In This Guide
- Introduction
- The 7 Additional Cloud Controls
- CLD.6.3.1 — Shared Roles & Responsibilities
- CLD.8.1.5 — Removal of Customer Assets
- CLD.9.5.1 — Virtual Environment Segregation
- CLD.9.5.2 — Virtual Machine Hardening
- CLD.12.1.5 — Administrator Operational Security
- CLD.12.4.5 — Cloud Service Monitoring
- CLD.13.1.4 — Virtual & Physical Network Alignment
- Key Extended ISO 27002 Controls
- Shared Responsibility Matrix by Service Model
- Comparison Table
- FAQ
- ISO 27017 introduces 7 cloud-specific controls (CLD.6.3.1 through CLD.13.1.4) addressing risks unique to cloud computing environments.
- Each control has distinct requirements for cloud service providers (CSPs) and cloud service customers (CSCs).
- The shared responsibility model shifts significantly across IaaS, PaaS, and SaaS — responsibilities that fall on the customer in IaaS move to the provider in SaaS.
- Auditors expect evidence of both control implementation and documented responsibility allocation for every applicable control.
- Organizations that are both CSP and CSC must implement ISO 27017 from both perspectives simultaneously.
Introduction
ISO/IEC 27017:2015 is structured around two types of security guidance: extended implementation guidance for existing ISO 27002 controls and seven entirely new cloud-specific controls. This guide provides a comprehensive walkthrough of each additional control and the key extended controls, with a focus on how responsibilities are divided between cloud service providers and their customers.
Understanding these controls in detail is essential for three audiences:
- Cloud service providers building their control framework for ISO 27001 certification with ISO 27017
- Cloud service customers evaluating provider controls and implementing their own cloud security measures
- Auditors and consultants assessing ISO 27017 compliance in certification or advisory engagements
For each of the seven additional controls below, we cover: what the control requires, CSP responsibilities, CSC responsibilities, and typical evidence examples that auditors look for during certification.
The 7 Additional Cloud Controls — Detailed Walkthrough
CLD.6.3.1 — Shared Roles and Responsibilities Within a Cloud Computing Environment
What This Control Requires
This is the foundational control of ISO 27017. It requires that information security roles and responsibilities as they relate to cloud services be clearly defined, documented, and communicated to all relevant parties. The division must cover all control areas — not just the seven CLD controls, but every security domain.
The control recognizes that cloud computing creates a fundamentally different security governance model compared to traditional IT. When an organization consumes cloud services, the security perimeter extends beyond the organization's direct control, creating potential gaps unless responsibilities are explicitly assigned.
CSP Responsibilities
- Publish clear documentation of security responsibilities the CSP assumes for each service
- Define what the CSC is responsible for and communicate this transparently
- Provide a shared responsibility model document as part of service documentation
- Update responsibility documentation when services change
- Ensure staff understand the boundary between provider and customer responsibilities
CSC Responsibilities
- Review and understand the CSP's published responsibility model
- Map CSP responsibilities against internal security requirements to identify gaps
- Implement controls for all responsibilities that fall to the customer
- Document an internal view of the shared responsibility allocation
- Include shared responsibility review in cloud service procurement and renewal processes
Evidence Examples
- Shared responsibility matrix document
- Service agreements referencing security responsibilities
- Internal RACI chart for cloud security controls
- Records of responsibility reviews during service procurement
- Communication records demonstrating stakeholder awareness
CLD.8.1.5 — Removal of Cloud Service Customer Assets
What This Control Requires
When a cloud service agreement ends — whether through planned migration, contract termination, or service discontinuation — customer assets (data, configurations, customizations, and metadata) must be handled securely. This control ensures that customers can retrieve their data and that providers securely delete all copies after an agreed period.
This control addresses a significant cloud risk: data remnants persisting on provider infrastructure after a customer relationship ends. In multi-tenant environments, incomplete data removal could expose sensitive information to subsequent tenants or to the provider itself.
