Three-level approach for a set of cybersecurity requirements for cloud services

This Technical Specification (TS) provides a set of cybersecurity requirements for cloud services.
This TS is applicable to organizations providing cloud services and their subservice organizations

Mehrschichtiger Ansatz für einen Anforderungskatalog für Informations-/Cybersicherheitsmaßnahmen für Cloud Dienste

Tristopenjski pristop za nabor zahtev kibernetske varnosti za storitve v oblaku

Ta tehnična specifikacija (TS) določa nabor zahtev kibernetske varnosti za storitve v oblaku.
Uporablja se za organizacije, ki zagotavljajo storitve v oblaku, in njihove podorganizacije.

General Information

Status
Published
Publication Date
23-Apr-2024
Current Stage
6060 - Definitive text made available (DAV) - Publishing
Start Date
24-Apr-2024
Due Date
19-Jun-2023
Completion Date
24-Apr-2024

Overview

CEN/TS 18026:2024 - Three-level approach for a set of cybersecurity requirements for cloud services - is a CEN Technical Specification that defines a structured set of cybersecurity requirements specifically for cloud services. Applicable to cloud service providers (CSPs) and their subservice organisations, the TS supports EU cybersecurity certification frameworks and aligns with the EU Cybersecurity Act (Regulation (EU) 2019/881). It is organized to help providers demonstrate conformance through single or composed certifications and is valid provisionally for an initial three-year period.

Key topics and technical requirements

The specification uses a consistent, theme-based structure and groups requirements into 20 categories, covering the full cloud service lifecycle. Major technical topics include:

  • Three assurance levels: Basic, Substantial and High - requirements scale in detail and rigour across levels to match service criticality.
  • Risk management: Risk assessment (RM‑01) drives selection and justification of controls; CSPs must document applicability and treatment decisions.
  • Organisation & policies: Governance, information security policies and role-based responsibilities.
  • Operational security: Capacity planning, malware protection, vulnerability handling, logging and monitoring.
  • Identity & access: Identity, authentication and access control management for multi-tenant environments.
  • Cryptography & key management: Controls for confidentiality, integrity and authenticity of data.
  • Communication security: Protecting data in transit, network controls and related safeguards.
  • Portability & interoperability: Data export, portability and secure deletion at contract end.
  • Change & configuration management: Secure change control and configuration baselines.
  • Development & procurement security: Secure software development lifecycle and supplier management.
  • Incident management & business continuity: Detection, escalation, response, recovery and continuity planning.
  • Automated monitoring: Requirements for data collection, preprocessing and automated monitoring to scale security operations.

Requirements are labelled per assurance level; Basic requirements generally form the baseline, Substantial adds constraints, and High introduces further automation, testing and monitoring expectations.

Practical applications - who should use it

  • Cloud service providers (CSPs) designing, operating or certifying cloud services.
  • Subservice organisations/suppliers that support CSPs.
  • Security architects & compliance teams mapping controls and implementing cloud security programs.
  • Certification bodies & auditors building assessment criteria aligned to EU certification frameworks.
  • Procurement and legal teams specifying security requirements in contracts with cloud providers.

This TS helps organisations justify controls via risk assessment, aggregate multiple certifications or pursue a single conformance path tailored to service criticality.

Related standards

  • ISO/IEC 27001 and ISO/IEC 27002 (information security management alignment)
  • EU Cybersecurity Act / EUCS (referenced assessment methodology)
  • Other EN/ISO standards for cloud computing and IT security

Keywords: CEN/TS 18026:2024, cloud cybersecurity requirements, cloud security standard, assurance levels, CSP, risk management, automated monitoring, ISO/IEC 27001.

Technical specification
TS CEN/CLC/TS 18026:2024
English language
180 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Frequently Asked Questions

CEN/TS 18026:2024 is a technical specification published by the European Committee for Standardization (CEN). Its full title is "Three-level approach for a set of cybersecurity requirements for cloud services". This standard covers: This Technical Specification (TS) provides a set of cybersecurity requirements for cloud services. This TS is applicable to organizations providing cloud services and their subservice organizations

This Technical Specification (TS) provides a set of cybersecurity requirements for cloud services. This TS is applicable to organizations providing cloud services and their subservice organizations

CEN/TS 18026:2024 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security; 35.210 - Cloud computing. The ICS classification helps identify the subject area and facilitates finding related standards.

CEN/TS 18026:2024 is associated with the following European legislation: EU Directives/Regulations: 2019/881. When a standard is cited in the Official Journal of the European Union, products manufactured in conformity with it benefit from a presumption of conformity with the essential requirements of the corresponding EU directive or regulation.

You can purchase CEN/TS 18026:2024 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of CEN standards.

Standards Content (Sample)


SLOVENSKI STANDARD
01-julij-2024
Tristopenjski pristop za nabor zahtev kibernetske varnosti za storitve v oblaku
Three-level approach for a set of cybersecurity requirements for cloud services
Mehrschichtiger Ansatz für einen Anforderungskatalog für
Informations-/Cybersicherheitsmaßnahmen für Cloud Dienste
Ta slovenski standard je istoveten z: CEN/TS 18026:2024
ICS:
35.030 Informacijska varnost IT Security
35.210 Računalništvo v oblaku Cloud computing
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

TECHNICAL SPECIFICATION CEN/TS 18026

SPÉCIFICATION TECHNIQUE
TECHNISCHE SPEZIFIKATION
April 2024
ICS 35.030; 35.210
English version
Three-level approach for a set of cybersecurity
requirements for cloud services
Mehrschichtiger Ansatz für einen Anforderungskatalog
für Informations-/Cybersicherheitsmaßnahmen für
Cloud Dienste
This Technical Specification (CEN/TS) was approved by CEN on 27 February 2024 for provisional application.

