Skip to content

From On‑Prem Casino Cages to Public Cloud: Why A.5.23 Matters Now

ISO 27001 A.5.23 matters to iGaming and sportsbook operators because it forces you to govern how you select, run and exit cloud services that underpin regulated gambling. When you can evidence those decisions, routine technology changes are far less likely to become licence, revenue or player‑protection problems when regulators, auditors or partners ask hard questions.

Public cloud has turned iGaming and sportsbook platforms into fast‑moving, globally distributed systems, but it has also blurred who is really in control when something goes wrong. For a licenced operator, that loss of clarity is where technology risk quickly turns into licence risk, reputational damage and player‑protection concerns.

Cloud adoption in gambling rarely starts from a blank sheet. Many operators have grown from on‑premises or co‑located data centres that felt like modern versions of casino cages: tightly controlled rooms, known racks, visible hardware and a strong sense that “everything important is under our roof”. When workloads move to elastic, multi‑tenant infrastructure, those mental models stop matching reality, even though regulators still expect the same, or higher, standard of control.

From a regulator’s point of view, that mismatch is dangerous. You, as the licensee, are still expected to know where player data lives, who can see or change odds, what happens during an outage and how you assure game integrity. Supervisory bodies in multiple jurisdictions increasingly expect you to back up those answers with recognised frameworks such as ISO 27001 and with clear evidence of cloud governance, not just assurances.

Cloud only helps if your control is as clear as your speed.

Information here is general and does not constitute legal or regulatory advice. For decisions on licencing, data protection or gambling regulation, you should take advice from qualified professionals.

It is in that context that ISO 27001:2022 introduces Annex A control 5.23, “Information security for use of cloud services”. In plain terms, A.5.23 says you must have a defined, repeatable way to choose, run and leave cloud services securely, in line with your information‑security requirements and risk appetite. For iGaming and sportsbook businesses, cloud is no longer a side note under generic outsourcing; it is a first‑class governance concern that sits alongside more familiar topics such as AML, fairness and responsible gambling.

How cloud has changed the risk profile for gambling operators

Cloud changes your risk profile because it increases scale and speed while deepening your dependency on platforms and services you do not own. You can enter new markets faster and launch features quickly, but without deliberate governance you expose regulated workloads to misconfiguration, concentration risk and opaque supplier behaviour that can undermine player protection and market integrity.

For an operator running real‑money gaming and sports betting, this plays out in very concrete ways. A typical player journey covers registration, KYC checks, deposits, in‑play bets, promotions, withdrawals and, sometimes, disputes. Behind each stage sit cloud services such as identity providers, document‑verification tools, risk and trading engines, data warehouses, marketing platforms, payment gateways and logging systems. Weak governance of any of those services can put your obligations around player protection, AML, game fairness and data protection at risk.

From a regulators perspective, that entire chain is still your responsibility, even if much of it runs on someone elses infrastructure. When something fails, our cloud provider had an issue is not an acceptable explanation unless you can demonstrate that you selected, contracted, monitored and, if necessary, exited that provider in a disciplined, risk‑based way.

A simple way to visualise this is to map the player journey against the key cloud services it touches and mark where data, odds or money can change. That picture often reveals more dependencies, jurisdictions and suppliers than you expect at first glance, and it highlights why A.5.23 now matters as much as your core game and trading controls.

Book a demo


What ISO 27001:2022 A.5.23 Actually Requires for Cloud

ISO 27001 A.5.23 requires you to run a clear lifecycle for every significant cloud service: how you discover and assess it, how you contract and design it, how you implement and monitor it and how you exit it. For iGaming and sportsbook operators, that means moving from isolated technical decisions to a joined‑up governance process you can explain and evidence at any time.

In the standard, A.5.23 sits among the organisational controls in Annex A. Its formal wording is concise but powerful: you must define how you bring cloud services in, how you run them and how you leave them, in a way that manages the risks those services introduce. Everything else about the control flows from that lifecycle idea.

In simple terms, an A.5.23‑aligned operator can answer five questions at any time for each significant cloud service:

  1. Why did we adopt it and what due diligence did we perform?
  2. What requirements did we place in the contract and service‑level agreements (SLAs)?
  3. How is it configured and monitored to meet our security and regulatory needs?
  4. Who reviews its performance and risks over time?
  5. How would we migrate or terminate it safely if needed?

