Learn the 14 NCSC Cloud Security Principles and how Risk Ledger helps assess supplier cloud security and compliance confidently.
The UK National Cyber Security Centre (NCSC) has published cloud security guidance for organisations seeking to use cloud platforms to store or process organisational data, or to use cloud-hosted infrastructure for their specific business needs. NCSC has outlined 14 principles that should be evaluated when assessing the security of a cloud provider that may need to store or process sensitive data (e.g. PII, commercially sensitive, or government OFFICIAL information). Each principle sets out goals that, if met, should provide you with assurance that a cloud provider fulfils the intent of the principle.
The NCSC Cloud Security Principles describes suggested implementations that a cloud provider may use to meet the goals. However, the guidance is not prescriptive and different cloud providers may implement different methods to achieve the same goal.
Clients should review the evidence provided by the cloud provider to determine for themselves whether the goals are met and aligns with their own organisation’s risk appetite.
If you are a smaller organisation looking to do some due diligence on your online services, or a larger organisation that is not processing sensitive data in the service, you should use the NCSC’s lightweight approach to cloud security.
Risk Ledger’s Supplier Assessment Framework is a standardised set of security controls aligned with well-known industry frameworks representing best practices to reduce supplier cyber risk. A controls-based approach allows you to quickly and efficiently assess the cyber security posture of your suppliers at scale, across your entire supply chain. As most controls are answered in a binary yes/no format, you can easily compare suppliers and view their compliance against your cyber security policy.
You can leverage your suppliers’ answers and documentation within Risk Ledger to generate a body of evidence for your assessment.
When a supplier is building their Risk Ledger profile, they can choose whether to answer the control questions at an organisational level, or whether to provide different answers specific to each product or service they provide. (See Product Level Answers (PLA) for Clients)
Often, suppliers deploy the same controls across all their products & services, so they may not need to provide separate answers to give you all the information you need.
The control-level information and the documentation you find within a supplier profile on Risk Ledger will serve as a baseline of evidence. This may be sufficient on its own to assess certain cloud security principles or may be a starting point for further discussions with suppliers.
For each principle, you should:
This principle states that user data transiting networks should be adequately protected against tampering and eavesdropping. This requires data in transit protection should be achieved through a combination of encryption, network protection, and authentication.
You should be sufficiently confident that:
You should prefer a cloud provider that:
The following controls will help you assess a supplier’s controls and implementation for protecting data in transit.
These controls are the most aligned to Principle 1 as they broadly cover the extent to which encryption is used in data transfers and remote connections. Within their Risk Ledger profile, suppliers are asked to provide details (both technical and procedural) of these controls.
These controls provide you with additional context on a supplier’s implementation of additional cryptographic and authentication controls. These answers may also be relevant to your assessment of Principle 1.
The information found within a supplier profile against these controls may be enough for you to determine how well the provider has met these goals. If not, move to step three.
If you need further information or clarification to give you enough confidence that the security goals have been met, you can request this from the supplier using the Discussions feature.
Risk Ledger’s Supplier Assessment Framework can be utilised to gather evidence on a cloud provider’s alignment with the NCSC Cloud Security Principles. However, the effectiveness of this alignment also depends on how the service is configured and deployed within your organisation. Modifying security controls to meet specific business requirements may reduce security protections and introduce additional risks.
The process outlined above for Principle 1: Data in Transit Protection should be repeated for each of the 14 NCSC Cloud Security Principles. For every principle, you should:
Risk Ledger provides a baseline body of evidence. However, it is ultimately up to each client to review the evidence and make a determination, based on their requirements and overall risk appetite, as to whether a cloud provider sufficiently meets the goals of the NCSC Cloud Security Principles.
Monthly research, case studies and practical guides you won't find anywhere else.
Join thousands of security managers turning their TPRM programmes into success stories.