The period of validity of this CEN/TS is limited initially to three years. After two years the members of CEN and CENELEC will be
requested to submit their comments, particularly on the question whether the CEN/TS can be converted into a European
Standard.
CEN and CENELEC members are required to announce the existence of this CEN/TS in the same way as for an EN and to make the
CEN/TS available promptly at national level in an appropriate form. It is permissible to keep conflicting national standards in
force (in parallel to the CEN/TS) until the final decision about the possible conversion of the CEN/TS into an EN is reached.

CEN and CENELEC members are the national standards bodies and national electrotechnical committees of Austria, Belgium,
Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy,
Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of North Macedonia, Romania, Serbia,
Slovakia, Slovenia, Spain, Sweden, Switzerland, Türkiye and United Kingdom.

CEN-CENELEC Management Centre:
Rue de la Science 23, B-1040 Brussels
© 2024 CEN/CENELEC All rights of exploitation in any form and by any means
Ref. No. CEN/TS 18026:2024 E
reserved worldwide for CEN national Members and for
CENELEC Members.
CEN/CLC/TS 18026:2024 (E)
Contents Page
European foreword . 3
Introduction . 4
1 Scope . 8
2 Normative references . 8
3 Terms and definitions . 8
4 Organisation of Information Security . 35
5. Information Security Policies . 39
6. Risk management . 45
7. Human Resources . 49
8. Asset Management . 57
9. Physical Security . 63
10.     Operational Security ……………………………………………………………………… ………………………….93
11. Identity, Authentication and Access Control Management . 94
12. Cryptography and Key Management .113
13. Communication Security .117
14. Portability and Interoperability .125
15. Change and Configuration Management .128
16. Development of Information Systems .134
17. Procurement Management .144
18. Incident Management .152
19. Business Continuity .160
20. Compliance .164
21. User Documentation .168
22. Dealing with Investigation Requests from Government Agencies .172
23. Product Security .174
Bibliography .178

CEN/CLC/TS 18026:2024 (E)
European foreword
This document (CEN/CLC/TS 18026:2024) has been prepared by Technical Committee CEN/CLC /JTC 13
“Cybersecurity and Data protection”, the secretariat of which is held by DIN.
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CEN shall not be held responsible for identifying any or all such patent rights.
This document is developed to support the Cybersecurity Act, EUCSA, Regulation (EU) 2019/881 on
information and communications technology cybersecurity certification.
Any feedback and questions on this document should be directed to the users’ national standards body. A
complete listing of these bodies can be found on the CEN website.
CEN/CLC/TS 18026:2024 (E)
Introduction
General
This document presents requirements for cybersecurity of cloud services. These requirements are also
strongly related to information security. ISO 27100 states that cybersecurity is primarily concerned with
protecting entities including people, society, organisations and nations from cyber risks, while
information security addresses maintaining confidentiality, integrity and availability of information with
consequences. Information security and cybersecurity therefore have different perspectives and
concerns while they are closely related and overlapping as both address cyber threats. The requirements
primarily address the cloud service, but unavoidably also raise expectations and impose requirements on
organisations developing and operating such services.
Organisations wishing to demonstrate conformance to these requirements might prefer to do so using a
single free-standing certification or build on existing certifications held by that organisation or the cloud
service. To facilitate this, the requirements are written so as to allow coverage by composition of multiple
certifications, or a single-step complete coverage via a single certification.
In addition, the organisational requirements align closely with the requirements and controls of ISO/IEC
27001, ISO/IEC 27002 and other international schemes for cybersecurity and information security
requirements and controls. This means that organisations already holding certifications, for the
organisation or the service, can build from those prior audits and certifications. Similarly, if the
requirements of this document are the first ones ever certified for this organisation or service, the
evaluation materials will have the potential to be used to support additional certifications thereafter.
Further guidance on this issue is available in .
This document presents a set of requirements for cybersecurity of cloud services with two key concepts:
• It provides for three different assurance levels, i.e. Basic, Substantial and High: some
requirements are present at all levels, sometimes being extended at higher levels, while others
only come into effect at the higher levels; and
• A risk assessment is undertaken to determine the cloud service specific risks, taking also into
account the opportunities with the level and the cloud service specific cyber risks; risk treatment
then involves the selection of appropriate controls by the organisation to satisfy the requirements
for that level. The requirements themselves that are included in the document are mandatory for
the chosen level.
Nothing written in this document is to be taken as indicating requirements for how evaluations will be
conducted by bodies offering conformance testing for certification schemes. Requirements for bodies
offering conformance testing for certification schemes based on this document are given in .
The three assurance levels: Basic, Substantial and High offer increasing levels of assurance as to the
security of the cloud service. As this document addresses cybersecurity for cloud services, it is important
to appreciate that an information security management system (ISMS) certification alone is not sufficient
to demonstrate conformance with the requirements in this document. Nonetheless, having an ISMS will
assist the organisation in developing and operating their cloud services and in satisfying some
requirements in this document.
Assurance level Basic should be suitable for cloud services that are designed to meet typical security
requirements on services for non-critical data and systems, while Substantial targets cloud services that
are designed to meet typical security requirements on services for business-critical data and systems.
Assurance level High should be suitable for cloud services that are designed to meet specific (exceeding
level ‘substantial’) security requirements for mission-critical data and systems. Similarly, the assurance
levels are intended to be achievable for cloud services being offered to cloud service customers (CSCs)
who themselves target the indicated data and systems, and related criticality levels. The EUCS is not
intended to address the needs of national security purposes and the activities of the State in areas of
criminal law.
CEN/CLC/TS 18026:2024 (E)
Assurance levels
The requirements defined in the document are labelled Basic, Substantial or High:
• Requirements labelled Basic apply to assurance level Basic. They carry over to assurance levels
Substantial and High, unless replaced by stronger requirements;
• Requirements labelled Substantial apply to assurance level Substantial and will in some cases be
considered as guidance for level Basic (i.e., the reference method to achieve the Basic requirements,
which are often less detailed); and
• Requirements labelled High only apply to assurance level High.
Typically, the requirements corresponding to a cybersecurity objective are organized as follows:
• Basic requirements define a baseline in bold text, often with limited details or constraints;
• Substantial requirements add to that baseline further details and constraints in bold text. In addition,
specific Substantial requirements are introduced; and
• High requirements add further details or constraints in bold text. Some are also related to automated
monitoring, or to additional testing and review requirements, contributing to an increase in
confidence in the security of the service.
Certification schemes define evaluation levels as a combination of assurance components that
corresponds to an assurance level (and the requirements defined for this assurance level), and to
appropriate levels of depth and rigour in the assessment, corresponding to a category of security
problems.
Applicability of requirements
The risk assessment and risk treatment that the Cloud Service Provider (CSP) performs in accordance with
RM-01 includes the determination of controls that are needed to satisfy the requirements in this document
and to address identified risks. The implementation of controls may vary depending on the characteristics
of the certified cloud service. The CSP can design further controls or determine them from other resources
to address the results of the risk assessment, in addition to the requirements in the document. The
similarities with this document’s requirements to controls and or requirements in existing EN standards
such as the ISO 27000 series can support the fulfilment of requirements by using these documents in
addition. The CSP provides justifications for all the requirements present in this document applicable to
the cloud service and to which level of assurance. The CSP explains in the description of the cloud service
if individual Basic, Substantial, and High requirements are not applicable due to the design and
implementation of the cloud service and how these requirements are addressed in other ways. Based on
the information provided by the CSP, conformity assessment will be conducted to cover the scope for
certification of the cloud service for the actual assurance level, as defined in the assessment methodology
.
Automated monitoring
The requirements related to “automated monitoring” or “monitor with automation“, are about gathering
and pre-processing data by non-human means. Automated monitoring should be distinguished from
continuous monitoring. The latter refers to monitoring for an enduring period of time that can be applied
both with or without automation. The introduction of automated monitoring requirements is intended to
utilize the available technology, and to manage the complexity of security monitoring of cloud services,
since standards focus on outcomes (i.e. "what" shall be achieved) there will be limited references to
methods (i.e. "how" it shall be achieved) except in instances where automated monitoring requirements
are specifically needed. For instance, automated monitoring will be required for processing, logging and
CEN/CLC/TS 18026:2024 (E)
storing large amounts of data to increase the efficiency of business processes and the cybersecurity of
cloud services.
Structure of the document
This document presents twenty categories of requirements, each category is divided into themes. Each
theme is structured as follows:
• A cybersecurity objective that the requirements aim to achieve.
• Requirements to be satisfied in the context of the cybersecurity objective with each requirement
associated to an assurance level.
• The requirements within a single theme have to be read as a flow.
There are many cross-references between requirements and themes. For instance, the ISP-02 theme,
which defines how policies and procedures are to be defined, is referenced many times.
The categories, and their intended purposes, are (with their clause numbers):
4. Organisation of Information Security

