Numerous national and industry regulations apply to corporate data stored in the cloud. We’ve summarized each one with recommendations to ensure compliance.
Depending on your organization’s industry and what countries you operate in, there are likely one or more compliance regulations you’re required to follow. These regulations frequently mandate how you can treat personally identifiable information (PII), protected health information (PHI), payment card data, and other regulated data. Skyhigh’s cloud security solutions can help you meet these compliance requirements as data moves to the cloud by enforcing data loss prevention policies, access policies, and encrypting data stored in the cloud. The first step is understanding what regulations apply to your organization and how those regulations impact your cloud usage. We’ve summarized some of the most common regulatory requirements below. For more information, view the detailed page on each requirement.
PCI DSS (Payment Card Industry Data Security Standard)
PCI is not a law, but it’s a standard that’s required for all organizations that handle or process payment card information. It’s administered by an independent body that represents the major payment card brands including Visa, MasterCard, and American Express. There are 12 requirements for PCI with detailed sub-requirements. Failure to comply with these rules can result in fines levied by the acquiring bank, increased transaction fees, or termination of card processing.
These U.S. laws apply to health insurance companies, health care clearinghouses, and healthcare providers such as doctors and hospitals. Together, HIPAA and HITECH require organizations to safeguard protected health information. In the event of a breach, mandatory disclosure rules require you to report data loss, resulting in fines, loss of business, and litigation. However, by encrypting data, you can avoid these breach notification requirements if encrypted data is leaked.
This U.S. law applies to financial institutions and mandates they protect the security and confidentiality of their customers’ personal information. There is a requirement to disclose to customers where their information is being stored, what steps have been taken to protect their data, and to provide customers with an opt-out of data being shared with third parties. Some cloud providers claim the right to share data uploaded to their service with third parties, complicating compliance with the law.
Sarbanes-Oxley is a U.S. law that applies to public companies. Under the law, companies are responsible for accounting and financial wrongdoing, even if it’s the result of actions by a third party such as a cloud provider. As a result, companies covered by the law should look for cloud providers that have SAS 70 or SSAE 16 auditing standards in place. Just 21% of cloud providers have one of these auditing standards in place, creating the need for an independent registry of cloud providers.
GDPR (EU General Data Protection Regulation)
This regulation is expected to take effect in 2015 and supersede the current EU Data Protection Directive. It will apply to any organization based anywhere in the world that handles data on EU citizens and residents. Under the law, users can request data on them be deleted, which can be difficult given that many cloud providers maintain the right to store copies of data indefinitely. There are also tighter rules about data leaving the EU to countries without equivalently strong data protections.
FIPS 140-2 (Federal Information Processing Standard Publication 140-2)
FIPS 140-2 is a U.S. government security standard issued by the National Institute of Standards and Technology (NIST) providing accreditation of cryptographic modules. U.S. federal agencies are required to use FIPS-certified encryption modules in cases where encryption is mandated, but NIST does not specify which levels are appropriate for different applications. For the private sector, FIPS 140-2 signals that an encryption solution meets the highest security standards.
FISMA (Federal Information Security Management Act)
FISMA is a law that applies to the U.S. federal government. The law requires agencies to develop, document, and implement a security program that includes both technology managed by the agency as well as technology managed by third parties such as cloud providers. To achieve FISMA compliance, cloud providers need to meet FISMA standards, be hosted in a FISMA-compliant data center, and have Authority to Operate (ATO). FISMA also mandates the government to use FIPS 140-2 compliant encryption.
ITAR (International Traffic in Arms Regulations)
ITAR is a U.S. law that applies to U.S. citizens and organizations. The law restricts the export or sharing of certain types of defense-related technology outside the U.S. to protect U.S. national security. Enforcement has increased substantially in recent years, with a $100 million fine levied against a company for unlawfully exporting night vision technology. Encrypting sensitive data is not enough, the Department of State recommends tokenizing data before uploading to the cloud.