<!DOCTYPE html>
<html>
<head>
        <title>SaaS Standard Requirements</title>
</head>
<body>
<style type="text/css">#aweber_rem {
              text-align:center;
              font-size:10px;
              color:#333;
              width:600px !important;
              margin:0px auto;
                    font-family:Verdana, Arial, Helvetica, san-serif;
              }
           #aweber_rem a {
              text-decoration:none;
              }
           #aweber_rem a:hover {
              text-decoration:underline;
              }
</style>
<center>
<table cellpadding="0" cellspacing="0" style="font-family:helvetica,verdana,arial,sans-serif; text-align:left; width:600px">
        <tbody>
                <tr>
                        <td style="color:#666666; padding-bottom:5px" valign="bottom" width="400">
                        <div style="font-size:12px; text-align:right"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/4tkW763xx4EjtAqgY82sx1ZQ/UJvBZjo0Aw6ahxphF6k9mw"><img align="left" alt="" height="80" src="https://cdn6.bigcommerce.com/s-ilcoov/product_images/the_art_of_service_-_we_get_it_transparent_1_1503604503__72937.png" width="200" /></a></span><br />
                        <span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/4tkW763xx4EjtAqgY82sx1ZQ/UJvBZjo0Aw6ahxphF6k9mw" target="_blank" title="Trouble viewing this email? ">Trouble viewing this email?</a></span></div>

                        <div style="font-size:14px; text-align:right"> 
                        <div style="font-size:12px; text-align:right"> </div>

                        <div style="font-size:12px; text-align:center"> 
                        <hr /> 
                        <p><span style="color:#000000"><span style="font-size:24px"><strong>SaaS Standard Requirements Toolkit</strong></span></span><br />
                         </p>
                        <span style="color:#000000"><span style="font-family:verdana"><span style="font-size:36px"><span style="font-family:verdana"><strong><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/4tkW763xx4EjtAqgY82sx1ZQ/UJvBZjo0Aw6ahxphF6k9mw"><img alt="" height="50" src="https://artofservice.s3.amazonaws.com/Get_started_button._CB531883441_.png" width="400" /></a></strong></span></span></span></span><br />
                         </div>

                        <p style="text-align:center"><span style="color:#000000"><span style="font-size:20px">Crucial Requirements:</span></span></p>

                        <ul>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">IDS/IPS traffic pattern analysis can often detect or block attacks such as a denial-of-service attack or a network scan. However, in some cases this is legitimate traffic (such as using cloud infrastructure for load testing or security testing). Does the cloud provider have a documented exception process for allowing legitimate traffic that the IDS/IPS flags as an attack pattern?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">It is clear that the CSP will face a large number of requests from its customers to prove that the CSP is secure and reliable. There a number of audit and compliance considerations for both the CSP and the customer to consider in cloud computing. First, which compliance framework should a CSP adopt to satisfy its customers and manage its own risks?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">How do you know that a breach has occurred, how do you ensure that the CSP notifies you when a breach occurs, and who is responsible for managing the breach notification process (and costs associated with the process)?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">A critical success factor is that appropriate governance needs to be in place. Is an appropriate organizational structure in place to manage the organization facing the cloud computing solution?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">How do you Identify the different workloads and how they need to interact? Which models are appropriate based on their security and trust requirements and the systems they need to interface to?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">If we can no longer trust the network (organizational) perimeter to provide sufficient protection and are now reliant on host perimeter security, what is the trust model between hosts?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">If the cloud provider provides IDS/IPS services, is there a documented exception process for allowing legitimate traffic that has content similar to malware attacks or spam?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">If a data subject exercises this right to ask the organization to delete his data, will it be possible to ensure that all of his information has been deleted in the cloud?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">Do you have a solution in place that handles business case development and request management (i.e. worksheets for users to build business case for potential projects)?</span></span><br />
                                 </li>
                                <li style="text-align: left;"><span style="color:#000000"><span style="font-size:15px">Discovery/subpoena: Is the information managed in the cloud in a way that will enable the organization to comply with legal requirements in case of legal proceedings?</span></span><br />
                                 
                                <div style="text-align:left"> </div>
                                </li>
                        </ul>
                        </div>

