Security control for cloud services
More businesses are offering cloud-based services to customers, and so purchasing departments increasingly demand evidence that data stored on those cloud servers is safe. ISO/IEC 27017 is a set of guidelines for safeguarding cloud-based environments and minimizing the potential risk of security incidents.
The standard addresses topics such as:
Any organization which provides cloud-based services can benefit from ISO/IEC 27017 certification – from online email providers and document management platforms to cloud-based apps and tools. It demonstrates to customers that you are following the most stringent cloud services security standards and have processes in place to manage any unforeseen problems.
If your organization provides cloud services your customers will want assurances that their data, documents, messages and activity are protected under any circumstances. They will also want evidence that they will be able to retrieve and move their data whenever they wish. ISO/IEC 27017 cloud standard gives them that confidence.
Becoming ISO/IEC 27017 certified provides multiple benefits:
TÜV SÜD is a world leader in cloud computing service auditing and assessments and works with companies around the globe to provide independent audits and certification. Based on years of technical experience, our auditors are able to rapidly understand your cloud system’s architecture and assess whether or not it conforms to the standard. If it is non-conformant, you can use our reports to see which areas you need to improve on and receive certification.
As TÜV SÜD is vendor agnostic, our assessments are both impartial and independent, and we follow the highest standards of auditing practice to ensure neutrality and reliability every time. Our rigorous approach ensures greater trust for your customers.
Every CSP is different, so we work with you to implement a tailor-made yet rapid assessment of how your organization conforms to the recommendations in ISO/IEC 27017. Using our assessment tool, our experts identify non-conformances and present these in an assessment report. Based on the findings, your organization can then implement improvements which rapidly reduce your risk and let you become certified.
Steps to certification typically include the following stages:
Implement an Information Security Management System according to ISO / IEC 27001
Follow these 10 steps to reduce your cyber security risk while working from home
Prepare your organization to handle cyber threats
Learn how to best manage your data security
Select Your Location
Bosnia and Herzegovina