Cloud Security Assessment Report Template (July 2020)
Cloud Security Assessment Report Template (July 2020)
Cloud Security Assessment Report Template (July 2020)
<Assessor Details>
Instruction: Where this report is being completed as part of a Phase 1a assessment, use the entirety of the
report template.
Delete this and all other instructions from your final version of this document, as well as all
ACSC branding.
1
<Sensitivity//Classification>
<Sensitivity//Classification>
Document Details
Assessment
ISM Version <Month YYYY>
Control Classification Choose an item.
Cloud Definition Choose an item.
Cloud Deployment Model Choose an item.
ACSC Report template version V1.0
Prepared By
<Assessor Organisation Name>
Address
Assessor Name
Assessor Qualifications
Contact Email
Prepared for
<CSP Organisation Name>
Address
Contact Name
Contact Email
Revision History
Versio Date Description Author
n
vX.X DD/MM/YYYY
2
<Sensitivity//Classification>
<Sensitivity//Classification>
1. Executive Summary 5
2. Introduction 6
2.1. Cloud Service Provider 6
3. Assessment Details 7
3.1. Methodology 7
3.2. Scope 7
3.2.1. Dependencies and Inheritance 7
3.2.5. Exclusions 8
4.1.2. Weaknesses 9
4.2. Governance 10
4.2.1. Overview 10
3
<Sensitivity//Classification>
<Sensitivity//Classification>
Attached Documents 23
Attachment A: Cloud Security Controls Matrix 23
Addendums 23
4
<Sensitivity//Classification>
<Sensitivity//Classification>
1. Executive Summary
Instruction: Provide a one to two-page overview of the assessment, including a broad commentary of the
potential risks posed to cloud consumers using the cloud provider and services. Broadly, this
should cover: Background on the CSP being assessed, and any specialty markets they cater for
(if any).
- Background on the type of CSP, a summary of the service offering.
- Summary of the general themes of the report.
- Control Implementation percentage as an overall percentage.
- Any recommended next steps for the CSP to take having undergone the assessment.
5
<Sensitivity//Classification>
<Sensitivity//Classification>
2. Introduction
2.1. Cloud Service Provider
Instruction: Provide a one to two page high-level introduction to the Cloud Service Provider, including
- The ownership of the CSP;
- The locality of the CSP;
- Where its cloud services are provided from;
- Is there any potential extrajudicial control and interference over a CSP by a foreign entity;
- Where the CSP’s personnel, such as support and administration is located; and
- The ownership of the CSP.
6
<Sensitivity//Classification>
<Sensitivity//Classification>
3. Assessment Details
3.1. Methodology
Instruction: Detail the methodology used to assess the cloud services in line with the Anatomy of a Cloud
Assessment and Authorisation document, and the Australian Government Information
Security Manual (ISM).
3.2. Scope
3.2.1. Dependencies and Inheritance
Instruction: List any external systems, services, or applications (including client software) on which this
service platform is dependent ('dependencies'), either owned by the assessed CSP or other
providers. Dependencies may implement controls that the cloud service platform relies on.
Specify if these dependencies have previously been assessed against the ISM, and if access to
the assessment was provided.
Note any inheritance of ISM controls, the implementation of any configuration guidance the
dependency source has provided, and any variation made by the service that may impact
inherited controls.
Lastly include if the security of the external dependencies are in scope of this assessment.
7
<Sensitivity//Classification>
<Sensitivity//Classification>
Instruction: This section should list the different locations the CSP is based in to provide its cloud services,
including data centres and management, support and administrator locations.
Instruction: This section should list all cloud services in scope of this assessment as well as the location they
are provided from for Australian based Cloud Consumers. This should include essential services
of the platform required for use, such as the web console, account management and resource
management as appropriate.
3.2.5. Exclusions
Instruction: List any CSP systems or ISM chapters or sections that are not included in this assessment scope,
and a justification for their exclusion.
8
<Sensitivity//Classification>
<Sensitivity//Classification>
4.1.2. Weaknesses
Instruction: Detail general areas where the assessor was unable to observe the CSP is suitably managing
and addressing risks, with specific reference to ISM guidelines where appropriate.
