IVS-06: Are applications and infrastructures designed, developed, deployed, and configured
such that CSP and CSC (tenant) user access and intra-tenant access is appropriately
segmented, segregated, monitored, and restricted from other tenants?
The following should be considered for control implementation: a. Established policies, procedures, and best-practices b. Possible definitions of segmentation should range from “total isolation” to “partial logical separation of business-critical assets and/or personal data/sensitive user data, and sessions”. c. Compliance with legal, statutory, and regulatory compliance obligations in-scope for particular use-cases or scenarios
Workloads between tenants and business lines should be segmented per the least privilege concept to reduce the attack surface. In addition, workload tagging, resource names, and identification should be used for workloads.
Control implemented
Control ownership
Description
Design, develop, deploy and configure applications and infrastructures
such that CSP and CSC (tenant) user access and intra-tenant access is appropriately
segmented and segregated, monitored and restricted from other tenants.