COMPLIANCE STANDARDS FOR HOSTING
US Cloud is committed to providing Cloud Solutions that comply with the mandates, standards and acts set forth to regulate and protect the industries that host with us.
We are ready to take on the burden of your IT compliance
Many of these standards require audits and reviews from outside parties to ensure the
privacy and safety of your data. Regardless of your industry, you can be sure that US Cloud
upholds the highest standards and fulfills all requirements necessary for you to confidently
host your data with us.
Bar Codes & Labeling
US Cloud Compliances
US Cloud Tier III
Why is the Tier III Data Center Standard important?
- The Tier III standard is known for its impressive ability to comply with small to large businesses.
- Meets or exceeds all Tier 1 and Tier 2 requirements.
- Multiple independent distribution paths serving the IT equipment.
- Dual-powered, fully compatible IT equipment.
- Expected availability of at least 99.982%
SSAE18 Type 2 SOC 2 Certified Data Centers
Why is SSAE18 Type 2 SOC 2 Important to You?
- Anyone who is concerned about data security should trust only SSAE18 Type 2 SOC 2 Certified Hosting Providers like US Cloud.
- Demonstrates the establishment of control objectives and effectively designed control activities
- If you are part of a publicly traded company that must comply with Sarbanes-Oxley or HIPAA compliances, you are required to obtain this audit report.
- This third party perception provides instant credibility and differentiates from the competition
- Provides reassurance that your data is being handled by service professionals that have a clearly defined and secure process for data eradication
Sarbanes Oxley Compliance
Why is Sarbanes Oxley Compliance important?
- SOX Compliance is a costly burden for large corporations and public auditors.
- US Cloud removes this compliance burden from your data management team.
- You gain a better understanding of control design and operating effectiveness.
- It’s easier to discover duplicate controls that must be eliminated.
- SOX combats fraud, improves reliability of financial reporting and restores investor confidence.
National Institute of Standards and Technology (NIST)
“The National Institute of Standards and Technology (NIST) is a non-regulatory federal agency under the Department of Commerce. It is the National Measurement Institute for the United States. The NIST’s mission is to support and develop measurement standards and technology in order to improve efficiency, facilitate trade, and enhance the quality of life.”
Why is NIST Compliance important?
- Data Centers are measured by their infrastructure and deployment of IT and applications.
- NIST works in collaboration with government, industry and standards bodies to boost the adoption of cloud computing by the federal government.
- NIST develops standards that ensure the conformity and enhance the quality of products.
- These NIST standards support interoperability, portability and security requirements
- Meeting NIST compliance standards is just another way that US Cloud provides a trusted hosting experience for our customers.
PCI Compliant Hosting
Why is PCI Compliance important?
- Secures any organization handling cardholder information for the major debit, credit, prepaid, e-purse, ATM and POS cards.
- Information security is pivotal for any business, specifically when dealing with ecommerce.
- Compliance fosters trust and confidence in doing business with sensitive payment card information
- US Cloud’s various hosting solutions are PCI compliant-ready so there is no question that your customer’s information is safe with you, and your business is safe with US Cloud.
IPv6 Compliant Hosting
Why is IPv6 Compliance important?
- It follows a recent Government mandate for all Government external facing sites.
- US Cloud is IPv6 compliant with dual stack capabilities, offering both IPv4 and IPv6.
- With 4.8×1028 addresses per person, IPv6 provides enough addresses to never run out.
HIPAA Compliant Hosting
Why is HIPAA Compliance important?
- HIPAA regulations protect healthcare patients and their information and coverage.
- This compliance benefits the environment by reducing paper in the industry.
- This standardizes all healthcare data and helps coordinate insurance benefits and payments.
- HIPAA helps eliminate health plan-specific reporting and filing requirements for hospitals.
- HIPAA compliance hosting places administrative, physical and technical safeguards around your data.
FDA Part 11 Compliance
Why is FDA Part 11 Compliance important?
- These requirements make organizations trustworthy and reliable.
- Compliant records and signatures can be treated the same as paper documents.
- Businesses can substitute paper records and handwritten documents with electronic records and electronic signatures to improve efficiency.
- Compliant documents benefit from user/time stamping of records.
Cloud Security Alliance
- Not-for-profit association, launched in April 2009
- Issued the first comprehensive best practices for secure cloud computing, “Security Guidance for Critical Areas of Focus for Cloud Computing”
- Created the first and only user credential for cloud security, the Certificate of Cloud Security Knowledge (CCSK), named the top cloud computing certification by CIO.com only three years after its introduction
- Created and maintains the Cloud Controls Matrix (CCM), the world’s only meta-framework of cloud-specific security controls, mapped to leading standards, best practices and regulations
- Maintains a registry of cloud provider security practices, the CSA Security, Trust and Assurance Registry (STAR), and offers certification and attestation
International Traffic in Arms Regulations (ITAR)
ITAR stipulates that regulated technical data – regardless of its form – may be used solely by U.S. persons employed by the U.S. government or a U.S. company. A U.S. person is defined as a U.S. citizen, permanent resident, political asylee, government agency, or corporation. Furthermore, all U.S. companies that manufacture, export, or handle data for items on the USML are required to register with the government and obtain prior authorization to export USML items to a foreign person or government. They must also obtain a specific license exemption to export the data to a U.S. person located outside the U.S., such as to share it with a U.S. employee stationed in another country.