9
<Sensitivity//Classification>
<Sensitivity//Classification>
4.2. Governance
4.2.1. Overview
Instruction: For each of the following topics, describe the CSP’s approach to implementing robust, secure
practices. The topics listed in this section have been selected as generally being common to
CSP governance across all services, but in the case that the assessed CSP implements any of
the topics differently across its services, this should be detailed in Section 5 of this report.
10
<Sensitivity//Classification>
<Sensitivity//Classification>
Identify how Public Key Infrastructure (PKI) material is used and accounted for, and who has
the ability to decrypt data, and in what circumstances this will occur. This may include
technical support, “break glass” scenarios, or lawful requests for data by governments.
11
<Sensitivity//Classification>
<Sensitivity//Classification>
12
<Sensitivity//Classification>
<Sensitivity//Classification>
13
<Sensitivity//Classification>
<Sensitivity//Classification>
Instruction: Detail any controls assessed as “Alternate Control” in the control matrix for the administrative
and support environments. Controls may be grouped as appropriate where there is a single
underlying implementation factor. For each entry, provide a description of any identified
vulnerabilities where a specific ISM control requirement has not been met, and details of the
alternate control implemented by the CSP to otherwise meet the control objective.
Instruction: Detail any controls assessed as “Not Implemented” in the control matrix for the administrative
and support environments, where the CSP has decided to retain this implementation due to
business decision. Controls may be grouped as appropriate where there is a single underlying
implementation factor. For each entry, provide a description of the misalignment with the ISM
control objective, and a rationale for remaining unaligned with the control objective. This can
also detail any factors relating to the environment which may partially mitigate this risk.
Instruction: Detail any controls assessed as “Not Implemented” or “Ineffective” in the control matrix for the
administrative and support environments, where the CSP is seeking to remediate this risk
following the security assessment. Controls may be grouped as appropriate where there is a
single underlying implementation factor. For each entry, provide a description of the
misalignment with the ISM control objective, a recommended remediation by the security
assessor or planned implementation by the CSP, as well as an expected date for remediation.
14
<Sensitivity//Classification>
<Sensitivity//Classification>
4.4.1. Overview
4.4.1.1. Network Security
Instruction: Detail the network topology and security of the Cloud Production Environment network,
focusing on network segmentation, separation, and access control features. The topology
description should include the links to telecommunications/internet providers, and any
dedicated links that are available to cloud consumers.
15
<Sensitivity//Classification>
<Sensitivity//Classification>
Attaching vendor reference architecture and vendor produced security best practice
documentation provided at the time of assessment may shorten the time it takes to capture
this information.
16
<Sensitivity//Classification>
<Sensitivity//Classification>
Instruction: Detail any controls assessed as “Alternate Control” in the control matrix for the service.
Controls may be grouped as appropriate where there is a single underlying implementation
factor. For each entry, provide a description of any identified vulnerabilities where a specific
ISM control requirement has not been met, and details of the alternate control implemented
by the CSP to otherwise meet the control objective.
Instruction: Detail any controls assessed as “Not Implemented” in the control matrix for the service, where
the CSP has decided to retain this implementation due to business decision. Controls may be
grouped as appropriate where there is a single underlying implementation factor. For each
entry, provide a description of the misalignment with the ISM control objective, and a rationale
for remaining unaligned with the control objective. This can also detail any factors relating to
the environment which may partially mitigate this risk.
Instruction: Detail any controls assessed as “Not Implemented” or “Ineffective” in the control matrix for the
Cloud Production Environment, where the CSP is seeking to remediate this risk following the
security assessment. Controls may be grouped as appropriate where there is a single
underlying implementation factor. For each entry, provide a description of the misalignment
with the ISM control objective, a recommended remediation by the security assessor or
planned implementation by the CSP, as well as an expected date for remediation.
17
<Sensitivity//Classification>
<Sensitivity//Classification>
Responsibility
<Outsourced
Provider Name> <CSP Name> Cloud Consumer
Layer If applicable
Governance
Incident Response Choose an item. Choose an item. Choose an item.
Technical
Data Choose an item. Choose an item. Choose an item.
I de
ntity & Access Choose an item. Choose an item. Choose an item.