Plan, implement, maintain and continuously improve the information security framework
applicable to the cloud service.
5. Information Security Policies

Provide an information security policy, derived into topic-specific policies and procedures
regarding security of the cloud service to support business requirements.
6. Risk Management
Provide a risk management framework, to manage the risks associated to the cloud service, from
identification to treatment.
7. Human Resources
Ensure that personnel understand their responsibilities based on job role descriptions, are aware
of their responsibilities with regard to information security, and that the assets that are used to
provide the cloud service are protected in the event of changes in responsibilities or termination.
8. Asset Management
Identify the assets that are used to provide the cloud service and ensure an appropriate level of
protection throughout their lifecycle.
9. Physical Security
Prevent unauthorised physical access and protect against theft, damage, loss and outage of
operations.
10. Operational Security
Ensure proper and regular operation, including appropriate measures for planning and
monitoring capacity, protection against malware, logging and monitoring events, and dealing with
vulnerabilities, malfunctions and failures.
11. Identity, Authentication and Access Control Management
Limit access to information and information processing facilities.
12. Cryptography and Key Management
Ensure appropriate and effective use of cryptography to protect the confidentiality, authenticity
or integrity of information.
CEN/CLC/TS 18026:2024 (E)
13. Communication Security
Ensure the protection of information in networks and the corresponding information processing
systems.
14. Portability and Interoperability
Enable the ability to access the cloud service via other cloud services or IT systems of the CSCs, to
obtain the stored data at the end of the contractual relationship and to securely delete it from the
cloud service.
15. Change and Configuration Management
Ensure that changes and configuration actions to information systems guarantee the security of
the delivered cloud service.
16. Development of Information Systems
Ensure information security in the development cycle of information systems.
17. Procurement Management
Ensure the protection of information that suppliers related to the cloud service can access and
monitor the agreed services and security requirements.
18. Incident Management
Ensure a consistent and comprehensive approach to the capture, assessment, communication and
escalation of information security incidents related to the cloud service.
19. Business Continuity
Plan, implement, maintain and test procedures and measures for business continuity and
emergency management for the cloud service.
20. Compliance
Avoid non-compliance with legal, regulatory and contractual information security and compliance
requirements related to the cloud service.
21. User Documentation
Provide up-to-date information on the secure configuration and known vulnerabilities of the
cloud service for CSCs.
22. Dealing with Investigation Requests from Government Agencies
Ensure appropriate handling of government investigation requests for legal review, information
to CSCs, and limitation of access to or disclosure of data.
23. Product Security
Provide appropriate cybersecurity mechanisms and controls in cloud services and the underlying
infrastructure, products and components relied upon by the CSCs.