Answering those questions is not just an ISO exercise. It also underpins the storey you tell to gambling regulators, banks, payment schemes and partners about the robustness of your cloud strategy and the seriousness of your supplier oversight.

Breaking A.5.23 into a practical lifecycle

A.5.23 is easier to manage when you treat cloud use as a structured lifecycle that mirrors how services appear and evolve in your environment. In practice, that lifecycle means you discover and assess services, design and contract them, implement and configure them, operate and review them, and, when needed, exit or migrate them in a controlled way. Later sections turn that pattern into a concrete, gambling‑specific blueprint.

To make this approach work, you should define which services are in scope (for example, those that handle player data, betting decisions or operational monitoring), how they enter the lifecycle and how you prove that each stage has been followed. That proof is what auditors and regulators will look for when A.5.23 is in scope.

How A.5.23 relates to other ISO 27001 and gambling obligations

A.5.23 does not stand on its own; it acts as a bridge between cloud decisions and your wider obligations under ISO 27001 and gambling regulation. Understanding those links helps you avoid treating cloud as a side topic and instead weave it into your main risk and compliance storey.

In particular, A.5.23 interacts with:

  • Supplier relationship controls (A.5.19–A.5.22): – These define how you select, monitor and change suppliers. Cloud providers and critical SaaS platforms are high‑impact suppliers that need the most rigorous application of these principles.
  • Access control and operational controls: – ISO 27002 maps these into families that cover identity, access, operations and change. In cloud, you must apply them to identities, roles, keys, networks, containers and serverless workloads, not only to traditional servers.
  • Privacy and data‑protection frameworks: – GDPR, local privacy laws and gambling‑regulator rules on player records and transaction logs all impose constraints on where and how you process data. A.5.23 ties your cloud choices back to those constraints through risk assessments, architecture standards and documented data‑location decisions.

You can picture A.5.23 at the centre of a simple diagram, with suppliers, access controls and privacy on three sides. Each cloud decision should join those dots, so you can explain not only how the technology works but also how it supports your licence conditions and player‑protection duties. Using an information security management system (ISMS) platform such as ISMS.online can make those links easier to maintain because risks, suppliers, policies and evidence live in one aligned environment.




ISMS.online gives you an 81% Headstart from the moment you log on

ISO 27001 made easy

We’ve done the hard work for you, giving you an 81% Headstart from the moment you log on. All you have to do is fill in the blanks.




Translating A.5.23 into Shared Responsibility Across IaaS, PaaS, SaaS

A.5.23 expects you to turn vague assurances about “secure cloud” into concrete statements of who is responsible for what at each layer of every cloud service you rely on. In iGaming and sportsbook environments, that means explicitly mapping responsibilities across infrastructure‑as‑a‑service (IaaS), platform‑as‑a‑service (PaaS) and software‑as‑a‑service (SaaS) for workloads that touch odds, wallets, bonuses and player data.

In cloud, saying “we are secure” is meaningless unless you can show who is responsible for what. The core idea behind shared responsibility is simple: cloud providers secure some parts of the stack, but not all. The exact division depends on the model and the specific service in question. A.5.23 asks you to document and manage that division in a way that fits your risk and regulatory profile, rather than assuming that provider certifications are enough.

For an iGaming or sportsbook operator, shared responsibility is not just about technical depth. It is about making sure that, for every workload that touches player funds, odds, bonuses or AML decisions, there is no ambiguity about who configures what, who monitors what and who answers to the regulator when something fails.

Designing a shared responsibility model that matches your workloads

A good shared responsibility model gives you and your providers a single, unambiguous view of who does what for each sensitive workload. That starts with clear categories (IaaS, PaaS, SaaS), but it only becomes useful when you match those categories to the actual services that run your gambling operations and record the split of duties for each.

A practical approach is to design a shared responsibility matrix for each major workload category. For example:

  • Player account and wallet services: – Clarify who hardens operating systems, sets firewall rules or security groups, defines and reviews IAM roles, configures database encryption and monitors login, deposit and withdrawal events.
  • Risk and trading engines: – Capture responsibilities around price feeds, cache layers, container orchestration, configuration of message queues and the logging of odds changes or manual overrides.
  • Bonus and promotion systems: – Define who owns the logic for eligibility and limits, who governs rule‑deployment pipelines and who monitors for anomalies and abuse patterns.
  • KYC, AML and fraud analytics: – Set out which party ingests and stores personal documents, who manages model pipelines and feature stores, and who is accountable for access to source documents and derived risk scores.