There are several types of export authorizations:
Technical data pertaining to items on the USML is considered to be regulated. Data that is covered under ITAR generally pertains to the design, development, production, manufacture, assembly, operation, repair, testing, maintenance, or modification of defense articles. The law also regulates software that includes system functional design, logic flow, algorithms, application programs, operating systems and support software for design, implementation, test operation, diagnostics, and repair.
EU Privacy Shield
The EU-U.S. Privacy Shield Framework was designed by the U.S. Department of Commerce and European Commission to provide companies on both sides of the Atlantic with a mechanism to comply with EU data protection requirements when transferring personal data from the European Union to the United States in support of transatlantic commerce.
The Privacy Shield Framework replaced the US-EU Safe Harbor Framework in 2016. BBB EU Privacy Shield offers compliance assistance and independent dispute resolution services to U.S. companies adhering to the Framework. The Framework also provides a set of robust and enforceable protections for the personal data of EU individuals. It provides transparency regarding how participating companies use personal data, strong U.S. government oversight, and increased cooperation with EU data protection authorities (DPAs).
The Privacy Shield Framework offers EU individuals access to multiple avenues to address any concerns regarding participants’ compliance with the Framework. The Framework ensures a continuing level of protection consistent with Privacy Shield Principles when personal data collected under the Framework is transferred to third parties. The Framework also makes it easier for EU individuals to understand and exercise their rights.
The Federal Risk and Authorization Management Program (FedRAMP) is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. The FedRAMP program has also established a Joint Accreditation Board (JAB) consisting of Chief Information Officers from DoD, DHS, and GSA.
- Increase re-use of existing security assessments across agencies
- Save significant cost, time, and resources – “do once, use many times”
- Improve real-time security visibility
- Provide a uniform approach to risk-based management
- Enhance transparency between government and Cloud Service Providers (CSPs)
- Improve the trustworthiness, reliability, consistency, and quality of the Federal security authorization process
NIST Special Publication 800-171 Protecting Covered Defense Information in Nonfederal Systems and Organizations, otherwise known as DFARS, outlines 14 families of security requirements for protecting the confidentiality of CDI you must meet in order to continue providing services and products to large defense organizations such as the Department of Defense.
Within those 14 families, there are 110 controls you must address, including mandatory security information and event management (SIEM), multi-factor authentication, encryption of all data (at rest and in transit), and policies and written authentication for your security procedures and protocol.
The Health Information Trust Alliance, or HITRUST, is a privately held company located in the United States that, in collaboration with healthcare, technology, and information security leaders, has established a Common Security Framework (CSF) that can be used by all organizations that create, access, store or exchange sensitive and/or regulated data.
The HITRUST CSF, a certifiable framework that provides organizations with a comprehensive, flexible and efficient approach to regulatory compliance and risk management.
Developed in collaboration with information security professionals, the HITRUST CSF rationalizes relevant regulations and standards into a single overarching security framework. Because the HITRUST CSF is both risk- and compliance-based, organizations can tailor the security control baselines based on a variety of factors including organization type, size, systems, and regulatory requirements.
By continuing to improve and update the framework, the HITRUST CSF has become the most widely-adopted security framework in the U.S. healthcare industry. This commitment and expertise demonstrated by HITRUST ensures that organizations leveraging the framework are prepared when new regulations and security risks are introduced.
Certified Ethical Hacker
A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
- Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures
- Inform the public that credentialed individuals meet or exceed the minimum standards
- Reinforce ethical hacking as a unique and self-regulating profession
EnCase Certified Examiner
The EnCase® Certified Examiner (EnCE®) program certifies both public and private sector professionals in the use of Guidance Software’s EnCase computer forensic software.
Recognized by both the law enforcement and corporate communities as a symbol of in-depth computer forensics knowledge, EnCE certification illustrates that an investigator is a skilled computer examiner.
Computer Hacking Forensic Investigator
CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.
- Perform incident response and forensics
- Perform electronic evidence collections
- Perform digital forensic acquisitions
- Perform bit-stream Imaging/acquiring of the digital media seized during the process of investigation.