CEN/CLC/TS 18026:2024 (E)
1. Scope
This document provides a set of cybersecurity requirements for cloud services.
This document is applicable to organisations providing cloud services and their subservice organisations.
2. Normative references
There are no normative references in this document.
3. Terms and definitions
For the purposes of this document, the following terms and definitions apply.
ISO and IEC maintain terminological databases for use in standardization at the following addresses:
• IEC Electropedia: available at https://www.electropedia.org/
• ISO Online browsing platform: available at https://www.iso.org/obp
3.1
access control
means to ensure that physical and logical access to assets is authorised and restricted based on business
and information security requirements
[SOURCE: ISO/IEC 27002:2022, 3.1.1]
3.2
access right
permission for a subject to access a particular object for a specific type of operation
[SOURCE: ISO/IEC 2382:2015, 2126298]
3.3
account data
class of data specific to each cloud service customer that is required to administer the cloud service
Note 1 to entry: Account data is typically generated when a cloud service is purchased and is under the control of the
cloud service provider.
Note 2 to entry: Account data consists of data elements provided by the cloud service customer, such as; name,
address, telephone, etc.
[SOURCE: ISO/IEC 22123-1:2023(en), 3.9.4]
3.4
activity
specified pursuit or set of tasks
[SOURCE: ISO/IEC 22123-1:2023(en), 3.3.8]
CEN/CLC/TS 18026:2024 (E)
3.5
administration actions
set of actions for installing, deleting, modifying and consulting the configuration of a system participating
in the service’s information system and likely to modify its operation or security
[SOURCE: SecNumCloud Version 3.2, paragraph 1.3.2. Definitions (March 8, 2022)]
3.6
anonymization
process by which personally identifiable information (PII) is irreversibly altered in such a way that a PII
principal can no longer be identified directly or indirectly, either by the PII controller alone or in
collaboration with any other party
[SOURCE: ISO/IEC 29100:2011(en), 2.2]
3.7
application capabilities type
cloud capabilities type in which the cloud service customer can use the cloud service provider's
applications
[SOURCE: ISO/IEC 22123-1:2023(en), 3.5.2]
3.8
appropriate level of management
person or group of persons to whom top management has delegated a task or responsibility with the
required mandate and authority
Note 1 to entry: In security controls, the appropriate level of management would typically be responsible for topic-
specific policies and procedures.
3.9
asset
anything that has value to the organization
Note 1 to entry: In the context of information security, two kinds of assets can be distinguished:
— the primary assets:
— information;
— business processes and activities;
— the supporting assets (on which the primary assets rely) of all types, for example:
— hardware;
— software;
— network;
— personnel;
— site;
— organization’s structure.
[SOURCE: ISO/IEC 27002:2022(en), 3.1.2]
CEN/CLC/TS 18026:2024 (E)
3.10
asset life
period from asset creation to asset end-of-life
[SOURCE: ISO 55000:2014(en), 3.2.2]
3.11
assurance
grounds for justified confidence that a product, service or process meets specified requirements
[SOURCES: Adapted from ISO/IEC 15408-1:2022(en), 3.6 and ISO/IEC/IEEE 15026-1(2019):3.1]
3.12
assurance information
information including a claim about a system, evidence supporting the claim, an argument showing how
the evidence supports the achievement of the claim, and the context for these items
[SOURCE: ISO/IEC/IEEE 15026-1(2019):3.4]
3.13
assurance level
basis for confidence that an ICT product, ICT service or ICT process meets the security requirements of a
specific European cybersecurity certification scheme, indicates the level at which an ICT product, ICT
service or ICT process has been evaluated but as such does not measure the security of the ICT product,
ICT service or ICT process concerned
Note 1 to entry: The definition is identical to article 2.21 of the European Cybersecurity Act (EC 881/2019) (EUCSA).
The EUCSA defines three assurance levels, ‘basic’, ‘substantial’ and ‘high’, and each scheme defines discrete evaluation
levels, each one defining a degree of confidence in the fulfilment of the scheme’s objectives by the ICT product, ICT
service, or ICT process; each evaluation is mapped to one of the three assurance levels defined in the EUCSA.
3.14
attestation
issue of a statement, based on a decision, that fulfilment of specified requirements has been demonstrated
Note 1 to entry: The resulting statement is intended to convey the assurance that the specified requirements have
been fulfilled. Such an assurance does not, of itself, afford contractual or other legal guarantees.
Note 2 to entry: First-party attestation and third-party attestation are distinguished by the terms declaration,
certification, and accreditation, but there is no corresponding term applicable to second-party attestation.
[SOURCE: ISO/IEC 17000:2020(en), 7.3]
CEN/CLC/TS 18026:2024 (E)
3.15
audit
process for obtaining relevant information about an object of conformity assessment and evaluating it
objectively to determine the extent to which specified requirements are fulfilled
Note 1 to entry: The specified requirements are defined prior to performing an audit so that the relevant information
can be obtained.
Note 2 to entry: Examples of objects for an audit are management systems, processes, products and services.
Note 3 to entry: For accreditation purposes, the audit process is called “assessment”.
[SOURCE: ISO/IEC 17000:2020(en), 6.4]
3.16
audit plan
description of the activities and arrangements for an audit
[SOURCE: ISO 19011:2018(en), 3.6]
3.17
audit programme
arrangements for a set of one or more audits planned for a specific time frame and directed towards a
specific purpose
[SOURCE: ISO 19011:2018(en), 3. 4]
3.18
auditor
person who conducts an audit
Note 1 to entry: In the schemes and related documents, 'the auditor' is typically used as the subject of requirements
related to audit of the form "the auditor shall.".
[SOURCE: ISO/IEC 17021-1:2015(en), 3.6]
3.19
authenticity
property that an entity is what it claims to be
[SOURCE: ISO/IEC 27000:2018(en), 3.6]
3.20
automated monitoring, monitor with automation
gathering and pre-processing of data to analyse some aspects of the activity being monitored at discrete
intervals at a sufficient frequency by non-human means
Note 1 to entry: Automated monitoring and monitor with automation have the same meaning in this document
CEN/CLC/TS 18026:2024 (E)
3.21
business continuity
capability of an organization to continue the delivery of products and services within acceptable time
frames at predefined capacity during a disruption
[SOURCE: ISO 22301:2019(en), 3.3]
3.22
business continuity plan
documented information that guides an organization to respond to a disruption and resume, recover and
restore the delivery of products and services consistent with its business continuity objectives
[SOURCE: ISO 22301:2019(en), 3.4]
3.23
business impact analysis
process of analysing the impact over time of a disruption on the organization
Note 1 to entry: The outcome is a statement and justification of business continuity requirements.
[SOURCE: ISO 22301:2019(en), 3.5]
3.24
capacity management
process for monitoring, analysis, reporting and improvement of capacity
[SOURCE: ISO/IEC TS 22237-7:2018(en), 3.1.2]
3.25
certification
third-party attestation related to an object of conformity assessment, with the exception of accreditation
[SOURCE: ISO/IEC 17000:2020(en), 7.6]
3.26
certification scheme
conformity assessment scheme that includes a certification activity
Note 1 to entry: In a certification scheme, a successful assessment leads to the issuance of a certificate.
3.27
certified cloud service
cloud service that has been awarded a currently valid certificate covering requirements defined in the
present document, and that still fulfils these requirements
Note 1 to entry: This is a restrictive definition in use solely in the EUCS scheme.
CEN/CLC/TS 18026:2024 (E)
3.28
change management
process for recording, coordination, approval and monitoring of all changes
[SOURCE: ISO/IEC TS 22237-7:2018(en), 3.1.3]
3.29
characteristic
distinguishing feature
Note 1 to entry: A characteristic can be inherent or assigned.
Note 2 to entry: A characteristic can be qualitative or quantitative.
[SOURCE: ISO 9000:2015(en), 3.10.1]
3.30
claim
statement of something to be true including associated conditions and limitations
Note 1 to entry: The statement of a claim does not mean that the only possible intent or desire is to show it is true.
Sometimes claims are made for the purpose of evaluating whether they are true or false or undertaking an effort to
establish what is true.
Note 2 to entry: In its entirety, a claim conforming to ISO/IEC 15026-2 is an unambiguous declaration of an assertion
with any associated conditionality giving explicit details including limitations on values and uncertainty. It could be
about the future, present, or past.
[SOURCE: ISO/IEC 15026-1:2010(en), 2.4]
3.31
cloud capabilities type
classification of the functionality provided by a cloud service to the cloud service customer, based on
resources used
Note 1 to entry: The cloud capabilities types are application capabilities type, infrastructure capabilities type and
platform capabilities type.
[SOURCE: ISO/IEC 22123-1:2023(en), 3.5.1]
3.32
cloud computing
paradigm for enabling network access to a scalable and elastic pool of shareable physical or virtual
resources with self-service provisioning and administration on-demand
Note 1 to entry: Examples of resources include servers, operating systems, networks, software, applications, and
storage equipment.
Note 2 to entry: Self-service provisioning refers to the provisioning of resources provided to cloud services performed
by cloud service customers through automated means.
[SOURCE: ISO/IEC 22123-1:2023(en), 3.1.1]
CEN/CLC/TS 18026:2024 (E)
3.33
cloud service
one or more capabilities offered via cloud computing invoked using a defined interface
[SOURCE: ISO/IEC 22123-1:2023(en), 3.1.2]
3.34
cloud service customer
CSC
party that is acting in a cloud service customer role
[SOURCE: ISO/IEC 22123-1:2023(en), 3.3.2]
3.35
cloud service customer data
class of data objects under the control, by legal or other reasons, of the cloud service customer that were
input to the cloud service, or resulted from exercising the capabilities of the cloud service by or on behalf
of the cloud service customer via the published interface of the cloud service
Note 1 to entry: An example of legal controls is copyright.
Note 2 to entry: It can be that the cloud service contains or operates on data that is not cloud service customer data;
this might be data made available by the cloud service providers, or obtained from another source, or it can be
publicly available data. However, any output data produced by the actions of the cloud service customer using the
capabilities of the cloud service on this data is likely to be cloud service customer data, following the general
principles of copyright, unless there are specific provisions in the cloud service agreement to the contrary.
[SOURCE: ISO/IEC 22123-1:2023(en), 3.9.1]
3.36
cloud service customer role
CSC role
set of activities for the purpose of using cloud services
[SOURCE: ISO/IEC 22123-1:2023(en), 3.3.14]
3.37
cloud service derived data
class of data objects, specific to the operation of the cloud service, under the control of the cloud service
provider
Note 1 to entry: Cloud service provider data includes but is not limited to resource configuration and utilization
information, cloud service specific virtual machine, storage and network resource allocations, overall data centre
configuration and utilization, physical and virtual resource failure rates, operational costs and so on.
[SOURCE: ISO/IEC 22123-1:2023(en), 3.9.2]
CEN/CLC/TS 18026:2024 (E)
3.38
cloud service provider
CSP
party that is acting in a cloud service provider role
[SOURCE: ISO/IEC 22123-1:2023(en), 3.3.3]
3.39
cloud service provider data
class of data objects, specific to the operation of the cloud service, under the control of the cloud service
provider
Note 1 to entry: Cloud service provider data includes but is not limited to resource configuration and utilization
information, cloud service specific virtual machine, storage and network resource allocations, overall data centre
configuration and utilization, physical and virtual resource failure rates, operational costs and so on.
[SOURCE: ISO/IEC 22123-1:2023(en), 3.9.3]
3.40
cloud service provider role
CSP role
set of activities that make cloud services available
[SOURCE: ISO/IEC 22123-1:2023(en), 3.3.15]
3.41
cloud service user
CSU
natural person, or entity acting on their behalf, associated with a cloud service customer that uses cloud
services
Note 1 to entry: Examples of such entities include devices and applications.
[SOURCE: ISO/IEC 22123-1:2023(en), 3.3.4]
3.42
competence
ability to apply knowledge and skills to achieve intended results
[SOURCE: ISO/IEC 17021-1:2015(en), 3.7]
CEN/CLC/TS 18026:2024 (E)
3.43
compliance
conformity in the context of the rules and requirements defined in a certification scheme that apply to the
provider of the certified product, service or process
Note 1 to entry: This is a refinement of ISO19011, which defines compliance as conformity in the context of a statutory
requirement or regulatory requirement. In this case, compliance is conformity in the context of a given scheme.
Note 2 to entry: The term is used to differentiate between compliance of a cloud service provider to the requirements
defined in the scheme and conformity of a cloud service to the requirements on controls defined in the scheme.
[SOURCE: Adapted from ISO 19011:2018(en), 3.7]
3.44
composition
reuse of the results of certification activities of a certified cloud service in the evaluation of a primary cloud
service using that certified cloud service as secondary cloud service
3.45
compromise
loss of confidentiality, integrity, or availability of information, including any resultant impairment of (1)
processing integrity or availability of systems or (2) the integrity or availability of system inputs or outputs
3.46
configuration management
management activity that applies technical and administrative direction over the life cycle of a product
and service, its configuration identification and status, and related product and service configuration
information
[SOURCE: ISO/IEC ISO 10007:2017(en), Introduction]
3.47
conformity
fulfilment of a requirement
Note 1 to entry: when used in opposition with compliance, conformity relates to the requirements related to the object
of conformity assessment rather than to the requirements related to the certification scheme.
[SOURCE: ISO/IEC 19011:2018(en), 3.20]
3.48
conformity assessment
demonstration that specified requirements are fulfilled
Note 1 to entry: The process of conformity assessment […] can have a negative outcome, i.e. demonstrating that the
specified requirements are not fulfilled.
Note2 to entry: The subject field of conformity assessment includes selection activities, determination activities such
as testing, inspection and audit, review activities, and attestation activities such as certification, as well as the
accreditation of conformity assessment bodies.
Note 3 to entry: [ISO/IEC 17000] does not include a definition of “conformity”. “Conformity” does not feature in the
definition of “conformity assessment”. Nor does [ISO/IEC 17000] address the concept of compliance.
CEN/CLC/TS 18026:2024 (E)
Note 4 to entry: The definition is similar to article 2.17 of the EUCSA that refers to “conformity assessment’ as the
process demonstrating whether specified requirements relating to a product, process, service, system, person or body
have been fulfilled.
[SOURCE: ISO/IEC 17000:2020(en), 4.1, some modifications in notes]
3.49
conformity assessment body
body that performs conformity assessment activities, excluding accreditation
Note 1 to entry: The definition is similar to article 2.18 of the EUCSA that refers to “conformity assessment body’ as a
body that performs conformity assessment activities including calibration, testing, certification and inspection.
[SOURCE: ISO/IEC 17000:2020(en), 4.6]
3.50
conformity assessment scheme
conformity assessment programme
set of rules and procedures that describes the objects of conformity assessment, identifies the specified
requirements and provides the methodology for performing conformity assessment
Note 1 to entry: A conformity assessment scheme can be managed within a conformity assessment system.
Note 2 to entry: A conformity assessment scheme can be operated at an international, regional, national sub-national,
or industry sector level.
Note 3 to entry: A scheme can cover all or part of the conformity assessment functions.
[SOURCE: ISO/IEC 17000:2020(en), 4.9]
3.51
control
measure that maintains and/or modifies risk
Note 1 to entry: Controls include, but are not limited to, any process, policy, device, practice or other conditions
and/or actions which maintain and/or modify risk.
Note 2 to entry: Controls may not always exert the intended or assumed modifying effect.
[SOURCE: ISO 31000:2018, 3.8 / ISO/IEC 27002:2022(en), 3.1.8]
3.52
credential
representation of an identity
Note 1 to entry: A credential is typically made to facilitate data authentication of the identity information in the
identity it represents.
Note 2 to entry: The identity information represented by a credential can be printed on paper or stored within a
physical token that typically has been prepared in a manner to assert the information as valid.
EXAMPLE: A credential can be a username, a username with a password, a PIN, a smartcard, a token, a fingerprint, a
passport, etc.
[SOURCE: ISO/IEC 24760‑1:2011, 3.3.5]
CEN/CLC/TS 18026:2024 (E)
3.53
criteria
rules on which a judgment or decision can be based, or by which a product, service, result, or process
(3.1.20) can be evaluated
[SOURCE: ISO/IEC/IEEE 15289:2019(en), 3.1.6]
3.54
cyber risk
risk caused by cyber threat
Note 1 to entry: Cyber risks include risks associated with the loss of confidentiality, integrity and availability of
information
[SOURCE: ISO/IEC 27102:2019(en), 3.4 and note added for clarification]
3.55
cybersecurity
activities necessary to protect network and information systems, the users of such systems, and other
persons affected by cyber threats
Note 1 to entry: The definition is identical to article 2.1 of the EUCSA.
3.56
Cybersecurity Act, EUCSA
Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the
European Union Agency for Cybersecurity) and on information and communications technology
cybersecurity certification and repealing Regulation (EU) No 526/2013
3.57
cyber threat
potential circumstance, event or action that could damage, disrupt or otherwise adversely impact
network and information systems, the users of such systems and other persons
Note 1 to entry: The definition is identical to article 2.8 of the EUCSA.
3.58
data at rest
structure, or group of structures, dedicated to the centralized accommodation, interconnection and
operation of information technology and network telecommunications equipment providing data storage,
processing and transport services together with all the facilities and infrastructures for power distribution
and environmental control together with the necessary levels of resilience and security required to provide
the desired service availability
Note 1 to entry: A structure can consist of multiple buildings and/or spaces with specific functions to support the
primary function.
Note 2 to entry: The boundaries of the structure or space considered the data centre, which includes the information
and communication technology equipment and supporting environmental controls, can be defined within a larger
structure or building.
[SOURCE: ISO/IEC 30134-1:2016(en), 3.6]
CEN/CLC/TS 18026:2024 (E)
3.59
data centre
location hosting CSP infrastructure or the equipment from which the cloud service operates
3.60
data in motion
data being transferred from one location to another
Note 1 to entry: These transfers typically involve interfaces that are accessible and do not include internal transfers
(i.e., never exposed to outside of an interface, chip, or device).
[SOURCE: ISO/IEC 27040:2015(en), 3.8]
3.61
de-identification process
process of removing the association between a set of identifying attributes and the data principal
[SOURCE : ISO/IEC 20889:2018(en), 3.6]
3.62
demilitarized zone
DMZ
perimeter network (also known as a screened sub-net) inserted as a “neutral zone” between networks
[SOURCE: ISO/IEC 27033-1:2015(en), 3.8]
3.63
development environment
environment in which changes to software are developed
Note 1 to entry: The environment may be local to an individual developer’s workstation or distributed, possibly based
on external services.
3.64
disruption
incident, whether anticipated or unanticipated, that causes an unplanned, negative deviation from the
expected delivery of products and services according to an organization’s objectives
[SOURCE: ISO 22301:2019(en), 3.10]
3.65
document
recorded information or material object, which can be treated as a unit
[SOURCE: ISO 5127:2001, 1.2.02]
3.66
effectiveness
extent to which planned activities are realized and planned results achieved
[SOURCE: ISO Supplement:3.6]
CEN/CLC/TS 18026:2024 (E)
3.67
employee
a person under contract with the CSP to whom human resource management controls apply
3.68
evaluation
combination of the selection and determination functions of conformity assessment activities
[SOURCE: ISO/IEC 17065:2012(en), 3.3]
3.69
evaluation level
combination of assurance components within an evaluation methodology that corresponds to an assurance
level and appropriate level of depth and rigour, corresponding to a category of security problems
Note 1 to entry: The definition is identical to article 52.8 of the EUCSA.
3.70
feature
abstract functional characteristic of a system of interest that end-users and other stakeholders can
understand
Note 1 to entry: In systems engineering, features are syntheses of the needs of stakeholders. These features will be
used, amongst others, to build the technical requirement baselines.
[SOURCE: ISO/IEC 26550:2015(en), 3.14]
3.71
functional component
functional building block needed to engage in an activity, backed by an implementation
[SOURCE: ISO/IEC 22123-1:2023(e
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...