A simple comparison table helps you keep those responsibilities clear across common cloud models:

Layer | Provider typically handles | Operator must handle
—|—|—
Physical data centre | Power, cooling, physical security | Due diligence and location selection
Core platform | Hypervisors, managed databases, runtimes | Service choice and secure configuration
Applications | Underlying SaaS platform | Custom logic, business rules and integrations
Data | Resilient storage options | Data quality, classification and encryption keys
Access and monitoring | Native IAM and logging tools | Role design, alerts and investigations

For each cell in your own matrix (for example, “network security for a trading cache layer”), the model should identify provider responsibilities, operator responsibilities and shared tasks such as incident investigation or forensic reconstruction.

A.5.23 is satisfied only when these models are not theoretical slides, but live documents referenced in contracts, design reviews, incident playbooks and audit evidence. Keeping them current is as important as designing them well.

Keeping shared responsibility alive through change

Shared responsibility models only add value if they stay aligned with reality as your architecture, team structure and supplier landscape evolve. A.5.23 implicitly expects you to maintain that alignment over time, not only at project inception.

Sportsbook stacks change constantly: new feed providers are onboarded, cloud‑native databases are adopted, data pipelines are refactored and teams experiment with new tooling and AI services. To keep A.5.23 effective, you should:

  • Integrate responsibility models into change governance: – Make them mandatory inputs for major change approvals, supplier onboarding and architecture reviews.
  • Link them to identity and access management: – Ensure that role definitions and group mappings in your cloud platforms align with the RACI (Responsible, Accountable, Consulted, Informed) in your models.
  • Tie them into incident response: – When issues arise, responders should know immediately which responsibilities to call on, rather than arguing about ownership mid‑incident.

This is where a structured information security management system becomes practical rather than bureaucratic. By holding shared responsibility matrices alongside risk registers, supplier files and policies, you can show auditors and regulators a coherent, joined‑up picture instead of scattered documents, especially when you use a dedicated ISMS platform such as ISMS.online to keep everything aligned.




iGaming Cloud Threats: Misconfiguration, Manipulation and Regulatory Shock

Cloud misconfiguration has become one of the most common ways otherwise well‑run iGaming and sportsbook organisations find themselves explaining incidents to regulators. A.5.23 cannot remove every risk, but a strong cloud‑service lifecycle drastically reduces the chance that a mistaken setting or weak supplier integration cascades into licence issues, player harm or market‑integrity concerns.

In a sportsbook or casino platform, misconfiguration is rarely an abstract concept. It might mean a storage bucket containing KYC scans left publicly accessible; an overly permissive access role allowing traders to change limits in production; or a logging system that silently stops capturing bet‑level decisions. Attackers increasingly hunt for these weaknesses at scale, and regulators treat them as governance failures rather than unlucky accidents.

Understanding the threat landscape is therefore not optional. It is a prerequisite for designing A.5.23 processes that focus effort where it matters most: cloud settings and supplier behaviours that, if wrong, would undermine player protection, AML or fairness.

Where cloud misconfigurations bite hardest in iGaming

Cloud misconfigurations hurt most where they expose sensitive data, weaken integrity controls or undermine monitoring of high‑risk actions. In iGaming, that often means storage for KYC documents, systems that influence odds or payouts, and services that log key trading or bonus events, because those directly impact regulators’ core concerns.

A handful of misconfiguration patterns repeatedly show up in investigations and remediation projects. Focusing on these gives you quick wins as you strengthen A.5.23 implementation and prepare for more searching regulator questions about cloud and outsourcing.

Common high‑impact patterns include:

  • Public or weakly controlled storage: – Buckets or object stores for logs, player documents or payment reports exposed to the internet or poorly permissioned.
  • Over‑privileged IAM roles and keys: – Service accounts or administrators granted broad permissions to modify odds, bonus rules, payout logic or critical infrastructure.
  • Unsegmented networks and environments: – Little separation between test and production, or between high‑risk workloads and lower‑risk services, making lateral movement easier.
  • Incomplete or unmonitored logging: – Key actions, such as odds overrides or large withdrawals, not captured in tamper‑evident logs or not centralised and monitored.
  • Weak controls over third‑party connections: – Integrations with feeds, game studios or payment processors given broad access without tight rules, monitoring or periodic review.

