Cloud 101CircleEventsBlog
Join Jim Reavis, CEO of CSA, & AT&T's top advisors on May 22 in Seattle for key security insights!

STAR Registry Listing for

Secure Public Cloud

Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best practices.

Secure Public Cloud

Polo Strategico Nazionale has created an ad hoc cloud service for the management of critical data. Secure Public Cloud uses Google Cloud and Azure Cloud with the implementation of cryptographic keys managed, exclusively, by Polo Strategico Nazionale, in Regions located only on Italian territory. Service to guarantee the security and sovereignty of the data through:
- The encryption keys. All Public Administration workloads are encrypted with BYOK master keys. The codes are owned by the PA, but managed by Polo Strategico Nazionale and located within the Data Centers located on Italian territory;
- Cyber Security Postures tested and implemented on the specific needs of each Administration. Security operations follow the main best practices and reference frameworks;
- Networking Management because all traffic is monitored through a Hub & Spoke architecture which allows you to control data via firewall, waf and siem;
- The strict policy that imposes workloads only in Italian Data Centers of the selected Public Cloud. Furthermore, the only services that can be activated are those that meet security standards with external key management systems;
- Double backup series. Backups are provided both in the Data Centers of the National Strategic Center and in the Public Administration infrastructures to guarantee dual conservation of the applications.

View other services by Polo Strategico Nazionale:

Information about Secure Public Cloud
Listed Since: 04/22/2024
Last Updated: 04/22/2024

STAR Level 1

Self-Assessment & Partner-Provided

Consensus Assessments Initiative Questionnaire v4.0.3

CAIQ 4.0.3 Self-assessment
Offers an industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services. It provides a set of Yes/No questions a cloud consumer and cloud auditor may wish to ask of a cloud provider to ascertain their compliance to the CSA Cloud Controls Matrix (CCM).