Die technische Spezifikation CEN/TS 18026:2024 bietet einen umfassenden Ansatz zur Festlegung von Cybersecurity-Anforderungen für Cloud-Dienste. Der Schwerpunkt dieser Norm liegt auf einem dreistufigen Ansatz, der es Organisationen ermöglicht, ihre Sicherheitspraktiken effektiv zu standardisieren und zu optimieren. Die Norm ist speziell an Organisationen gerichtet, die Cloud-Dienste anbieten, und deren Subdienstleistungsunternehmen. Dies stellt sicher, dass alle Ebenen der Dienstleistungserbringung, unabhängig von der Größe oder dem Umfang, die gleichen grundlegenden Sicherheitsanforderungen erfüllen können, was die Verbraucher- und Geschäftssicherheit erheblich erhöht. Ein markantes Merkmal der CEN/TS 18026:2024 ist ihre pragmatische Struktur, die sowohl für kleine Unternehmen als auch für große Unternehmen Anwendung findet. Die Stufen des Ansatzes ermöglichen es den Organisationen, ihre spezifischen Risiken und Bedürfnisse zu bewerten und geeignete Sicherheitsmaßnahmen einzuführen. Diese Flexibilität spricht die unterschiedlichsten Akteure im Cloud-Sektor an und fördert eine breite Akzeptanz der Norm. Darüber hinaus berücksichtigt die Norm aktuelle Entwicklungen und Bedrohungen im Bereich der Cybersecurity, was sie besonders relevant und zeitgemäß macht. Die Anleitung zur Implementierung und die klar definierten Anforderungen erleichtern es Organisationen, ihre Cybersecurity-Strategien proaktiv weiterzuentwickeln und anzupassen. Insgesamt ist die CEN/TS 18026:2024 eine äußerst nützliche Norm, die nicht nur zur Erhöhung der Sicherheit von Cloud-Diensten beiträgt, sondern auch ein wichtiges Instrument zur Förderung von Best Practices innerhalb der Branche darstellt.