Management
Application Choose an item. Choose an item. Choose an item.
P la
Choose an item. Choose an item. Choose an item.
tform
Virtualisation Choose an item. Choose an item. Choose an item.
18
<Sensitivity//Classification>
<Sensitivity//Classification>
P hy
Choose an item. Choose an item. Choose an item.
sical Datacentre
5.1.1.3. Cloud Service Architecture Diagram
Instruction: Provide a diagram showing as a minimum:
- The service authorisation boundary
- The segmentation and segregation boundaries
- The logical high-level components of the service
- External systems including management and connection to cloud consumer systems or
applications
- The internal and external interfaces between these components
Instruction: List and describe each component of the above service architecture diagram. This section
should detail any dependencies on systems or services. Where the dependency is outside the
identified service region, their geographic location should also be specified and included in
section 3.2.3 of this document. For example, the device region may be hosted in one data
centre but rely on a mail server or service-specific control plane in another location.
Instruction: List and describe any internal and external interfaces provided by the CSP including:
- Application Programming Interfaces (APIs),
- Network services (by port and protocol),
- Health monitoring and service telemetry,
- Security monitoring,
- Backup services,
- Administration and support services.
For each interface, detail the cryptographic data in transit protections, including whether these
are ASD Approved Cryptographic Protocols (AACPs) using ASD Approved Cryptographic
Algorithms (AACAs).
Describe isolation mechanisms that limit access to the service or its management interfaces.
19
<Sensitivity//Classification>
<Sensitivity//Classification>
This section should also detail the hardening of these separation methods and should identify
if any known but unmitigated vulnerabilities exist in the implemented design.
20
<Sensitivity//Classification>
<Sensitivity//Classification>
Instruction: Detail any controls assessed as “Alternate Control” in the control matrix for the service.
Controls may be grouped as appropriate where there is a single underlying implementation
factor. For each entry, provide a description of any identified vulnerabilities where a specific
ISM control requirement has not been met, and details of the alternate control implemented
by the CSP to otherwise meet the control objective.
21
<Sensitivity//Classification>
<Sensitivity//Classification>
Instruction: Detail any controls assessed as “Not Implemented” in the control matrix for the service, where
the CSP has decided to retain this implementation due to business decision. Controls may be
grouped as appropriate where there is a single underlying implementation factor. For each
entry, provide a description of the misalignment with the ISM control objective, and a rationale
for remaining unaligned with the control objective. This can also detail any factors relating to
the environment which may partially mitigate this risk.
Instruction: Detail any controls assessed as “Not Implemented” or “Ineffective” in the control matrix for the
production Cloud Production Environment, where the CSP is seeking to remediate this risk
following the security assessment. Controls may be grouped as appropriate where there is a
single underlying implementation factor. For each entry, provide a description of the
misalignment with the ISM control objective, a recommended remediation by the security
assessor or planned implementation by the CSP, as well as an expected date for remediation.
Instruction: Detail any controls where the “Cloud Consumer Implementation Responsibility” is assessed as
“Not Offered”, such that the ISM would require a setting such as MFA, crypto, or
regionalisation to be configured by the cloud consumer, but the CSP does not offer this feature
for the service.
22
<Sensitivity//Classification>
<Sensitivity//Classification>
Instruction: Detail any controls where the “Cloud Consumer Implementation Responsibility” is assessed as
“Configurable”, such that the ISM would require a setting such as MFA, crypto, data
replication, or regionalisation to be configured by the cloud consumer.
Attached Documents
Attachment A: Cloud Security Controls Matrix
Instruction: Details on the Cloud Security Controls Matrix (CSCM) location. The Cloud Security Controls
Matrix (CSCM) provides a listing of all the ISM controls the CSP implements as well as the
controls that are the cloud consumer’s responsibility, and any shared responsibilities.
Addendums
Please check with the Cloud Service Provider for any addendums to this report. Please be aware the addendum
contents have not been independently verified by an IRAP Assessor. These addendums are provided by the CSP to
maintain the accuracy and validity of their reports between independent assessments. Cloud Consumers need to
consider this lack of independent verification when reviewing the addendums.
23
<Sensitivity//Classification>