0% found this document useful (0 votes)
49 views7 pages

Security Baseline Discipline Template

The document provides guidance on how to customize and use a template to define policy statements and design guidance for the Security Baseline discipline of cloud governance. It outlines instructions for updating the template with organization-specific information, policy statements, risks, metrics, indicators, and compliance processes. The goal is to help mature an organization's cloud governance practices for security.

Uploaded by

Kiran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views7 pages

Security Baseline Discipline Template

The document provides guidance on how to customize and use a template to define policy statements and design guidance for the Security Baseline discipline of cloud governance. It outlines instructions for updating the template with organization-specific information, policy statements, risks, metrics, indicators, and compliance processes. The goal is to help mature an organization's cloud governance practices for security.

Uploaded by

Kiran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

How to use this template

This sample template is designed to help you define the policy statements and design guidance that
allow you to mature the Five Disciplines of Cloud Governance within your organization. The examples in
this template are focused on the Security Baseline discipline. Use these examples as a starting point for
discussions within your organization around this discipline.

The following instructions will guide usage of this template:

 Update the template's title page with your author information, publish date and the governance
discipline this document supports.
 Update this template to reflect risks, tolerance, indictors, toolchains, etc., that align to your
business and technology needs.
 Update this template to reflect your policy statements.
 Update this template's executive summary to reflect your updated content.
 Before publication remove the “sample” watermark.
 Delete this page and update the table of contents before publishing your customized policy
statements.
Microsoft Cloud Adoption Framework for Azure

Cloud Governance
Security Baseline Discipline
Policy Statements and Design Guidance

The document outlines the policy statements and design guidance required to support the Security
Baseline governance discipline during cloud adoption. Associated risks, tolerance, and remediation
strategies are included for reference.

Author(s): <Update Author>

Date Published: 03/3/2019


Contents
How to use this template............................................................................................................................1
Executive Summary.....................................................................................................................................3
Policy Statements........................................................................................................................................3
Business Risks..............................................................................................................................................4
Metrics and Indicators.................................................................................................................................4
Metrics....................................................................................................................................................4
Indicators.................................................................................................................................................4
Policy compliance processes.......................................................................................................................5
Planning, review, and reporting processes..............................................................................................5
Ongoing monitoring.................................................................................................................................6
Violation Triggers and Enforcement Actions...........................................................................................6
Toolchain.....................................................................................................................................................7
Azure Specific Tooling..............................................................................................................................7
Tooling for other Cloud Providers............................................................................................................7

Executive Summary
Cloud deployments face many of the same security risks as workloads hosted in traditional on-premises
datacenters. However, one of the primary things that set cloud security governance apart from
traditional security policy is the ease with which resources can be created, potentially adding
vulnerabilities if security isn't considered before deployment. This document identifies and determines
the business’s tolerance for risks, and outlines efforts to remediate these risks. The result is a series of
policy statements that should guide the architecture of any solutions deployed to the cloud.

This policies and guidance in this document has been developed in conjunction with the governance
best practices documented in the Microsoft Cloud Adoption Framework for Azure (CAF).

Policy Statements
The following statements should guide cloud adoption architecture decisions to ensure compliance with
governance efforts related to the Security Baseline discipline. For additional examples of relevant policy
statements, see the governance theory section of CAF.

Asset classification: All deployed assets must be categorized by criticality and data classification.
Classifications must be reviewed by the Cloud Governance team and the application owner before
deployment to the cloud.

Network isolation: Network subnets containing protected data must be isolated from any other
subnets. Network traffic between protected data subnets is to be audited regularly.
Secure on-premises connectivity: All connections between the on-premises and cloud networks must
take place either through a secure encrypted VPN connection or a dedicated private WAN link.

Business Risks
The following security related business risks have been identified as concerns based on the current plans
for cloud adoption. For additional examples of relevant business risks, see the governance theory
section of CAF.

Risk Description Indicators Resolution


Data breach Inadvertent exposure or loss of Current Policy statements
sensitive cloud-hosted data can enforced
lead to losing customers,
contractual issues, or legal
consequences.
Service disruption Outages and other performance Mission- Policy statements
issues due to insecure critical drafted but not
infrastructure interrupts normal workloads enforced
operations and can result in lost deployed
productivity or lost business.

Metrics and Indicators


The following are key metrics and indicators that will guide the resolution or mitigation of business risks.
For additional examples of relevant metrics or indicators, see the governance theory section of CAF.

Metrics
Current Security Management efforts attempt to govern or improve the following key metrics.

 Data classification: Number of cloud-stored data and services that are unclassified according to
on your organization's privacy, compliance, or business impact standards.
 Attack surface: Number total data sources, services, and applications that are cloud-hosted and
accessible over the internet.
 Number of unencrypted data stores: Number of sensitive data stores that are not encrypted.
 Overall Standards Compliance: Ratio of compliance adherence to security standards.

