jagomart
digital resources
picture1_Excel Sheet Download 12102 | Cloud Risk Assessment Tool V1 1 1 | Business Form Tools


 248x       Filetype XLSX       File size 0.09 MB       Source: snapshot.ict.govt.nz


File: Excel Sheet Download 12102 | Cloud Risk Assessment Tool V1 1 1 | Business Form Tools
sheet 1 index and descriptions cloud risk assessment tool index further information cloud computing information security and privacy considerations document further information requirements for cloud computing webpages purpose of this ...

icon picture XLSX Filetype Excel XLSX | Posted on 07 Jul 2022 | 3 years ago
Partial file snippet.
Sheet 1: Index and Descriptions
Cloud Risk Assessment Tool - Index






Further information : Cloud Computing: Information Security and Privacy Considerations document
Further information: Requirements for Cloud Computing webpages






Purpose of this tool











This spreadsheet is a companion tool to the Cloud Computing: Information Security and Privacy Considerations document (see link above) provided as guidance for ALL agencies to help them determine the applicability and selection of cloud-based solutions for ICT projects and business requirements. It should be used in conjunction with that document and the guidance provided on www.digital.govt.nz (see link above). All agencies MUST adhere to these guidelines .






Assessement Tool Index and Navigation Aid










Section Question Category
Agency to complete Vendor to complete
3.1 3.1 Value, Criticality and Sensitivity of Information Y N
3.2 3.2 Data Sovereignty Y Y
3.3 3.3 Privacy Y Y
3.4 3.4 Governance Y Y
3.4.1
3.4.1 Terms of Service N Y
3.4.2
3.4.2 Compliance Y Y
3.5 3.5 Confidentiality Y Y
3.5.1
3.5.1 Authentication and Access Control Y Y
3.5.2
3.5.2 Multi-Tenancy Y Y
3.5.3
3.5.3 Standard Operating Environments Y Y
3.5.4
3.5.4 Patch and Vulnerability Management Y Y
3.5.5
3.5.5 Encryption Y Y
3.5.6
3.5.6 Cloud Service Provider Insider Threat N Y
3.5.7
3.5.7 Data Persistence N Y
3.5.8
3.5.8 Physical Security Y Y
3.6 3.6 Data Integrity Y Y
3.7 3.7 Availability Y Y
3.7.1
3.7.1 Service Level Agreement Y Y
3.7.2
3.7.2 Denial of Service Attacks N Y
3.7.3
3.7.3 Network Availability and Performance Y N
3.7.4
3.7.4 Business Continuity and Disaster Recovery Y Y
3.8 3.8 Incident Response and Management N Y






Description of Master Cloud Assessment Tool Fields











Agency / Customer Name: Mandatory field for the name of the agency or other public sector entity sponsoring completion of the Assessment Tool.

Project / Task Ref ID: Optional field for agency or other public sector entity use to record against a formal project or document management schema. Can be quoted as a reference to source the original copy of the Assessment Tool at a later date. This reference may be used multiple times, where a project assesses more than one provider for a requirement.

Vendor / Provider Name: Mandatory field for the name of the company or service/application provider for the specific solution being assessed. This should be the official (trading) name as listed in the Companies Register or equivalent.

Cloud Application / Service Concerned: Mandatory field for the name of the cloud service/application being assessed (eg. SurveyMonkey, YouTube, Microsoft Azure, etc).

Section The section of the Assessement Tool, grouped into subject matter areas. Not grouped into vendor or agency specific questions.

Question No Question number matches those in the source document Cloud Computing: Information Security and Privacy Considerations. Though a number of the original multi-part questions have been separated into sub-questions to allow vendor or agency specific answering, (ie. reduce duplicate responsibilities for answers).

Question Textual description of considerations to be assessed for the cloud service, phrased as questions. Aimed at informing agency awareness, information risk assessment and decision making.

Agency/System or Vendor/Provider Response Response to the issue/consideration raised. Note due diligence should be applied where appropriate (ie. Providing vendor website links as answers without evidence/testing the information may not be sufficient).

Question References / Sources The source of official references are provided here. Where appropriate, links to Internet sources are provided.

AGENCY to complete Matrix selection value for those questions for agency or system/project manager consideration and answer based on agency experiences and GCDO recommendation, though both agency and vendor question matrix can be user customised as required.

VENDOR to complete Matrix selection value for those questions for the vendor, or service provider consideration and answer.

Clarification points Additional information that aims to clarify or aid readers/assessors with understanding the context and scope of the question/consideration.

Agency Questions / Comments / Requests Optional. For agency, vendor, or system / service providers to feedback to GCDO any issues or queries concerning the document (either this tool or the original Cloud Computing: Information Security and Privacy Considerations document). Outstanding items may be left until a suitable answer is provided.






