{"id":177767,"date":"2023-01-05T06:00:58","date_gmt":"2023-01-05T14:00:58","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=177767"},"modified":"2023-01-04T14:13:33","modified_gmt":"2023-01-04T22:13:33","slug":"conformance-to-the-ncsc-cloud-security-principles","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2023\/01\/conformance-to-the-ncsc-cloud-security-principles\/","title":{"rendered":"Palo Alto Networks Conformance to the NCSC Cloud Security Principles"},"content":{"rendered":"<p>In recent years, cloud has gone from being a small part of most companies\u2019 IT strategies to a critical business capability as organisations increasingly take a cloud-centric approach. Remote work, driven by Covid, has led to an explosion of deployed, cloud-based services. One of the advantages of cloud computing is that it has given organisations more choice in the types of technology and services they deploy. However, this proliferation of cloud adoption has made it harder for organisations to understand and assess what good services look like and how to differentiate among suppliers.<\/p>\n<p>Coupled with the growth in the deployment of cloud services, there has been an exponential rise in the cyber attacks targeting the cloud. According to the <a href=\"https:\/\/www.paloaltonetworks.com\/content\/dam\/pan\/en_US\/assets\/pdf\/reports\/cortex_xpanse-attack-surface-threat-report.pdf?utm_source=marketo&amp;utm_medium=email&amp;utm_campaign=Global-DA-EN-22-03-23-7014u000001hMKrAAM-P3-Cortex-2022-asm-threat-report\">Palo Alto Networks 2022 Cortex Xpanse Attack Surface Threat Report<\/a>, cloud continues to be a substantial and increasing target. In the data gathered from December 2021 to June 2022, cloud infrastructure issues rose from 80% to 91% of all observed cybersecurity issues. This is not surprising, given the speed at which organisations are deploying cloud services, and this is precisely why cloud service providers need to demonstrate to their customers that they take security seriously in the face of this threat landscape.<\/p>\n<p>Fortunately, the UK National Cyber Security Centre (NCSC) recognised the challenging predicament many face and developed the NCSC Cloud Security Principles to help cloud consumers become better informed and enable them to ask the right questions of their cloud service providers. At Palo Alto Networks, we recently published our <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/palo-alto-networks-ncsc-vendor-response\">conformance statement<\/a> to the NCSC Cloud Security Principles.<\/p>\n<h3><a id=\"post-177767-_orucw08b9gds\"><\/a>NCSC Guidance<\/h3>\n<p>The <a href=\"https:\/\/www.ncsc.gov.uk\/collection\/cloud\/the-cloud-security-principles\" rel=\"nofollow,noopener\" >14 NCSC Cloud Security Principles<\/a> help organisations navigate the various challenges from a compliance, conformance and operational perspective, so they can choose cloud service providers in an informed, secure and trustworthy manner. This is key when those services are likely to come from multiple providers hosted on multiple cloud environments. Leveraging these principles can result in a more effective service with lower overall costs, including decreased risk and security exposure.<\/p>\n<p>The Cloud Security Principles can be grouped into five overarching themes, set out as follows:<\/p>\n<ul>\n<li>Standards &amp; Protocols \u2013 Principles 1-3 identify the key characteristics to ensure the service provides the necessary level of protection and separation for the users and their data.<\/li>\n<li>Fit for Purpose \u2013 Principles 4-6 set out how the provider should have a transparent and trustworthy approach to ensuring the service is and remains safe and fit for purposes in the future.<\/li>\n<li>Supply Chain Trust \u2013 Principles 7 and 8 focus on the need for provenance of the service.<\/li>\n<li>Secure in Operation \u2013 Principles 9-13 focus on the need for the service to remain secure in operations and that the consumer achieves the correct level of access, visibility and granularity of control required to manage the risks.<\/li>\n<li>Secure by Design \u2013 Principle 14 focuses on the need for the service provider (the expert on that service) to help the consumer maintain a secure service.<\/li>\n<\/ul>\n<h3><a id=\"post-177767-_fjpn4vn3itp4\"><\/a>Palo Alto Networks Commitment<\/h3>\n<p>At Palo Alto Networks, our most important responsibility is helping to ensure the security of our customers. To demonstrate this commitment to security, as well as transparency, the <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/palo-alto-networks-ncsc-vendor-response\">Palo Alto Networks conformance statement<\/a> to the NCSC Cloud Security Principles illustrates our compliance and transparency of alignment with all of the principles.<\/p>\n<p>Our approach to the NCSC Principles is indicative of the position we have taken generally and internally with our <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/trust-360\">Trust 360 Program<\/a>, where we have established a \u201ctrust but verify\u201d model to our security controls. This global approach to transparent security allows our customers to continually evaluate our program and understand all of the security, compliance and privacy controls that are in place to protect our customers\u2019 most sensitive data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Palo Alto Networks published a conformance statement to the NCSC Cloud Security Principles - for cloud consumers on cloud service providers.<\/p>\n","protected":false},"author":723,"featured_media":177769,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308,6719,484,6724,6769],"tags":[1166,1871,3779],"coauthors":[8524,8318],"class_list":["post-177767","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement","category-company-culture","category-government","category-points-of-view","category-public-sector","tag-cloud-security","tag-ncsc","tag-sled"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2023\/01\/Fog-upon-City-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/177767","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/723"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=177767"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/177767\/revisions"}],"predecessor-version":[{"id":177786,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/177767\/revisions\/177786"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/177769"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=177767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=177767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=177767"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=177767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}