Search
Close this search box.

Securing Your Cloud with Confidence and Clarity

ISO/IEC 27017 - Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services

ISO/IEC 27017 Certification

At QSCert Middle East, we understand the importance of data security in the cloud. That’s why we offer certification services for ISO/IEC 27017, a security standard developed specifically for cloud service providers and users to create a safer cloud-based environment and reduce the risk of security problems1.

What is ISO/IEC 27017?

ISO/IEC 27017 is an international standard that provides guidelines for information security controls applicable to the provision and use of cloud services. It is based on ISO/IEC 27002 and covers additional controls and implementation guidance for both cloud service providers and customers.

Why ISO/IEC 27017 Certification?

ISO/IEC 27017 certification demonstrates your commitment to cloud security. It provides additional implementation guidance for 37 controls specified in ISO/IEC 27002 and 7 additional controls related to cloud services1. These controls address key aspects such as:

Our Services

experts will guide you through the process, ensuring that your organization meets the standard’s requirements and helps you demonstrate your commitment to cloud security.

Contact us today to learn more about our ISO/IEC 27017 certification services and how we can help secure your cloud services.

Certification and Compliance

Achieving ISO/IEC 27017 certification involves a rigorous process that ensures your organization’s compliance with the standard’s requirements. Here’s a general overview of the process:

Gap Analysis

We start by conducting a gap analysis to identify the areas where your organization currently meets the standard’s requirements and where improvements are needed.

Management Review

The results of the internal audit are then reviewed by management. This review is crucial for continual improvement and ensuring the system’s ongoing effectiveness.

Internal Audit

Once the controls and processes are in place, an internal audit is conducted to ensure they are effective and meet the standard’s requirements.

Implementation

Next, we’ll help you implement the necessary controls and processes to meet the standard’s requirements. This includes setting up systems for responsibility allocation, asset return, virtual environment protection, and more.

Certification Audit

Finally, a certification audit is conducted. This is a two-stage process: the Stage 1 audit checks the readiness of your organization for the Stage 2 audit, which is a more detailed evaluation of your organization’s compliance with ISO/IEC 27017.

Upon successful completion of the certification audit, your organization will be awarded the ISO/IEC 27017 certification. This certification is valid for three years, during which surveillance audits will be conducted to ensure ongoing compliance.

Remember, achieving and maintaining ISO/IEC 27017 certification is not a one-time event but a continuous process of improvement. At QSCert Middle East, we’re here to guide you through every step of this process. Contact us today to get started on your journey to cloud security excellence.

Need Help with Easier Solutions? We Are Experts!

Introduction to Cloud Services

Cloud services emerged in the mid-2000s and have continued to develop to become a mainstream technology option for most organizations.  However, cloud is not just a minor technology change, it is both a strategic opportunity and a strategic challenge for organizations. The range of cloud services continues to grow, and security continues to be a key factor and enabler for cloud use. The evolution of security for cloud has resulted in cloud service providers being at the forefront of security and cloud customers have a high understanding and expectations of robust cloud security.

As part of the International Standardization Organisation ISO’s family of Information Security Standards known as ISO 27000 a key standard is ISO 27017: associated with the Code of Practice for Information Security Controls is based on ISO/IEC 27002 for Cloud Services is specifically designed to be applied to cloud environments from the perspectives of both the provider and the consumer / customer. The standard provides additional cloud-focused implementation guidance for relevant controls.

Overview of ISO 27017

ISO/IEC 27017 is like a guide for companies using or thinking about using cloud services. Cloud companies follow this rulebook to keep their customers and others safe online. It’s all about keeping information secure.

ISO 27017 is part of a family of rules called ISO/IEC 27000. These rules help manage online security smartly. It’s like building on a set of rules called ISO/IEC 27002. ISO 27017 adds more rules, especially for cloud security.

ISO 27017 helps both those using cloud services and the ones providing them. It’s all about keeping things safe online, whether using a computer or a cloud service.

ISO 27017 makes sure to cover all the critical safety steps. It checks risks online and then makes sure cloud security is super safe. It’s like adding extra locks to keep everything safe online.

What is ISO 27017?

ISO/IEC 27017:2015 is an information security code of practise for cloud services. It’s an extension to ISO/IEC 27001:2013 and ISO/IEC 27002, and it provides additional security controls for cloud service providers and for cloud service customers. An organisation implementing the standard would select the relevant controls for their circumstances. 

