its personnel working in secure areas where access to their applications and data is made from.
6.4 AUCloud shall be responsible for the siting and protection of equipment within the data centre environment. The client shall be responsible for the siting and protection of equipment within their own environment(s), which is used to provide access to their applications and data.
6.5 AUCloud shall maintain all equipment within their control. Such maintenance shall be conducted in a secure manner by personnel with a minimum-security clearance of NV1 as defined by the PSPF. The client shall be responsible for the maintenance of the equipment they use to access the AUCloud cloud environment and for the suitability and security vetting of personnel who conduct maintenance on their equipment.
6.6 AUCloud shall ensure the security of off-site infrastructure (such as laptop computers and mobile devices) and the information that may be contained on them. Client data stored on AUCloud services shall not be stored on off-site equipment. Appropriate protection, in line with ISM requirements, will be provided for any transportable media.
6.7 AUCloud shall ensure the secure disposal, in line with ISM requirements, of any equipment within their control that requires replacement. The client shall be responsible for the secure disposal or re-use of any equipment within their control that is used to hold or access secure data.
6.8 AUCloud shall ensure that the appropriate physical security, in line with PSPF requirements, is applied to prevent the removal of equipment or assets within their control. The client shall be responsible for the physical security of their equipment and information assets.
7. Communication & Operations Management¤
7.1 AUCloud shall produce specific procedures for the function of the Management Platforms that supports the environment, which shall be maintained in AUCloud Standard Operating Procedures (SOPs) repository.
7.2 The client shall be responsible for producing SOPs for use with their applications and data.
7.3 AUCloud shall ensure that only its personnel have access according to their role within the Management Platform and that no potential conflict exists in the allocation of these roles. The client shall be responsible for ensuring that, where appropriate, the relevant segregation of duties is enforced within their own environment.
7.4 AUCloud shall continually manage and monitor the services provided by any third-party provider to the Management Platforms through the Protective Monitoring system. The client shall be responsible for ensuring that any services (including Protective Monitoring thereof) provided by their third parties are regularly managed, audited and assessed.
7.5 The services provided by AUCloud third parties shall be contractually defined. Any subsequent changes to these services shall be via Change Management. Significant changes shall be notified to and authorised by the appropriate assurance or certification body, if applicable. The client shall be responsible for managing changes to the services provided by their third-parties and ensuring that AUCloud and, where relevant, their assurance or certification body is informed.
7.6 AUCloud shall monitor and manage the capacity of the Management Platforms. The client shall be responsible for monitoring and managing the specific capacity requirements of their own systems hosted on AUCloud infrastructure.
7.7 AUCloud shall ensure that the relevant controls against the introduction of viruses and malicious code are in place for the environment and the related Management Platform. The client shall be responsible for ensuring that they have appropriate and relevant controls in place to protect their environments and data from malicious code being introduced to their data.
7.8 AUCloud shall ensure that a Protective Monitoring service is in operation to provide protection to the Management Platforms. Clients are advised to ensure that their environments are similarly protected by an appropriate Protective Monitoring service.
7.9 AUCloud shall ensure that a suite of data backup services and appropriate infrastructure are made available and supported so that clients can backup their data as required. The client shall be responsible for the selection and configuration of the data backup tools, which are required to address their specific data backup requirements.
7.10 AUCloud shall ensure that the relevant security controls are in place on the Management Platform networks. The client shall be responsible for ensuring that their network, up to the point of accessing the AUCloud managed networks, has the relevant security controls (a) as identified by their own risk assessment activities, and (b) which align with the client requirements documented within the security procedures of the RMADS.
7.11 AUCloud shall ensure that appropriate security controls are in place to protect any media within its control, including the disposal of media that is no longer serviceable or which is no longer required, as well as the sanitisation or destruction of any data on such media. The client shall be responsible for the proper management and secure deletion of their data, which is located within the AUCloud environment.
7.12 AUCloud shall ensure that appropriate information exchange policies, agreements and procedures are in place within the Management Platforms. The client shall be responsible for establishing and implementing information exchange policies, agreements and procedures with respect to their own applications and data, which align with the client requirements documented within the security procedures of the RMADS for the AUCloud environment.
7.13 AUCloud shall ensure that all user activity within the Management Platforms are audited and logged. Any anomalous behaviour shall be investigated. The client shall be responsible for the audit of user activity of their applications and data.
7.14 AUCloud shall monitor system use of the Management Platforms as part of any incident response or investigation. The client shall be responsible for monitoring system use as part of an incident response or investigation into the applications and data.
7.15 AUCloud shall be responsible for the protection of audit logs. The client shall be responsible for the protection of audit logs under their control relating to access to and use of their data.
7.16 AUCloud shall be responsible for the audit logs of users within the Management Platforms. The client shall be responsible for audit logs under their control, which record activities relating to users of the data.
7.17 Any system faults within the AUCloud environment shall be logged and, depending on the category of faults, reviewed at defined intervals by AUCloud. The client shall be responsible for logging and reviewing faults associated with their applications.
