OFDSS

The Standard

Control Domains

OFDSS covers 79 individual security requirements across 13 control domains, each addressing a critical area of data security for cloud-native financial services.


1. Resource Allocation

Ensures that adequate resources—personnel, budget, and tools—are allocated to information security. This domain establishes the foundation for a strong security program by requiring organizational commitment.

2. Asset Management

Covers the identification, classification, and management of information assets. Companies must maintain an inventory of assets and understand the sensitivity of data they handle.

3. Access Controls

Addresses authentication, authorization, and access management. This includes user provisioning, multi-factor authentication, role-based access control, and the principle of least privilege.

4. Change Controls

Establishes requirements for managing changes to systems and applications. This domain ensures that changes are reviewed, tested, and approved before deployment to production.

5. Software Development Life Cycle (SDLC)

Covers secure software development practices, including code review, security testing, and vulnerability management throughout the development process.

6. Cryptography

Addresses the use of encryption to protect data at rest and in transit. This includes key management practices, encryption standards, and certificate management.

7. Data Minimization

Ensures that companies collect, process, and retain only the minimum amount of data necessary. This domain aligns with privacy principles and regulatory requirements.

8. Auditing and Alerting

Covers logging, monitoring, and alerting capabilities. Companies must maintain audit logs, monitor for security events, and have alerting mechanisms for suspicious activity.

9. Incident Management

Establishes requirements for detecting, responding to, and recovering from security incidents. This includes incident response plans, communication procedures, and post-incident review.

10. Network Security

Addresses network architecture, segmentation, and protection. This includes firewall management, network monitoring, and secure network design principles.

11. Awareness and Training

Covers security awareness and training programs for employees. Companies must ensure that staff understand their security responsibilities and are trained on current threats.

12. Vendor Management

Addresses the security requirements for third-party vendors and service providers. Companies must assess vendor security practices and manage vendor risk.

13. Independent Testing

Requires regular independent security testing, including penetration testing and vulnerability assessments. This domain ensures that security controls are validated by qualified third parties.


Summary

#DomainFocus Area
1Resource AllocationOrganizational commitment
2Asset ManagementData classification & inventory
3Access ControlsAuthentication & authorization
4Change ControlsChange management processes
5SDLCSecure development practices
6CryptographyEncryption & key management
7Data MinimizationPrivacy & data handling
8Auditing and AlertingMonitoring & logging
9Incident ManagementResponse & recovery
10Network SecurityArchitecture & segmentation
11Awareness and TrainingEmployee education
12Vendor ManagementThird-party risk
13Independent TestingExternal validation
Previous
Documents