CEN/TS 18026:2024は、クラウドサービスに対するサイバーセキュリティ要件の三層アプローチを定めた技術仕様であり、その範囲はクラウドサービスを提供する組織およびその下位サービス組織に適用されます。この標準は、クラウド環境におけるサイバーセキュリティの重要性を反映しており、特にデジタル化が進む現代において、ユーザーのデータ保護とサービスの信頼性を確保するための基準を提供します。 CEN/TS 18026:2024の強みは、三層のアプローチを採用している点にあります。このアプローチにより、組織はサイバーセキュリティ要件を段階的に実施しやすく、また具体的なリスクに応じた適切な対策を講じることが可能です。この柔軟性は、異なる規模や業種のクラウドサービスプロバイダーにとって、大きな利点となります。 さらに、この標準は、情報セキュリティの国際基準や規格との整合性を重視しており、グローバルに展開する組織でも適用しやすい構造となっています。そのため、企業はCEN/TS 18026:2024を活用することで、国際的な競争力を高め、顧客からの信頼を獲得することができます。 このように、CEN/TS 18026:2024は、クラウドサービスの提供者が遵守すべきサイバーセキュリティ要件を包括的に網羅しており、その意義と実用性は高く評価されています。この標準の導入は、組織のセキュリティ体制の強化に直結し、業界全体のサイバーセキュリティの向上に寄与するものといえるでしょう。