8. Access Control¤
8.1 AUCloud shall not access client data or applications, unless specifically requested to do so by the client, and having received prior formal written approval for this access from the client. Access to the Management Platforms shall be defined according to the function of the individual AUCloud employee. The client shall be responsible for managing and controlling access to their data.
8.2 AUCloud shall be responsible for implementing a user registration procedure for personnel who access the Management Platform, and for undertaking reviews of the privileges and access rights of personnel who have such access. The client shall be responsible for implementing a user registration procedure for personnel who are to access their data and applications, and for undertaking regular reviews of the privileges and access rights of personnel who are to access them.
8.3 The client’s security monitoring system shall identify any specific access to client data or applications that it has been requested to report. The client shall be responsible for identifying such activities, which are to be monitored and reported.
8.4 AUCloud shall be responsible for ensuring that its personnel working remotely will only be able to do so in accordance with AUCloud policy. The client shall be responsible for identifying any remote working function it may have and developing relevant security procedures.
8.5 AUCloud shall be responsible for ensuring that personnel accessing its Management Platforms use only accredited and/or approved technologies, which are required by the controls underpinning the Platform. The client shall be responsible for ensuring that external connectivity into their services(s) is undertaken using only accredited and/or approved technologies.
9. Information Security Incident Management¤
9.1 AUCloud shall operate an Information Security Incident Management Policy, which details the management, investigation and reporting of potential or actual breaches of the Confidentiality, Integrity or Availability of a company information asset (or a client data asset where the company is engaged in a contractual agreement to protect the client data) or of a supporting asset (upon which the security of information assets depend).
9.2 The client shall be responsible for the management and reporting of potential or actual information security breaches to their data and applications to their own relevant external bodies, aligned to the Mandatory Notifiable Data Breach legislation. The client shall be required to immediately notify AUCloud of all such incidents.
9.3 The client shall be responsible for ensuring that their personnel details recorded within the Security Incident Reporting Matrix are regularly checked for accuracy, and for the prompt reporting to AUCloud of any personnel changes that need to be made.
9.4 AUCloud shall operate an Information Security Incident Management Policy that details the requirement to identify, report and act upon any known or suspected weaknesses to information or supporting assets within the Management Platforms. Such weaknesses may also be identified by periodic security assessments, including technical reviews, audits or penetration tests.
9.5 The client shall be responsible for the identification and reporting of known or suspected weaknesses within their applications, and for promptly reporting these to AUCloud.
9.6 AUCloud shall operate an Information Security Incident Management Policy that details the roles, responsibilities and procedures required for managing, reporting and resolving information security incidents. The client shall be responsible for defining roles and responsibilities and implementing procedures for the reporting, management and resolution of information security incidents arising within their applications and/or data.
9.7 AUCloud shall maintain overall responsibility for the management and operation of the Management Platforms. It shall be fully monitored and protected by a Protective Monitoring Service, which includes the collection and retention of log files and user activity data for use within any subsequent investigation. The client shall be responsible for the identification of information relating to their applications and data, which needs to be retained and made available for any subsequent investigation.
10. Business Continuity Management¤
10.1 AUCloud shall operate Business Continuity policies and procedures that ensure that the Management Platform will continue to operate in the event of an unplanned business interruption to meet the service levels contracted with its clients. These shall be validated either by the design of the Sovereign Cloud Environment and related Management Platform, or in some cases by focused testing activities. The client shall be responsible for implementing business continuity arrangements to address any unplanned business interruptions that are directly and solely attributable to a failure of their applications, and any consequential unavailability of their data.
11.1 AUCloud shall identify all applicable legislation, regulation and guidance relevant to its operations, including the PSPF and ISM, and is committed to full compliance with these. The client shall be responsible for identifying and complying with all applicable legislation and regulations that are appropriate for their own business.
11.2 AUCloud shall identify and implement controls to protect its intellectual property rights, including, but not limited to its systems, software, designs, configurations and documentation. The client shall be responsible for the appropriate protection of the intellectual property rights associated with their applications and data.
11.3 AUCloud shall operate a Data Protection Policy and related procedures to ensure that personal information and personally identifiable information is at all times protected in accordance with the Australian Privacy Act 1988. The client shall be responsible for full compliance with the Australian Privacy Act 1988 in respect of personal data introduced into the Sovereign Cloud Environment.
11.4 The client shall remain responsible for undertaking a Business Impact Assessment, in line with PSPF requirements, of their data that is to be processed by or stored within the Sovereign Cloud Environment.
11.5 AUCloud shall operate an Acceptable Use Policy, provide training to its personnel on the acceptable use of information systems, and shall retain log files and user activity data to ensure that such systems are only used for authorised purposes in an acceptable way. The client shall be responsible for ensuring that their authorised users do not misuse information processing facilities.
11.6 AUCloud shall be responsible for ensuring that network access to its Management Platform is protected using encryption technologies defined within the ISM. The client shall be responsible for ensuring that external connectivity into their services(s) is undertaken using similar technologies or alternative network connectivity solutions.
11.7 AUCloud shall have periodic (no less than annual) reviews of compliance with their security policies, processes and procedures as identified in the ISM. The client shall be responsible for assessing compliance with their own policies and for informing AUCloud and the accreditor of the results.