 The standard provides cloud-based guidance on 37 of the controls in ISO/IEC 27002, as well providing 7 additional controls:

  • The shared roles and responsibilities between the cloud service providers and customers.
  • Removal and return of cloud service customers’ assets when a contract has been terminated.
  • Segregation in virtual computing environments.
  • Secure hardening of virtual machines.
  • Documenting critical operational procedures.
  • Allowing cloud service customers to be able to monitor relevant activities within the cloud.
  • The alignment of security management for both virtual and physical networks.

What is ISO 27017 certification?

ISO/IEC 27017 is a compliance framework that offers guidelines for both cloud service providers and customers aimed at safeguarding physical networks and virtual cloud infrastructure. The international standard guides organizations on two fronts—the implementation of Information Security Management Systems (ISMS) controls provisioned within ISO 27002 as well as detailing controls that are unique and specific to cloud environments. Presently, ISO 27017 has only one edition, published in 2015. A second edition is in progress, slated to be published in 2025.

Who needs to implement ISO 27017?

ISO/IEC 27017, as a framework allows organizations to adopt a methodical and consistent approach to customer security by focusing thoroughly on cloud and data security. It applies specifically to cloud service providers and cloud service customers. ISO 27017 is comprehensive in the way it specifies what customers can expect from their cloud service providers as well as the responsibilities and obligations customers have to create and maintain a secure cloud environment.

What is the scope of ISO 27017?

ISO 27017 applies to cloud service providers who have an Information Security Management System in place as per the specifications laid out in ISO 27001. The framework evaluates the effective implementation of 37 controls unders ISO/IEC 27002 which is the organization can choose based on risk assessment.

Why implement ISO 27017?

  • Making clients feel safe about their data being stored in the cloud is vital. Having ISO/IEC 27017 standard allows an internationally standardized framework that can help reduce the risk of data breaches and build customer trust by showing your commitment to information security. The standard also gives guidance to cloud service customers on what they should want from their cloud service hosts.
  • The standard covers a range of topics such as asset ownership, removal and return of assets when a customer contract has been terminated, protection and separation of a customer’s virtual environment and more. With a growing risk of cloud data breaches now more than ever is important to know you and your organization are doing the most to try and reduce these risks as a cloud service provider and/or a cloud service customer.
  • As ISO 27017 is built from the foundations of ISO 27001 and ISO 27002 framework, the certification shows compliance internationally and helps your organization for both the cloud service providers and cloud service customers against risks within the cloud.
 

How to get ISO/IEC 27017 certified?

An ISO 27017 certification is an essential badge for companies looking to stand out from the competition and assure customers of a consistent and sustainable commitment to cloud security. But getting ISO 27017 certified can be a bit different from other frameworks. 

Unlike other frameworks, ISO 27017 is not a management standard, and companies cannot obtain an independent ISO 27017 certification. However, companies can include the controls specified within ISO 27017 while getting audited for ISO 27001.

Setting this difference aside, here’s a list of steps that companies need to follow to get ISO 27017 certified. 

Determine your current state and conduct risk assessment.

Conduct a thorough study of your current cloud security policies. An honest assessment of applicable cloud and security controls can help companies determine where their measures are falling short and what needs to be addressed. 

At this point, it’s important to note, in detail, all the risks that could affect the confidentiality, integrity, availability and ownership of assets and system and determine the impact and likelihood of these risks. Thorough risk management also helps the company determine the controls within ISO/IEC 27002 that fall within the scope of the exercise. 

Conduct an internal audit in tandem with ISO 27001

As mentioned earlier, the ISO 27017 certification happens in tandem with ISO 27001. Therefore, its important to conduct a thorough internal audit that assesses both ISMS implementation as well as controls relevant to cloud services. An effective internal audit undergoes three stages of review—documentation, field review (which generates an internal audit assessment report), as well as a management review. The findings from the assessment report need to be implemented and tested before considering a formal external audit. 

Implement new controls 

Implement of controls and security guidelines outlined in the ISO 27017 framework. This is an ongoing effort that takes a significant bulk of time. ISO 27001 and ISO 27002 are typically deployed together, there may be a number of controls that are already implemented. The unique controls, however, need to be rolled out from scratch.

Conduct staff training

Once controls are implemented, it’s important to educate your employees of effective management. Ensure your internal teams receive sufficient awareness and role-oriented training and updates so they can carry out their duties efficiently. Areas such as data handling, incident reporting, etc. need to be given special attention since they can impact both certifications. 

