• Home
  • About Us
    • Our Team
    • Defense Expo 2022
    • Blog
  • Our Offerings
    • Information Security >
      • Services >
        • Risk Advisory Services >
          • Audits & Compliances >
            • ISO 9001:2015 | Quality Management System
            • ISO 27001:2013 | Information Security Management System
            • ISO 22301:2019 BCMS
            • ISO 27017:2015 | Cloud Security
            • TL 9000 | Telecom Quality
            • PAS 99 | Integrated Management System
            • SOC 2 Audits
            • GDPR | Privacy Controls
            • Trusted Partner Network (TPN) Assessment
          • Vulnerability Assessment & Penetration Testing (VA & PT)
          • Security Operations Center (SOC)
          • Red Team Assessment
        • Cyber Threat Management
        • Privacy & Data Protection
        • Third Party Risk Management
      • Products >
        • Digital Forensics Equipment - Procurement
        • Mobile Threat Defense Suite
        • Insider Threat Prevention Suite
        • Data Diode
        • Secure Communication Suite
    • Cyber Crime Investigations
    • Digital Forensics >
      • Forensics Lab Setup
      • Data Recovery Services
    • Online Reputation Management
    • Other Services >
      • Homeland Security
  • Careers
  • Training Labs
    • ISO 27001:2013 Lead Implementer Course
  • Contact Us
    • FAQ
Best Information Security Services | Cyber Intelligence | Data Diode
  • Home
  • About Us
    • Our Team
    • Defense Expo 2022
    • Blog
  • Our Offerings
    • Information Security >
      • Services >
        • Risk Advisory Services >
          • Audits & Compliances >
            • ISO 9001:2015 | Quality Management System
            • ISO 27001:2013 | Information Security Management System
            • ISO 22301:2019 BCMS
            • ISO 27017:2015 | Cloud Security
            • TL 9000 | Telecom Quality
            • PAS 99 | Integrated Management System
            • SOC 2 Audits
            • GDPR | Privacy Controls
            • Trusted Partner Network (TPN) Assessment
          • Vulnerability Assessment & Penetration Testing (VA & PT)
          • Security Operations Center (SOC)
          • Red Team Assessment
        • Cyber Threat Management
        • Privacy & Data Protection
        • Third Party Risk Management
      • Products >
        • Digital Forensics Equipment - Procurement
        • Mobile Threat Defense Suite
        • Insider Threat Prevention Suite
        • Data Diode
        • Secure Communication Suite
    • Cyber Crime Investigations
    • Digital Forensics >
      • Forensics Lab Setup
      • Data Recovery Services
    • Online Reputation Management
    • Other Services >
      • Homeland Security
  • Careers
  • Training Labs
    • ISO 27001:2013 Lead Implementer Course
  • Contact Us
    • FAQ

ISO 27017:2015
Cloud Security controls

​ISO/IEC 27017:2015 Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services

We have a suite of services to help clients manage cloud security. Each offering relates to specific controls that support with managing specific cloud risks. Here we clarify what the different assessment schemes offer to support our positioning.

IEC 27017
ISO/IEC 27017 is an international code of practice for cloud security controls. It outlines cloud specific controls to manage security, building on the generic controls described in ISO/IEC 27002. It’s applicable to both Cloud Service Providers (CSPs) and organizations procuring cloud services. It supports with outlining roles and responsibilities for both parties, ensuring all cloud security concerns are addressed and clearly owned.
​
CSA STAR Certification
CSA STAR certification is based on a different control set that was created by and is owned by the Cloud Security Alliance (CSA), a global industry body pioneering research and development in Cloud Security. The controls for CSA STAR certification are mapped to a number of other standards making it a useful tool for organizations wishing to review their compliance against a wide range of standards and industry best practices (including ISO/IEC 27001, ISO/IEC 27002, ISO/IEC 27017 and ISO/IEC 27018).
​
This standard is regularly reviewed by an expert panel in the CSA to ensure in is up-to-date with industry best practice. It also contains a management capability (maturity model) to help organizations continually drive improvement and aim to enhance their cloud security.

InfoSec & Quality Standards Implementation and Audits

We assist organisations in:
- Implementing various standards for Information Security and Quality.
- Second and Independent Third Party Audits
- Compliance Audits
- Relevant Trainings for End Users and Management
- Providing SME's onsite
- Guaranteed certification audit success

Contact Us Today
Picture
TROJAN HUNT INDIA LLP
Review Us on Google  
https://bit.ly/thi_review

Services

Products

  Connect with us

Red Team Exercise & Assessment
Vulnerability Assessment & Penetration Testing
Privacy & Data Protection
Risk Advisory Services
Third Party Risk Management
Cyber Threat Management

Data Recovery Services

Mobile Threat Defense
Encrypted Communication Suite
Insider Threat Prevention Suite
Digital Forensic Products
Data Diode
​Data Recovery Products

​OSINT
Global Helpline:
+91-8178440079
+91-11-41671961
Chat With Us:
+91-8178440079
Working Hours:
​Monday - Saturday
1000 Hrs - 1900 Hrs
Corporate Office:
Level 3, Gate Number 1, Plot No 9-11, Vardhman Trade Center, Lala Lajpat Rai Road, Nehru Place - 110019, New Delhi, India

    Subscribe to our newsletter

Subscribe
Member of:
Picture
Certifications:
Picture
Picture
© Trojan Hunt India LLP 2019 - 2022. ​All Rights Reserved.
Disclaimer: All images are licensed and text copyrighted material of Trojan Hunt India LLP. Logo is Trademark Registered. No unauthorized copy or distribution allowed.
  • Home
  • About Us
    • Our Team
    • Defense Expo 2022
    • Blog
  • Our Offerings
    • Information Security >
      • Services >
        • Risk Advisory Services >
          • Audits & Compliances >
            • ISO 9001:2015 | Quality Management System
            • ISO 27001:2013 | Information Security Management System
            • ISO 22301:2019 BCMS
            • ISO 27017:2015 | Cloud Security
            • TL 9000 | Telecom Quality
            • PAS 99 | Integrated Management System
            • SOC 2 Audits
            • GDPR | Privacy Controls
            • Trusted Partner Network (TPN) Assessment
          • Vulnerability Assessment & Penetration Testing (VA & PT)
          • Security Operations Center (SOC)
          • Red Team Assessment
        • Cyber Threat Management
        • Privacy & Data Protection
        • Third Party Risk Management
      • Products >
        • Digital Forensics Equipment - Procurement
        • Mobile Threat Defense Suite
        • Insider Threat Prevention Suite
        • Data Diode
        • Secure Communication Suite
    • Cyber Crime Investigations
    • Digital Forensics >
      • Forensics Lab Setup
      • Data Recovery Services
    • Online Reputation Management
    • Other Services >
      • Homeland Security
  • Careers
  • Training Labs
    • ISO 27001:2013 Lead Implementer Course
  • Contact Us
    • FAQ