Crown copyright ©. This work is licensed under a 'Creative Commons Attribution 4.0 International License'. In essence, you are free to copy, distribute and adapt the work, as long as you attribute the work to the Department of Internal Affairs, New Zealand Government, and abide by the other licence terms. Please note that neither the Department of Internal Affairs emblem nor the New Zealand Government logo may be used in any way which infringes any provision of the "Flags, Emblems, and Names Protection Act 1981" or would infringe such provision if the relevant use occurred within New Zealand. Attribution to the Department of Internal Affairs should be in written form and not by reproduction of the Department of Internal Affairs emblem or New Zealand Government logo. To view a copy of this licence, visit: http://creativecommons.org/licenses/by/4.0/


Sheet 2: Tool Instructions
Cloud Risk Assessment Tool - Instructions


Further information : Cloud Computing: Information Security and Privacy Considerations document
Further information: Requirements for Cloud Computing webpages



All public cloud computing decisions need to be made in the context of an enterprise-wide ICT assurance view. In the first instance, agencies are expected to adopt Government ICT Common Capabilities if they exist.

This guidance must be followed for all cloud services including new services, Government ICT Common Capabilities, continuation of services and contract renewals. Read the guidance on www.ict.govt.nz (see the link above) regarding the Cloud Computing: Information Security and Privacy Considerations (see the link above) prior to using this tool.



This Cloud Risk Assessment Tool is a replication of the questions in the Cloud Computing: Information Security and Privacy Considerations document (see link above). It is intended to be used in support of the Cloud Service Requirements process chart, though agencies can also use it in support of their own project requirements and processes as appropriate. This tool is designed to assist agencies in collecting the relevant information that will subsequently inform the risk assessment stage of any cloud services selection.



Agencies are to inform GCDO when they use this tool to assess cloud services. The GCDO Government Enterprise Architecture team can provide guidance on the tools application. Refer also to the Cloud Service Requirements chart  for further guidance.



It is expected that agencies will conduct an initial information valuation by completing the first three sections (Questions 1-27) of this Cloud Risk Assessment Tool. This information will assist agencies in understanding the 'information value' to be invested in the target service, notably:

Ø  The classification of the information concerned.

Ø  The confidentiality, integrity and availability of the information concerned.

Ø  The presence of Personally Identifiable Information (PII) - to identify if a Privacy Information Assessment (PIA) is required.

Ø  Sovereignty, commercial, financial or reputational risks.



Dependent upon analysis of the results of the initial agency questions (Questions 1-27) concerning the information/data to be stored, handled and transiting the proposed cloud-based solution, complete the remaining sections of this Cloud Risk Assessment Tool appropriately (ie. no questions should be ignored, though a number may not be relevant to a particular set of requirements).



Several cloud service vendors have developed standard response documents for the Cloud Computing: Information Security and Privacy Considerations, which can be provided to government agencies upon request. Agencies should approach potential cloud vendors when conducting this assesment.



The GCDO will review the contents of this tool and associated guidance on an ongoing basis, using the results of agencies cloud assessments and direct feedback. Please submit comments and change requests to GCDO.


Version: v1.1.1 (15 Sep 15). Corrections and minor amendments from v1.1.


Author: Phil Cutforth MBE MSc, AoG Enterprise Architect, DIA SST


Contributors / Reviewers: GCDO thanks Industry suppliers and agencies who have contributed to the development and review of this tool.


Contact Us: For any questions and suggestions for amendments or improvements, email the GCDO team at:

GCDO@dia.govt.nz


Master Document: Cloud Computing: Information Security and Privacy Considerations document


Licence: Crown copyright ©. This work is licensed under a Creative Commons Attribution 4.0 International License. In essence, you are free to copy, distribute and adapt the work, as long as you attribute the work to the Department of Internal Affairs, New Zealand Government, and abide by the other licence terms. Please note that neither the Department of Internal Affairs emblem nor the New Zealand Government logo may be used in any way which infringes any provision of the "Flags, Emblems, and Names Protection Act 1981" or would infringe such provision if the relevant use occurred within New Zealand. Attribution to the Department of Internal Affairs should be in written form and not by reproduction of the Department of Internal Affairs emblem or New Zealand Government logo. To view a copy of this licence, visit: http://creativecommons.org/licenses/by/4.0/

The words contained in this file might help you see if this file matches what you are looking for:

...Sheet index and descriptions cloud risk assessment tool further information computing security privacy considerations document requirements for webpages purpose of this spreadsheet is a companion to the see link above provided as guidance all agencies help them determine applicability selection cloudbased solutions ict projects business it should be used in conjunction with that on wwwdigitalgovtnz must adhere these guidelines assessement navigation aid section question category agency complete vendor value criticality sensitivity y n data sovereignty governance terms service compliance confidentiality authentication access control multitenancy standard operating environments patch vulnerability management encryption provider insider threat persistence physical integrity availability level agreement denial attacks network performance continuity disaster recovery incident response description master fields customer name mandatory field or other public sector entity sponsoring completion...

no reviews yet
Please Login to review.