Form a team and assign responsibilities.

Responsibilities are a crucial part of getting ISO 27017 certified. Create a team of security and control specialists that can help you choose the right ISO 27002 controls that are relevant to your organization and carry out the unique control requirements. Clearly define a timeline and an action plan for implementation.

Document your processes

ISO 27017, like any security framework is heavy on documentation. Create SOPs and take special care to document your business processes and controls along the way. These will not only function as evidence but also as guidelines for repeat certifications. 

Undergo an external audit

The first course of action is to notify the auditor of the scope of assessment to include the criteria of ISO/IEC 27017 in addition to ISO 27001. The external certification audit typically happens in two stages. The first stage entails auditing evidence of implementation and sufficiency. The auditor will also thoroughly review documentation of processes, SOPs, and practicies in place as well as the systems that fall within the scope of the ISMS. The auditor then presents an assessment report of the findings which the company is required to act on.  

The second phase of the audit takes place within six months of phase one. The auditor evaluates the ISMS on a sample basis to determine if the company’s ISMS is operating within ISO standards. The audit will finally assess the corrective and preventive actions the company has taken mentioned in phase one. They then present a list of observations that highlights major and minor non-conformities as well as opportunities for improvement. Major conformities will have to be addressed and the evidence will need to be shared with the auditor.  

Compliance is not a one-time thing. Companies are expected to be monitoring their ISMS, conduct regular surveillance audits, and keep their systems updated regularly.

Need Help with Easier Solutions? We Are Experts!

Advantages

Importance of cloud security

  • In today’s digital age, ensuring data safety in the cloud is paramount for building client trust. ISO/IEC 27017 is a globally recognized framework that offers a robust solution to minimize the risk of data breaches and instill confidence in clients regarding your commitment to information security.
  • Addressing Crucial Concerns – ISO/IEC 27017 tackles a range of critical issues, including asset ownership, handling assets post-contract termination, and the security of virtual environments entrusted to your organization.
  • Establishing Administrative Protocols – The framework sets forth clear administrative protocols for managing cloud environments, emphasizing the need to harden virtual machines in alignment with business requirements.
  • Demonstrating Commitment to Security—Whether you’re a cloud service provider or a user, it’s imperative to showcase your organization’s dedication to mitigating data breach risks. Implementing ISO 27017 signifies your proactive approach to safeguarding data in the cloud.
  • Aligning with Established Standards – ISO 27017 builds upon the foundation laid by ISO 27001 and ISO 27002. Its implementation signifies your organization’s adoption of industry best practices to combat cloud-related threats, ensuring robust security measures for providers and customers. While it complements ISO/IEC 27002 requirements, it doesn’t replace them, emphasizing a comprehensive approach to cloud security. 

Benefits

Standardized cloud security

ISO 27017 is a well-thought-out framework focused on reducing cloud-related risks and ensuring a standardized implementation of cloud-based security measures.

Complements ISMS implementation: ISO 27017 is deployed in tandem with other frameworks within the series. So implementing ISO 27017 ensures that the cloud element of operations complements the organization’s ISMS.

Brings together service providers and customers: ISO 27017 is explicit in the way it defines security roles and responsibilities for customers as well as service providers to ensure a high standard of protection. 

Sustained approach to strategy: Implementing ISO 27017 ensures a long-term approach to data security strategy. The standards help organizations stand out from the competition and enable sustained development.

Reduced reputational risk: Companies that are ISO 27017 certified are able to greatly mitigate the risk related to data breaches. They are also able to enable better transparency of their cloud operations and build customer trust and strong business relationships.

What standards can ISO 27017 be integrated with?

ISO 27017 can be integrated with several other standards and frameworks to improve information security in general and cloud security in particular for organizations. Some of the standards ISO 27017 can be integrated with are: ISO/IEC 27001 ISO/IEC 27002 Cloud Security Alliance (CSA) National Institute of Standards and Technology (NIST) General Data Protection Regulation (GDPR)

Punchline

Enterprises with high levels of non-compliance saw the average cost of a data breach increase 12.6% to $5.05 million in 2023. $4.57 million. Average cost of a data breach involving data stored in public cloud. A recent study by Gartner states that the total end-user spending on public cloud services was estimated to reach $591.8 billion by the end of 2023—a 20.7% surge over the last year.