SS584
   HOME

TheInfoList



OR:

SS 584 (also known as Multi-Tier Cloud Security (''MTCS'')) is an
information security Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
standard, published by Singapore Standards. The standard was last revised in 2020. SS 584 specifies a
Management system A management system is a set of policy, policies, business process, processes and procedures used by an organization to ensure that it can fulfill the tasks required to achieve its objectives. These objectives cover many aspects of the organizati ...
for Cloud Security, to three levels. Organizations that meet the requirements may be certified by an accredited certification body following successful completion of an
audit An audit is an "independent examination of financial information of any entity, whether profit oriented or not, irrespective of its size or legal form when such an examination is conducted with a view to express an opinion thereon." Auditing al ...
.


Rationale

Although most Cloud Service Providers are certified to
ISO 27000 ISO/IEC 27000 is one of the standards in the ISO/IEC 27000 series of information security management systems (ISMS)-related standards. The formal title for ISO/IEC 27000 is ''Information technology — Security techniques — Information securi ...
, the ISO standard does not focus on the unique risks arising from provisioning via the Cloud. Smaller customers also have difficulty assessing if a CSP's ISMS is sufficient for their needs, as ISO 27001 is risk-based, and may vary significantly between implementations. This may be a barrier to adoption by SMEs, who would like a simpler way to decide if a CSP meets their needs. To encourage adoption of Cloud Services, the then IDA established a series of groups in 2012 to produce a standard that CSPs could certify to. The standard would have multiple levels of security assurance: * Tier 1: Designed for non-business critical data and system, with baseline security controls to address security risks and threats in potentially low impact information systems using cloud services (e.g.: Web site hosting public information) * Tier 2: Designed to address the need of most organizations running business critical data and systems through a set of more stringent security controls to address security risks and threats in potentially moderate impact information systems using cloud services to protect business and personal information (e.g.: Confidential business data, email, CRM – customer relation management systems) * Tier 3: Designed for regulated organizations with specific requirements and more stringent security requirements. Industry specific regulations may be applied in addition to these controls to supplement and address security risks and threats in high impact information systems using cloud services (e.g.: Highly confidential business data, financial records, medical records) Note that the standard interchangeably uses the terms "tiers" and "levels".


History of SS 584

SS584:2013 was issued in 2013, and the program was initially administered by IDA. In 2015, the standard was revised (SS 584:2015). At this time,
Accreditation Accreditation is the independent, third-party evaluation of a conformity assessment body (such as certification body, inspection body or laboratory) against recognised standards, conveying formal demonstration of its impartiality and competence to ...
was handed over to the Singapore Accreditation Council, a division of
Enterprise Singapore Enterprise Singapore (EnterpriseSG) is a government board formed on 1 April 2018 to support the development of Singapore's small and medium-sized enterprises (SMEs), upgrade their capabilities, foster innovation, support transformation, and pro ...
, in line with other Singapore Standards. As of late 2019, the standard is being revised again, with inputs from industry, and a new version will be issued in Oct 2020.


Certification

CSPs that wish to have their services certified must classify each into
IaaS Infrastructure as a service (IaaS) is a cloud computing service model where a cloud services vendor provides computing resources such as storage, network, servers, and virtualization (which emulates computer hardware). This service frees users fro ...
,
PaaS Platform as a service (PaaS) or application platform as a service (aPaaS) or platform-based service is a cloud computing service model where users provision, instantiate, run and manage a modular bundle of a computing platform and applications, w ...
, or
SaaS Software as a service (SaaS ) is a cloud computing service model where the provider offers use of application software to a client and manages all needed physical and software resources. SaaS is usually accessed via a web application. Unlike oth ...
. They also decide to which level they wish to demonstrate compliance (Tier 1, 2, or 3). For compliance to Level 3, the CSP must be certified to
ISO/IEC 27001 ISO/IEC 27001 is an information security standard. It specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system (ISMS). Organizations with an ISMS that meet the st ...
. CSPs must obtain the services of an Accredited Certification Body, who will audit the management system of the CSP for compliance to SS 584. The CB will then issue a Certificate attesting to this, usually valid for three years. Annual Surveillance Audits are required. A list of Services and CSPs certified is available. Examples of Certified CSPs include
IBM International Business Machines Corporation (using the trademark IBM), nicknamed Big Blue, is an American Multinational corporation, multinational technology company headquartered in Armonk, New York, and present in over 175 countries. It is ...
and AWS.


Overseas Acceptance

Although the standard is not an
International standard An international standard is a technical standard developed by one or more international standards organizations. International standards are available for consideration and use worldwide. The most prominent such organization is the International O ...
, as the first national standard to address Cloud Security, it has seen acceptance outside Singapore. In particular, the
Korean Korean may refer to: People and culture * Koreans, people from the Korean peninsula or of Korean descent * Korean culture * Korean language **Korean alphabet, known as Hangul or Korean **Korean dialects **See also: North–South differences in t ...
RSEFT regulations recognise SS 584 as meeting most of the requirements for CSPs. Documents from Datamation and CloudwatchHUB describe the international use and impact of this standard.


See also

*
Cyber security standards Information security standards (also cyber security standards) are techniques generally outlined in published materials that attempt to protect a user's or organization's cyber environment. This environment includes users themselves, networks, devi ...
*
ISO/IEC 27001 ISO/IEC 27001 is an information security standard. It specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system (ISMS). Organizations with an ISMS that meet the st ...
* Singapore Standard (regulatory policy)


References

{{Reflist Information assurance standards