CSP Responsibilities
- Define and publish data return procedures and supported export formats
- Provide mechanisms for customers to export their data in a usable format
- Implement secure data deletion procedures for all customer data upon contract termination
- Ensure deletion covers primary storage, backups, replicas, caches, and logs containing customer data
- Define and communicate the timeline for data availability during the transition period and final deletion
- Provide confirmation or certification of data deletion upon request
CSC Responsibilities
- Understand the provider's data return and deletion procedures before entering agreements
- Negotiate adequate data transition periods in service contracts
- Plan and execute data migration or export before contract termination
- Request and retain confirmation of data deletion from the provider
- Include data portability and exit requirements in cloud procurement criteria
Evidence Examples
- Data return and deletion policy
- Contractual clauses on data handling at termination
- Data export procedures and format documentation
- Certificates of data destruction issued to departing customers
- Records of actual data deletion activities for past customer transitions
CLD.9.5.1 — Segregation in Virtual Computing Environments
What This Control Requires
A cloud service customer's virtual computing environment must be protected from other customers and unauthorized persons. This control is critical in multi-tenant architectures where multiple customers share the same physical infrastructure. The segregation must be strong enough to prevent cross-tenant data access, side-channel attacks, and resource interference.
CSP Responsibilities
- Implement logical separation between tenant environments using appropriate isolation technologies (hypervisors, containers, namespaces, VLANs)
- Ensure compute isolation prevents one tenant's workloads from accessing another tenant's memory, processes, or storage
- Implement network segregation to prevent inter-tenant traffic unless explicitly authorized
- Maintain storage separation so that one tenant cannot access another's data volumes or object stores
- Regularly test segregation controls through penetration testing and vulnerability assessments
- Document the segregation architecture and make relevant details available to customers
CSC Responsibilities
- Evaluate the provider's segregation architecture and assess whether it meets risk requirements
- Request information about the provider's multi-tenancy approach during procurement
- Implement additional segregation within allocated environments where needed (e.g., network micro-segmentation within the customer's VPC)
- Include segregation requirements in procurement criteria and service agreements
Evidence Examples
- Segregation architecture documentation
- Hypervisor and container isolation configuration records
- Network segmentation diagrams showing tenant boundaries
- Penetration test reports specifically testing cross-tenant access
- Security architecture reviews of multi-tenancy controls
CLD.9.5.2 — Virtual Machine Hardening
What This Control Requires
Virtual machines provisioned and used within cloud environments must be hardened to meet the organization's security requirements. This includes securing VM images, applying baseline configurations, disabling unnecessary services, and maintaining patch currency — all adapted for the unique challenges of virtualized environments.
CSP Responsibilities
- Provide hardened base VM images (golden images) for customer use
- Define and publish VM hardening guidelines for customers who build their own images
- Harden the provider's own management VMs and infrastructure VMs
- Implement processes for maintaining and patching base images
- Monitor for vulnerabilities in provider-managed VM images and publish advisories
- Control access to VM image repositories and signing mechanisms
CSC Responsibilities
- Use provider-supplied hardened images or apply documented hardening standards to custom images
- Maintain a VM image lifecycle process including regular updates and re-hardening
- Disable unnecessary services and ports on provisioned VMs
- Apply security patches to customer-managed VMs in a timely manner
- Implement configuration management to detect drift from hardening baselines
Evidence Examples
- VM hardening standards and baseline configurations
- Golden image management procedures
- Patch management records for virtual machines
- Configuration compliance scan results
- Vulnerability assessment reports for VM images
CLD.12.1.5 — Administrator's Operational Security
What This Control Requires
Cloud administrative operations carry elevated risk because administrators have privileged access that can affect multiple customers simultaneously. This control requires that procedures for administrative operations be defined, documented, and monitored, with controls proportionate to the impact of administrative actions on the security of cloud services.
CSP Responsibilities
- Define and document all critical administrative operations and associated procedures
- Implement privileged access management (PAM) for cloud administrative accounts
- Enforce multi-factor authentication and session controls for administrative access
- Implement and maintain audit logging for all administrative actions
- Apply the principle of least privilege to administrative roles
- Implement break-glass procedures for emergency administrative access
- Conduct regular reviews of administrative access rights
- Segregate administrative duties to prevent single-person control over critical functions
CSC Responsibilities
- Implement privileged access controls for customer-side cloud administration
- Manage access to cloud management consoles, APIs, and dashboards
- Monitor and log administrative actions performed by customer administrators
- Regularly review administrative access rights and remove unnecessary privileges
- Assess the provider's administrative security practices as part of vendor due diligence
Evidence Examples
- Privileged access management policies and procedures
- Administrative access review records
- MFA configuration evidence for administrative accounts
- Audit logs of administrative operations
- Break-glass procedure documentation and usage records
CLD.12.4.5 — Monitoring of Cloud Services
What This Control Requires
Cloud service customers must have the capability to monitor specified aspects of cloud service operations that are relevant to their security and compliance requirements. This control ensures transparency from the CSP and monitoring capability for the CSC — addressing the visibility gap that occurs when workloads move from on-premises to cloud.