- Examine and analyze text, graphics, multimedia, and digital images
- Conduct thorough examinations of computer hard disk drives, and other electronic data storage media
- Recover information and electronic data from computer hard drives and other data storage devices
- Follow strict data and evidence handling procedures
- Maintain audit trail (i.e., chain of custody) and evidence integrity
- Work on technical examination, analysis and reporting of computer-based evidence
- Prepare and maintain case files
- Utilize forensic tools and investigative methods to find electronic data, including Internet use history, word processing documents, images and other files
- Gather volatile and non-volatile information from Windows, MAC and Linux
- Recover deleted files and partitions in Windows, Mac OS X, and Linux
- Perform keyword searches including using target words or phrases
- Investigate events for evidence of insider threats or attacks
- Support the generation of incident reports and other collateral
- Investigate and analyze all response activities related to cyber incidents
- Plan, coordinate and direct recovery activities and incident analysis tasks
- Examine all available information and supporting evidence or artefacts related to an incident or event
- Collect data using forensic technology methods in accordance with evidence handling procedures, including collection of hard copy and electronic documents
- Conduct reverse engineering for known and suspected malware files
- Perform detailed evaluation of the data and any evidence of activity in order to analyze the full circumstances and implications of the event
- Identify data, images and/or activity which may be the target of an internal investigation
- Establish threat intelligence and key learning points to support pro-active profiling and scenario modelling
- Search file slack space where PC type technologies are employed
- File MAC times (Modified, Accessed, and Create dates and times) as evidence of access and event sequences
- Examine file type and file header information
- Review e-mail communications including web mail and Internet Instant Messaging programs
- Examine the Internet browsing history
- Generate reports which detail the approach, and an audit trail which documents actions taken to support the integrity of the internal investigation process
- Recover active, system and hidden files with date/time stamp information
- Crack (or attempt to crack) password protected files
- Perform anti-forensics detection
- Maintain awareness and follow laboratory evidence handling, evidence examination, laboratory safety, and laboratory security policy and procedures
- Play a role of first responder by securing and evaluating a cybercrime scene, conducting preliminary interviews, documenting crime scene, collecting and preserving electronic evidence, packaging and transporting electronic evidence, reporting of the crime scene
- Perform post-intrusion analysis of electronic and digital media to determine the who, where, what, when, and how the intrusion occurred
- Apply advanced forensic tools and techniques for attack reconstruction
- Perform fundamental forensic activities and form a base for advanced forensics
- Identify and check the possible source/incident origin
- Perform event co-relation
- Extract and analyze logs from various devices such as proxies, firewalls, IPSes, IDSes, Desktops, laptops, servers, SIM tools, routers, switches, AD servers, DHCP servers, Access Control Systems, etc.
- Ensure that reported incident or suspected weaknesses, malfunctions and deviations are handled with confidentiality
- Assist in the preparation of search and seizure warrants, court orders, and subpoenas
- Provide expert witness testimony in support of forensic examinations conducted by the examiner
Certified Digital Forensics Examiner
The Certified Digital Forensics Examiner vendor neutral certification validates Cyber Crime and Fraud Investigators know electronic discovery and advanced investigation techniques.
A Certified Digital Forensics Examiner grasps the methodology for conducting a computer forensic examination. They possess the forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-custody, and write a findings report.
- Forensic Examination
- Tools of the trade
- Seizure Concepts
- Incident Investigation
- Fundamentals of conducting an effective computer forensic examination
- Electronic Discovery and Digital Evidence
The Gramm-Leach-Bliley Act (GLB Act or GLBA) is also known as the Financial Modernization Act of 1999. It is a United States federal law that requires financial institutions to explain how they share and protect their customers’ private information. To be GLBA compliant, financial institutions must communicate to their customers how they share the customers’ sensitive data, inform customers of their right to opt-out if they prefer that their personal data not be shared with third parties, and apply specific protections to customers’ private data in accordance with a written information security plan created by the institution.
The primary data protection implications of the GLBA are outlined its Safeguards Rule, with additional privacy and security requirements issued by the FTC’s Privacy of Consumer Financial Information Rule (Privacy Rule), created under the GLBA to drive implementation of GLBA requirements. The GLBA is enforced by the FTC, the federal banking agencies, and other federal regulatory authorities, as well as state insurance oversight agencies.
- Private information must be secured against unauthorized access
- Customers must be notified of private information sharing between financial institutions and third parties and have the ability to opt out of private information sharing
- User activity must be tracked, including any attempts to access protected records
The GLBA requires that financial institutions act to ensure the confidentiality and security of customers’ “nonpublic personal information,” or NPI. Nonpublic personal information includes Social Security numbers, credit and income histories, credit and bank card account numbers, phone numbers, addresses, names, and any other personal customer information received by a financial institution that is not public. The Safeguards Rule states that financial institutions must create a written information security plan describing the program to protect their customers’ information. The information security plan must be tailored specifically to the institution’s size, operations, and complexity, as well as the sensitivity of the customers’ information.