La norme CEN/TS 18026:2024, intitulée "Approche en trois niveaux pour un ensemble d'exigences de cybersécurité pour les services cloud", constitue un document technique essentiel pour les organisations offrant des services cloud et leurs organisations sous-traitantes. Ce document définit un ensemble d'exigences de cybersécurité spécifiquement adapté au contexte des services basés sur le cloud, ce qui témoigne de sa pertinence dans un environnement numérique en constante évolution. Un des points forts de cette norme est son approche en trois niveaux, qui permet aux entreprises d’adopter une méthode graduale et flexible lors de la mise en œuvre des exigences de cybersécurité. Cette classification par niveaux aide non seulement à clarifier les priorités, mais aussi à adapter les mesures de sécurité au profil et aux besoins spécifiques de chaque organisation. En facilitant la compréhension et la mise en œuvre des exigences, la norme CEN/TS 18026:2024 contribue à renforcer la sécurité globale des services cloud. De plus, la norme est pertinente pour un large éventail d'acteurs du secteur. Que ce soit pour les petits fournisseurs de cloud ou pour les grandes entreprises, les exigences énoncées dans cette spécification technique permettent de garantir un meilleur niveau de sécurité tout en prenant en compte les différentes structures organisationnelles et les modèles commerciaux divers. Cette adaptabilité renforce l'importance de CEN/TS 18026:2024 dans le cadre des opérations cloud, surtout face aux menaces de cybersécurité croissantes. En somme, la norme CEN/TS 18026:2024 s’avère cruciale pour les organisations qui souhaitent se conformer aux exigences de cybersécurité dans un paysage numérique complexe, tout en garantissant la protection des données et la confiance des utilisateurs dans les services cloud.