CSP Responsibilities
- Define and publish what monitoring data and capabilities are available to customers
- Provide access to service availability, performance, and capacity metrics
- Offer security event and audit log access or export capabilities
- Implement service health dashboards and status pages
- Provide APIs or integrations for customer monitoring tools
- Notify customers of security incidents that affect their environments
- Define monitoring data retention periods and archival options
CSC Responsibilities
- Identify monitoring requirements based on risk assessment and compliance obligations
- Evaluate the provider's monitoring capabilities against requirements during procurement
- Implement monitoring solutions that leverage provider-supplied data and tools
- Integrate cloud monitoring with existing enterprise SIEM and monitoring infrastructure
- Define alerting thresholds and incident response triggers for cloud-specific events
- Regularly review monitoring effectiveness and coverage
Evidence Examples
- Monitoring capability documentation and service catalogs
- Customer-accessible dashboard configurations
- Security event log export procedures
- SIEM integration evidence for cloud log sources
- Alerting rules and escalation procedures for cloud services
CLD.13.1.4 — Alignment of Security Management for Virtual and Physical Networks
What This Control Requires
Security management for virtual networks must be consistent with policies and practices for physical networks. This control recognizes that virtual networking (software-defined networking, virtual firewalls, virtual switches) introduces complexities and risks that must be managed with the same rigor as physical network infrastructure.
CSP Responsibilities
- Apply consistent security policies across virtual and physical network components
- Implement change management processes that cover virtual network configuration changes
- Monitor virtual network traffic with the same thoroughness as physical network traffic
- Apply firewall rules, access controls, and segmentation consistently in both domains
- Include virtual network components in vulnerability assessments and penetration testing
- Document the virtual network architecture and security controls
CSC Responsibilities
- Apply organizational network security policies to virtual network configurations within the customer's cloud environment
- Implement security groups, NACLs, and virtual firewalls according to security policy
- Monitor virtual network traffic within the customer's allocated environment
- Include cloud virtual networking in network security assessments
- Evaluate the provider's virtual network security architecture
Evidence Examples
- Network security policies covering both physical and virtual environments
- Virtual network architecture diagrams and security control documentation
- Change management records for virtual network configurations
- Virtual firewall and security group rule documentation
- Network security assessment reports including virtual components
Key Extended ISO 27002 Controls for Cloud
Beyond the 7 CLD controls, ISO 27017 provides significant cloud-specific extensions to existing ISO 27002 controls. Here are the most impactful:
A.9.2 — User Access Management (Cloud Extension)
CSP: Provide identity management integration capabilities (SSO, SAML, OIDC). Document identity federation options. Enforce strong authentication for management console access.
CSC: Integrate cloud identity management with enterprise IAM. Implement role-based access control for cloud resources. Regularly review and recertify cloud access rights.
A.10.1 — Cryptographic Controls (Cloud Extension)
CSP: Provide encryption options for data at rest and in transit. Offer key management services. Document which encryption is provider-managed vs customer-managed. Support customer-managed encryption keys (BYOK/HYOK).
CSC: Define encryption requirements for cloud-stored data. Evaluate provider encryption options against requirements. Implement customer-managed encryption keys where the risk assessment warrants it. Manage key lifecycle for customer-controlled keys.
A.12.3 — Information Backup (Cloud Extension)
CSP: Document backup capabilities, frequencies, and retention options. Define geographic location of backups. Provide restore procedures and test restore capabilities.
CSC: Define backup requirements for cloud-hosted data. Verify that provider backup practices meet recovery objectives. Implement independent backup solutions where provider capabilities are insufficient. Regularly test restore procedures.
A.15.1 — Supplier Relationships (Cloud Extension)
CSP: Disclose sub-processor and supply chain dependencies. Define security requirements for the CSP's own suppliers. Notify customers of material supply chain changes.
CSC: Evaluate the CSP's supply chain security. Include supply chain requirements in procurement criteria. Monitor for supply chain risk changes. Assess sub-processor security practices.