Each of these can lead to player data leakage, unfair advantage, unbounded bonus abuse, undetected fraud or long outages during peak events. A.5.23 is your prompt to identify where those failure modes exist in your environment and to harden the cloud services and suppliers that underpin them.

A simple heatmap that plots misconfiguration types against their impact on player data, markets and licences can help you decide where to focus first. High‑impact boxes on that map should drive your initial A.5.23 remediation work.

From technical error to regulatory event

In regulated markets, the consequences of a cloud misconfiguration are defined as much by how the incident is governed as by the technical details. A small misconfiguration that is detected quickly, contained, analysed and reported within regulatory timelines may result in remediation instructions and closer monitoring. The same misconfiguration, left undetected for months or poorly reported with vague governance explanations, can trigger licence reviews, fines and new special conditions.

A.5.23 supports better outcomes in two ways:

  • Prevention and reduced likelihood: – By forcing you to define configuration baselines, monitoring processes and review cycles for cloud services, it reduces the chance that dangerous misconfigurations arise or persist.
  • Improved response and defensibility: – When incidents do occur, you can show that risks were identified, shared responsibilities documented, suppliers assessed and monitoring designed on a risk basis. That does not erase the incident, but it changes the narrative from negligence to managed risk.

To make that work in practice, your cloud‑governance blueprint must focus explicitly on the misconfiguration classes and supplier behaviours that have the highest potential to damage your licence and reputation. That focus also gives your engineers, compliance specialists and suppliers a clear shared target when they invest effort in hardening critical services.




climbing

Embed, expand and scale your compliance, without the mess. IO gives you the resilience and confidence to grow securely.




A.5.23 Cloud Governance Blueprint for iGaming & Sportsbook

An effective cloud‑governance blueprint turns A.5.23 from a short control statement into a visible, day‑to‑day way of working. For iGaming and sportsbook operators, that blueprint must follow the full lifecycle of your services and speak the language of technology, security, compliance, legal and product teams, so governance feels like a shared framework rather than an audit exercise.

A cloud‑governance blueprint is the practical expression of A.5.23 in your organisation. It turns the abstract requirement for processes covering acquisition, use, management and exit into a visible, repeatable way of working that your teams can follow and your auditors can recognise when they review cloud‑related evidence.

Building a lifecycle that matches gambling workloads

The most useful blueprints are built around a lifecycle that reflects how regulated workloads actually move through your environment. The six‑stage lifecycle introduced earlier can be made more concrete for gambling operations by expressing it as clear, repeatable steps that are easy to embed into project and supplier workflows.

Step 1 – Discover

Maintain an inventory of cloud services in use, including “shadow IT” and embedded SaaS within platforms, and classify each by criticality, data classes and regulatory impact.

Step 2 – Assess

Perform risk and impact assessments covering security, privacy, resilience, data residency and supplier concentration, bringing in licencing conditions and relevant data‑protection laws.

Step 3 – Approve

Route new or changed cloud services through a structured approval process involving Technology, Security, Compliance and, where appropriate, Legal and Procurement.

Step 4 – Implement

Deploy services in line with approved reference architectures and configuration standards for identity, encryption, logging, monitoring, backup and environment segmentation.

Step 5 – Monitor and review

Track performance, incidents and supplier changes, run periodic control reviews and tests, and refresh risk assessments so earlier assumptions remain valid.

Step 6 – Exit

Plan and test how you would migrate from, or terminate, cloud services, including data export, deletion and evidence retention for player rights and AML records.

A.5.23 is satisfied when this lifecycle is implemented consistently, documented and demonstrably used to make and monitor cloud decisions for the services that matter most to your gambling operations.

Clarifying roles and accountabilities across the lifecycle

A lifecycle without clear owners will not survive contact with everyday project pressures and commercial deadlines. To make A.5.23 stick, you need a simple, agreed RACI for each stage so that everyone understands where they fit and what is expected of them when new cloud services appear or existing ones change.

A typical pattern in an operator might be:

  • Technology and Platform teams responsible for design and implementation of cloud services.
  • Security responsible for risk‑assessment standards, technical baselines and monitoring expectations.
  • Compliance accountable for alignment with licencing and data‑protection obligations.
  • Legal and Procurement responsible for contractual provisions, SLAs and exit terms.
  • Operations and Customer teams consulted on operational impact and service levels.