                        <div style="text-align:center">
                        <p style="text-align:left"><span style="color:#000000"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/4tkW763xx4EjtAqgY82sx1ZQ/UJvBZjo0Aw6ahxphF6k9mw"><img align="right" alt="" height="900" src="https://cdn6.bigcommerce.com/s-ilcoov/products/141638/images/175111/SaaS_TKFC__97769.1535352961.1280.1280.jpg?c=2" style="margin:5px" width="600" /></a>  </span></span></p>

                        <p><span style="color:#000000"><span style="font-family:verdana"><span style="font-size:36px"><span style="font-family:verdana"><strong><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/4tkW763xx4EjtAqgY82sx1ZQ/UJvBZjo0Aw6ahxphF6k9mw"><img alt="" height="50" src="https://artofservice.s3.amazonaws.com/Get_started_button._CB531883441_.png" width="400" /></a></strong></span></span> </span></span></p>
                        </div>

                        <hr />
                        <p style="text-align:center"><span style="color:#000000"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/4tkW763xx4EjtAqgY82sx1ZQ/UJvBZjo0Aw6ahxphF6k9mw" style="font-size: 16px; font-family: verdana;"><img alt="" height="80" src="https://cdn6.bigcommerce.com/s-ilcoov/product_images/the_art_of_service_-_we_get_it_transparent_1_1503604503__72937.png" width="200" /></a></span></span></p>

                        <div style="text-align:center">
                        <div><span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><span style="color:#000000"><span style="font-size:16px"><strong>To make sure you keep getting these emails, please add service@theartofservice.com to your address book or whitelist us.</strong> </span></span></span><br />
                         </span></span></div>

                        <div style="text-align:center"><br />
                        <span style="color:#000000"><span style="font-family:verdana"><span style="font-family:verdana"><a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/9tcocQN8oBWNshTCy53GbQ/UJvBZjo0Aw6ahxphF6k9mw"><img alt="" height="121" src="https://cdn6.bigcommerce.com/s-ilcoov/product_images/uploaded_images/itil-training-organization-newlogosmall.jpg" width="280" /><img alt="" height="121" src="https://cdn6.bigcommerce.com/s-ilcoov/product_images/uploaded_images/prince2-training-organization-newlogo-small.jpg" width="280" /></a></span><br />
                          </span></span>

                        <p><strong>The U.S. Department of Commerce, National Institute of Standards and Technology (NIST) has included</strong> The Art of Service's Cyber Security Self Assessment on their Framework Industry Resources list since The Art of Service's Self Assessment <strong>is deemed qualified, accurate and comprehensive as a Guidance</strong> that Incorporates the Framework:  <a href="http://zaale.com/l/J9dyb892892r4VxIWGcw892l7Etw/cqeDD1PXsjXrkx6RcbDOzA/UJvBZjo0Aw6ahxphF6k9mw">https://www.nist.gov/cyberframework/industry-resources</a></p>
                        <span style="color:#000000"><span style="font-family:verdana">  </span></span>

                        <hr /></div>

                        <div style="text-align: center;"><br />
                        <span style="color:#000000"><span style="font-size:14px"><span style="font-size:16px">This message was sent to you because you are registered for this newsletter. We respect your privacy. If you no longer wish to receive emails, safely unsubscribe below.</span></span></span>

                        <p> </p>
                        <span style="color:#000000"> </span></div>
                        </div>
                        </td>
                </tr>
                <tr>
                        <td height="3" style="border-top: 3px double #e4e4e4; text-align: center; font-family: Verdana,Arial; font-size: 12px"> 
                        <p> </p>

                        <p>The Art of Service 22B/302 South Pine Road Brendale, Qld 4500 </p>

                        <p> </p>

                        <p><a href="http://zaale.com/unsubscribe/Wy763JeFxE4qMGmhSKRMkAv763BuYMqm5763oGLg5mhclm737S4GXMPll892vRLi9QonSx6n/USYcb2mwW4TN8KykVByKGQ/UJvBZjo0Aw6ahxphF6k9mw" >Manage Subscription</a>  </p>

                        <p> </p>
                        </td>
                </tr>
        </tbody>
</table>
</center>
</body>
</html>
<img src="http://zaale.com/t/UJvBZjo0Aw6ahxphF6k9mw/J9dyb892892r4VxIWGcw892l7Etw" alt="" style="width:1px;height:1px;"/>