A.16.1 — Information Security Incident Management (Cloud Extension)
CSP: Define incident notification procedures and timelines. Provide forensic support capabilities. Coordinate incident response with affected customers.
CSC: Integrate cloud incident response with enterprise incident management. Define escalation procedures for cloud security incidents. Understand the provider's incident notification commitments.
Shared Responsibility Matrix by Service Model
The following matrix illustrates how security responsibilities shift across IaaS, PaaS, and SaaS models. This is a generalized view — specific allocations vary by provider and service.
| Control Domain | IaaS | PaaS | SaaS |
|---|---|---|---|
| Physical Facility Security | CSP | CSP | CSP |
| Hypervisor / Host OS | CSP | CSP | CSP |
| Network Infrastructure | CSP | CSP | CSP |
| Virtual Network Configuration | Shared | CSP (mostly) | CSP |
| Guest OS Patching | CSC | CSP | CSP |
| Middleware / Runtime | CSC | CSP | CSP |
| Application Security | CSC | CSC | CSP |
| Data Encryption at Rest | CSC | Shared | CSP (mostly) |
| Identity & Access Management | Shared | Shared | Shared |
| Data Classification | CSC | CSC | CSC |
| User Access Provisioning | CSC | CSC | CSC |
| Logging & Monitoring | Shared | Shared | Shared |
| Incident Response | Shared | Shared | Shared |
| Backup & Recovery | CSC | Shared | CSP (mostly) |
| Compliance & Audit | Shared | Shared | Shared |
Identity and access management, incident response, logging, and compliance are always shared responsibilities regardless of service model. The customer always retains responsibility for data classification and user access decisions. These are areas where gaps most commonly appear during audits.
ISO 27017 Additional Controls — Summary Comparison
| Control | Primary Risk Addressed | CSP Focus | CSC Focus |
|---|---|---|---|
| CLD.6.3.1 | Responsibility ambiguity | Publish responsibilities | Review and accept responsibilities |
| CLD.8.1.5 | Data remnants after termination | Secure deletion and data return | Migration planning and deletion verification |
| CLD.9.5.1 | Cross-tenant data leakage | Tenant isolation architecture | Evaluate and supplement segregation |
| CLD.9.5.2 | Insecure VM configurations | Hardened images and guidelines | Hardening and patching VMs |
| CLD.12.1.5 | Privileged access abuse | PAM, MFA, logging, duty segregation | Console access controls and monitoring |
| CLD.12.4.5 | Visibility gap in cloud | Monitoring data and tooling | Monitoring implementation and integration |
| CLD.13.1.4 | Inconsistent network security | Policy alignment across virtual/physical | Virtual network security configuration |
Frequently Asked Questions
What are the 7 additional cloud controls in ISO 27017?
The 7 additional controls are: CLD.6.3.1 (shared roles and responsibilities), CLD.8.1.5 (removal of cloud service customer assets), CLD.9.5.1 (segregation in virtual computing environments), CLD.9.5.2 (virtual machine hardening), CLD.12.1.5 (administrator's operational security), CLD.12.4.5 (monitoring of cloud services), and CLD.13.1.4 (alignment of security management for virtual and physical networks).
How does shared responsibility differ across IaaS, PaaS, and SaaS?
In IaaS, the customer retains most security responsibilities above the hypervisor, including OS, applications, and data. In PaaS, responsibility shifts more to the provider who manages the platform and runtime. In SaaS, the provider handles nearly everything while the customer manages user access, data classification, and configuration. Identity management and incident response remain shared across all models.
What evidence do auditors expect for ISO 27017 controls?
Auditors expect a documented shared responsibility matrix, evidence of control implementation for each applicable CLD control (policies, procedures, configurations, monitoring outputs), service agreements reflecting responsibilities, and records of review and continuous improvement. They will examine both documentation and operational evidence.
Can an organization be both a CSP and a CSC?
Yes. Many organizations act as both. For example, a SaaS company is a CSP to its customers but a CSC when it uses IaaS or PaaS from infrastructure providers. ISO 27017 must be implemented from both perspectives where applicable, with separate responsibility matrices for each direction.
How do I create a shared responsibility matrix?
List all applicable ISO 27017 controls and relevant ISO 27002 controls in a matrix. For each control, designate whether the CSP, CSC, or both are responsible, including the specific actions each party must take. Align the matrix with your service model (IaaS/PaaS/SaaS), validate it against contractual agreements, and review it regularly as services evolve.