When that RACI is written down, agreed and reflected in your ISMS workflows, it becomes much easier to show auditors and regulators that cloud decisions are not made in isolation or left to individual engineers. It also gives staff the confidence that cloud risk is a shared responsibility rather than an unspoken burden.

Connecting data classification, jurisdictions and cloud choices

Data classification is where the blueprint becomes specific to gambling rather than generic cloud governance. You process several particularly sensitive classes of information: identity and KYC documents; payment instruments; betting histories and behavioural indicators; AML and affordability assessments; odds models; game logic; and responsible‑gambling markers.

Your blueprint should connect:

  • Data classes: – Which types of data a service processes, such as KYC documents, transactions or behavioural signals.
  • Regulatory constraints: – Which laws and licence conditions apply to that data, including privacy rules and gambling‑specific record‑keeping.
  • Cloud design rules: – Which regions, providers, encryption models, access patterns and logging requirements are acceptable or mandatory.

A simple decision tree from “Proposed cloud service” through “Data classes involved” and “Markets affected” to “Allowed regions and controls” makes those connections easy to follow. By making them explicit, your teams can evaluate cloud options quickly and safely, and you can demonstrate to auditors that your use of cloud lines up with both ISO 27001 and gambling‑specific obligations. Using a structured platform like ISMS.online to hold these rules alongside risks, suppliers and policies can make that mapping far easier to maintain.




Putting Controls in the Cloud: Access, Logging and Data Residency on Major Cloud Platforms

A.5.23 expects that your policies, lifecycles and shared‑responsibility models are reflected in the actual settings of your cloud platforms. For iGaming and sportsbook technology, three control domains typically matter most: access control, logging and monitoring, and data residency. Weakness in any of these areas can undo months of governance work in a single incident.

For platforms running on major cloud providers, this means translating written standards into identities, roles, logs, keys, regions and pipelines. If this translation is inconsistent, auditors and regulators will quickly spot the gap between your stated A.5.23 approach and the reality of how your cloud is configured.

Access control and privileged access for gambling workloads

Strong access control prevents accidental or malicious changes to the systems that drive odds, payments and player outcomes. Under A.5.23, you are expected to define and enforce access arrangements that reflect least privilege, separation of duties and traceability across your cloud estate, not only within individual applications.

Access control in cloud is no longer about local accounts on servers; it is about central identity providers, federated logins, roles and policies. To align with access‑control expectations in ISO 27002 and the lifecycle requirements in A.5.23, operators should:

  • Use central identity and single sign‑on: – Integrate cloud platforms and key SaaS services with your central identity provider, enforcing strong authentication and conditional access.
  • Define role‑based access: – Map business roles such as trader, risk analyst, customer‑service agent and DevOps engineer to cloud roles that reflect least privilege.
  • Control privileged access tightly: – Use just‑in‑time elevation, break‑glass procedures and session recording for administrative actions on critical resources such as wallets, odds engines or production databases.
  • Separate duties: – Ensure that no single role can both deploy code and change production configurations for high‑risk components without oversight.

These measures make it much easier to evidence who can change what in your cloud estate, and to reconstruct what happened if an integrity issue or fraud case is alleged.

Logging, monitoring and forensic readiness

Logging is the foundation for showing both fairness and control in regulated gambling. An A.5.23‑aligned cloud environment must not only collect detailed logs; it must keep them safe, correlated and ready for investigation when questions arise about specific bets, sessions or manual interventions.

An effective approach to logging and monitoring should:

  • Define log sources and retention for each workload: – For example, capture bet placement and settlement, odds changes, bonus awards and adjustments, KYC and AML decisions, administrative actions and infrastructure changes.
  • Centralise and protect logs: – Forward logs into tamper‑resistant storage, restrict who can access and query them, protect them from deletion and back them up across regions where appropriate.
  • Correlate and alert: – Build monitoring rules that correlate events across application, infrastructure and identity domains, so patterns such as unusual odds changes after privileged logins are surfaced quickly.
  • Exercise forensic processes: – Periodically rehearse how you would use logs to investigate suspected match‑fixing, bonus abuse or a disputed in‑play bet.

These practices reassure auditors and regulators that you can investigate and explain disputed outcomes at the level of individual events, not just daily summaries. They also help internal teams resolve issues faster and learn from incidents.