The CEN/TS 18026:2024 document presents a comprehensive and structured approach to addressing cybersecurity requirements for cloud services through a three-level framework. This Technical Specification serves as a crucial guideline for organizations that provide cloud services, ensuring that both primary service providers and their subservice organizations adhere to standardized security practices. One of the key strengths of the CEN/TS 18026:2024 is its well-defined scope, which not only outlines the cybersecurity requirements but also emphasizes the importance of a layered approach to security. This three-level approach allows organizations to implement measures that are proportionate to the risk, enhancing the overall security posture of cloud services. By categorizing requirements into levels, it provides flexibility for organizations of varying sizes and capabilities, making it relevant for a wide range of stakeholders in the cloud services sector. Moreover, the standard addresses the growing demand for reliable and secure cloud services in an increasingly digitized world. With cyber threats evolving rapidly, this Technical Specification is timely and relevant, offering a robust framework that organizations can adopt to manage risks effectively. The comprehensive coverage of cybersecurity concerns ensures that service providers can safeguard sensitive data and maintain trust with their clients. In summary, the CEN/TS 18026:2024 offers a pertinent and actionable set of cybersecurity requirements specifically designed for cloud services, enhancing the resilience of organizations against potential cyber threats while allowing for scalability based on individual organizational needs.

CEN/TS 18026:2024는 클라우드 서비스에 대한 사이버 보안 요구 사항의 3단계 접근 방식을 제시하는 기술 사양으로, 클라우드 서비스를 제공하는 조직 및 그 하위 서비스 조직에 적용됩니다. 이 표준은 클라우드 서비스의 사이버 보안 요구 사항을 명확하게 명시하며, 디지털 환경에서의 보안 강화를 위한 필수 기준을 제공합니다. 이 표준의 주요 강점 중 하나는 세분화된 접근 방식입니다. 세 가지 수준으로 요구 사항을 분류함으로써, 각 조직이 자신들의 특정 요구 사항과 위험 프로파일에 맞춰 적절한 보안 조치를 선택할 수 있도록 지원합니다. 이러한 구조적 접근은 클라우드 서비스 제공자가 보다 체계적으로 보안 전략을 설계하고 구현하는 데 도움을 줍니다. 또한, CEN/TS 18026:2024는 클라우드 보안의 최신 동향과 기술 발전을 반영하고 있어, 조직들이 진화하는 사이버 위협에 효과적으로 대응할 수 있는 기반을 마련합니다. 이 표준은 모든 클라우드 서비스 제공 업체가 사이버 보안 요구 사항을 준수하도록 하여, 신뢰할 수 있는 클라우드 환경을 조성하는 데 중요한 역할을 합니다. 결론적으로, CEN/TS 18026:2024는 클라우드 서비스에 필요한 사이버 보안 패러다임을 제시하는 중요한 문서로, 조직들이 보안 요구 사항을 명확히 이해하고 이를 체계적으로 적용할 수 있게 도와줍니다. 이는 클라우드 서비스의 안전성과 신뢰성을 높이는 데 기여할 것입니다.