Indicators
The following indicators will trigger changes in policy statements based on changes in metrics and other
conditions.

 Current: Current state of metrics. Any policy statements listed as current should be actively
enforced.
 Mission-critical workloads trigger: Deploying mission-critical workloads to the cloud will require
creation and enforcement of policy statements to remediate risks related to service disruption.
 Protected data trigger: Hosting data on the cloud that can be classified as confidential, private,
or otherwise subject to regulatory concerns will require policies in place to prevent the risk of
data breach.
Policy compliance processes
The following section outlines the processes that will ensure cloud deployments remain in compliance
with Security Baseline policies. This includes an overview of the planning, review and reporting
processes performed by the Cloud Governance team, as well as the ongoing monitoring and
enforcement processes that can be automated or supplemented with tooling to allow for faster
response to policy deviation.

For additional examples of relevant policy compliance processes, see the governance theory section of
CAF.

Planning, review, and reporting processes


Initial risk assessment and planning: As part of the initial adoption of the Security Baseline discipline, the
Cloud Governance team will identify core business risks and tolerances related to cloud security. The
team will use this information to begin discussions on specific technical risks with IT and security staff,
and to develop a baseline set of security policies as part of developing an initial governance strategy.

Deployment planning: Before deploying any workload or asset, the IT and Cloud Governance teams will
perform a security review to identify any new risks and ensure all access and data security policy
requirements are met.

Deployment testing: As part of the deployment process for any workload or asset, the Cloud Governance
team, in cooperation with corporate security teams, will review the deployment to validate security
policy compliance.

Annual planning: On an annual basis, Cloud Governance team will perform a high-level review of
security strategy. Future corporate priorities and updated cloud adoption strategies will be explored to
identify potential risk increase or other emerging security needs. This process will also involve a review
of the latest security best practices and integrate these into policies and review processes.

Quarterly review and planning: On a quarterly basis, the Cloud Governance team will review security
audit data and incident reports to identify any changes required in security policy. As part of this
process, the current cybersecurity landscape will be explored to proactively anticipate emerging threats
and update policy as appropriate. After the review is complete, design guidance will be aligned with
updated policy.

This review will also evaluate the Cloud Governance team's current membership for knowledge gaps
related to new or evolving policy and risks related to security. The team will invite relevant security and
IT staff to participate in reviews and planning as either temporary technical advisors or permanent
members of the team.

Education and Training: On a bi-monthly basis, the Cloud Governance team will offer training sessions to
ensure IT staff and developers are up-to-date on the latest security policy requirements. As part of this
process, the team will review all documentation, guidance, or other training assets and updated to
ensure they are in sync with the latest corporate policy statements.

Monthly audit and reporting reviews: On a monthly basis, security and Cloud Governance teams will
perform an audit on all cloud deployments to ensure their continued alignment with security policy.
Security related activities will be reviewed with IT staff and the team will identify any compliance issues
not already handled as part of the ongoing monitoring and enforcement process. This process will result
in a report for the Cloud Strategy team and each cloud adoption team to communicate overall
adherence to policy. The report is also stored for auditing and legal purposes.

Ongoing monitoring
Security and IT teams will implement automated monitoring systems for the organization's cloud
infrastructure, capturing relevant log data needed to evaluate security related risks. They will also
establish reporting and alerting systems to ensure prompt detection and mitigation of potential security
policy violations.

Violation Triggers and Enforcement Actions


Increase in attacks detected: If any resource experiences a 25% increase in brute force or DDoS attacks,
discuss with IT security staff and workload owner to determine remedies. Track issue and update
guidance if policy revision is necessary to prevent future incidents.

Unclassified data detected: Any data source without an appropriate privacy, security, or business impact
classification will have external access denied until the classification is applied by the data owner and
the appropriate level of data protection applied.

Network vulnerability detected: Access to any resource not explicitly allowed by the network access
policies should trigger an alert to IT security staff and the relevant workload owner. Track issue and
update guidance if policy revision is necessary to mitigate future incidents.
Toolchain
The following cloud provider specific tools will be implemented to automate the policy statements in
this document. For additional examples of relevant tooling specific to Azure, see the governance theory
section of CAF.

Azure Specific Tooling


Apply access controls to resources and resource creation: Microsoft Entra ID

Secure virtual networks: Azure Resource Manager

Detect malicious activity: Azure Monitor

Preemptively detect vulnerabilities: Microsoft Defender for Cloud

Tooling for other Cloud Providers


List similar tools for other cloud providers, as needed.

You might also like