Implementing data residency and sovereignty decisions

Data residency and sovereignty questions are often the first that regulators ask when they hear “cloud”. They want to know where gambling transaction data and player records physically reside, who can access them and under what legal regime. A.5.23 gives you a structure for encoding those decisions and proving that you follow them across your cloud estate.

Under A.5.23, you should:

  • Define residency rules by market and data class: – For example, require that all primary gambling transaction logs and player records for a given licence sit in specified regions, while derived analytics may be more widely distributed under strict conditions.
  • Embed rules into architecture templates: – Include allowed regions, replication options, key‑management locations and data‑export constraints in infrastructure‑as‑code and platform standards.
  • Document cross‑border access: – Record where support teams, incident responders and third‑party providers are located and how they access cloud environments, and explain how this is compatible with data‑protection and gambling‑regulation rules.
  • Align with exit and continuity planning: – Ensure residency rules are compatible with disaster‑recovery strategies and exit plans, so you do not trade compliance today for unmanageable risk tomorrow.

With these decisions encoded and traceable, you can respond quickly and confidently when regulators or auditors ask where data lives and how you manage jurisdictional risk during normal operations and during incidents.




ISMS.online supports over 100 standards and regulations, giving you a single platform for all your compliance needs.

ISMS.online supports over 100 standards and regulations, giving you a single platform for all your compliance needs.




Proving It Works: Evidence, Audit Readiness and Common A.5.23 Pitfalls

A.5.23 is ultimately judged on what you can show. For iGaming and sportsbook operators, that means having a living set of artefacts that demonstrate how you discover, assess, approve, implement, monitor and exit cloud services, and how those activities protect player funds, markets and data. Well‑organised evidence makes ISO 27001 audits, licence reviews and partner due diligence noticeably less painful.

Designing governance processes and cloud controls is only half the job. ISO 27001 certification, surveillance audits and gambling‑regulator assessments all depend on what you can actually show, not only what you intend. Good evidence also makes internal life easier: when the board, investors, acquirers or partners ask, “Are we really in control of our cloud and suppliers?”, you can point to clear, up‑to‑date artefacts instead of compilations pulled together in a hurry.

What good A.5.23 evidence looks like in practice

You can organise A.5.23 evidence around the same lifecycle you use to run cloud decisions. That makes it easier for auditors and regulators to follow your storey and verify that each stage is working in practice, not only on paper.

Examples by lifecycle stage include:

  • Discover: – A current inventory of cloud services, with owners, data classifications and jurisdictions.
  • Assess: – Risk and impact assessments for major services, including threats, controls, residual risk and regulatory considerations.
  • Approve: – Records of governance decisions for new and changed services, including approvals, exceptions and conditions.
  • Implement: – Cloud‑specific policies and standards, reference architectures, configuration baselines and shared‑responsibility matrices.
  • Monitor and review: – Supplier due‑diligence records, SLAs, service reviews, penetration‑test findings and remediation tracking.
  • Exit: – Documented exit and migration plans, data‑retention and deletion procedures, and any completed migrations or de‑commissioning records.

The more these artefacts form a coherent storey-linked through your ISMS rather than scattered across drives-the easier your audits and regulatory engagements will be. A platform such as ISMS.online can help by keeping policies, risks, suppliers, evidence and workflows in one place and aligned with A.5.23.

Common A.5.23 pitfalls for iGaming and sportsbook organisations

Even mature operators stumble over some recurring issues when A.5.23 is in scope. Recognising them early helps you strengthen your position before an ISO 27001 transition or regulator review, and gives you a clearer remediation roadmap for cloud and supplier governance.

Some frequent pitfalls include:

  • Shadow cloud services: – Teams adopt SaaS tools or cloud‑native features without routing them through governance, leaving gaps in inventories, contracts and risk assessments.
  • Undocumented critical suppliers: – Third‑party odds feeds, game platforms or payment gateways run workloads in their own clouds, but you have limited visibility into how those are governed.
  • Weak exit planning: – Contracts and architectures assume that key platforms will always be available, with no realistic plan for extracting data and moving workloads if a relationship ends or a provider changes direction.
  • Inconsistent data‑location records: – Different documents give conflicting answers about where data is stored and processed, undermining confidence in your residency and sovereignty claims.
  • Over‑reliance on provider assurances: – Operators lean too heavily on provider certifications and marketing, without independent checks or explicit documentation of their own responsibilities.

By treating these pitfalls as a short internal checklist, you can quickly identify where your current A.5.23 posture is fragile and focus remediation where it will matter most.

Turning evidence collection into a living discipline

The worst time to build an A.5.23 evidence pack is the month before an audit or after receiving a regulator questionnaire. To avoid that, evidence needs to flow naturally from day‑to‑day governance and engineering work, not rely on document hunts or manual compilations from many systems.

That means:

  • Embedding evidence creation into workflows so that risk assessments, approvals, supplier reviews and design sign‑offs automatically generate traceable records.
  • Linking incidents and findings back to risks and controls in your ISMS, so you can demonstrate learning and improvement rather than isolated fixes.
  • Scheduling periodic reviews of high‑risk services and suppliers, and tracking follow‑up actions through to closure.
  • Ensuring ownership for keeping diagrams and inventories aligned with reality, not only with past project plans.

A structured ISMS platform such as ISMS.online makes this far easier than trying to coordinate e‑mail trails and spreadsheets across multiple teams and jurisdictions, because it keeps policies, risks, suppliers, evidence and workflows in one place and aligned to the lifecycle and responsibilities you have defined.




Book a Demo With ISMS.online Today

ISMS.online helps your iGaming or sportsbook organisation turn ISO 27001 A.5.23 into a practical cloud‑governance system that protects your licence, players and markets. By bringing cloud risks, suppliers, controls and evidence into one structured environment, you can move from reactive documentation to proactive, auditable control.

When you are under pressure to transition to ISO 27001:2022 or respond to more detailed regulator questions about cloud and outsourcing, ISMS.online helps you see how Annex A.5.19–A.5.23 map across your cloud and supplier landscape. Cloud‑specific checklists, templates and workflows make it easier to identify gaps, prioritise remediation and show exactly how you acquire, use, manage and exit cloud services securely.

For technology and platform leaders, ISMS.online supports linking cloud‑architecture decisions, shared‑responsibility models and configuration standards directly to the risks and controls in your ISMS. That means you can demonstrate how guardrails and patterns in your cloud environments are not just “good practice”, but deliberate responses to A.5.23 and related controls.

For security and compliance teams, ISMS.online provides structured spaces for supplier due diligence, contract and SLA records, risk assessments and audit evidence. Tasks and workflows help ensure that reviews actually happen, findings are tracked and documentation is ready when auditors, regulators or partners ask to see it.

For executives and boards, the result is a clearer line of sight from cloud‑strategy decisions to real‑world control and accountability. Dashboards and reports can highlight where critical services and suppliers sit in your risk picture, how incidents are being managed and where investments in governance are paying off in reduced exposure.

If someone asked tomorrow for a single, coherent storey of how your organisation acquires, uses and exits cloud services that underpin your gambling operations, could you present it confidently? Exploring a tailored walkthrough of ISMS.online is a straightforward way to see how quickly you can embed A.5.23 into day‑to‑day work and show regulators and auditors that your use of cloud is deliberate, governed and resilient.



Frequently Asked Questions

What does ISO 27001 A.5.23 really change for an iGaming or sportsbook operator in the public cloud?

ISO 27001 A.5.23 turns your public‑cloud footprint from “lots of clever teams doing their own thing” into a single, governed cloud‑service lifecycle that gambling regulators and ISO auditors can understand and trust.

For an iGaming or sportsbook operator, that means every significant cloud service involved in player data, funds, odds, bonuses or regulatory evidence is brought under one managed process. Instead of ad‑hoc decisions, you are expected to:

  • Know which cloud and SaaS services you rely on, and for what purpose.
  • Assess how each service affects player protection, licence conditions and resilience.
  • Decide and record who owns which responsibilities (you vs. provider).
  • Monitor those services over time and know how you would exit them safely.

What does a practical A.5.23 lifecycle look like for iGaming?

You can think of A.5.23 as requiring a repeatable “cloud path” for services such as wallets, trading engines, KYC/AML tools, CRM, data platforms and reporting:

  • Discover and inventory: – maintain a live list of IaaS, PaaS and SaaS services used for accounts, wallets, odds, bonus logic, AML, fraud, logging and regulatory reporting.
  • Assess risk and impact: – record how failure, misuse or compromise could affect player privacy, funds, odds integrity, uptime and licence conditions.
  • Approve and onboard: – define who can approve new services, which checks are required (security, privacy, responsible‑gambling), and how those are evidenced.
  • Implement with baselines: – standardise secure defaults for storage, identity, networking, logging and data residency, and embed them in templates and pipelines.
  • Monitor and review: – assign owners, review frequencies and triggers for reassessment (incidents, misconfigurations, new regions, material scope changes).
  • Exit and migrate: – keep realistic plans for leaving or replacing key services without losing data, funds or regulatory logs.

You are not being asked to re‑implement your cloud provider’s internal security. You are being asked to show that:

  • You understand exactly where their responsibility stops and yours begins.
  • That split is visible in your policies, risk records, controls and supplier files.
  • Fast cloud adoption is happening inside a controlled system, not on trust alone.

If you use an ISMS platform such as ISMS.online to link each cloud service to its risks, controls, supplier due‑diligence, diagrams and reviews, you get a single place to prove your A.5.23 storey. That makes it easier to keep moving quickly in the public cloud without weakening player protection or putting your licences at risk.


How can we design a shared‑responsibility model for cloud security that protects the platform but still lets teams ship fast?

You design shared responsibility so that teams always know what is theirs, what belongs to the cloud provider, and how that affects their design choices-without feeling like every change needs a committee meeting.

A good model starts from your real workloads rather than from generic vendor diagrams. For most iGaming and sportsbook operators, those workloads include:

  • Wallets and payment processing
  • Player accounts, registration and KYC
  • Trading, odds and market‑suspension logic
  • Bonus and promotion engines
  • AML, fraud and responsible‑gambling analytics
  • Logging, observability and regulatory reporting

How do we turn shared responsibility into something engineers actually use?

A practical pattern is to build a simple matrix by workload and by technical layer, for example:

  • Network and perimeter: – VPCs, subnets, security groups, WAF
  • Platform services: – managed databases, queues, caches, streaming
  • Runtime: – OS, container platform, serverless configuration (where you manage it)
  • Application layer: – code, configuration, APIs
  • Data: – classification, encryption, retention, masking
  • Identity and access: – IAM roles, SSO, privileged access
  • Logging and monitoring: – log sources, retention, alerting

For each intersection, you define in plain language:

  • What the cloud provider is responsible for (for example, physical security, underlying hypervisor, certain managed‑service patches).
  • What your organisation must design, run and review (for example, IAM policies, network rules, admin access, data retention, application logging).
  • How you check that both sides are doing their part (for example, config baselines, security reviews, reports from the provider, internal monitoring).

When these matrices live inside your ISMS and are linked to named teams and roles, not just job titles, they stop being theoretical. An engineer introducing a new managed database or fraud‑detection SaaS can see immediately:

  • Which responsibilities they inherit from the provider.
  • Which decisions and controls they own.
  • Which approvals or reviews are required.

Housing this shared‑responsibility model in ISMS.online alongside policies, risks, change workflows and supplier records keeps it current as services and teams change. It also gives you a very direct way to explain to auditors and regulators how cloud duties are designed, agreed and operated across your iGaming platform.


Which cloud misconfigurations hurt iGaming operators most, and how does A.5.23 help us prevent them?

The misconfigurations that cause the most damage in iGaming are usually not the subtle ones-they are the obvious weaknesses that let someone see or influence what they should never touch: player data, markets, balances or regulatory evidence.

A.5.23 helps you move from occasional, reactive fixes to deliberate, repeatable prevention, based on how your own workloads actually work.

Which specific mistakes create the biggest impact in gambling platforms?

Common high‑impact misconfigurations include:

  • Public or weakly protected storage: for KYC files, bet history, logs or regulator reports, where a simple mis‑set permission exposes sensitive data.
  • Over‑privileged IAM roles or service accounts: that allow one person or tool to adjust odds, change markets or edit settlement rules with little or no oversight.
  • Flat network segments: where back‑office, promotional and production trading systems share paths, making lateral movement trivial once a foothold is gained.
  • Logging that is incomplete or easy to tamper with: , so key actions (odds table changes, big bonus awards, AML decisions, admin approvals) are missing or modifiable.
  • Third‑party tools: (for example, martech or legacy fraud solutions) retaining high‑risk access to APIs or databases long after implementation.

A.5.23 asks you to:

  • Identify which cloud services sit behind these risks-for example, object storage for logs and KYC, managed databases for wallets, analytics platforms for AML.
  • Define what “secure by default” means for each (private storage, encrypted data, strict IAM, immutable central logging, tight network controls).
  • Turn those definitions into standard patterns in infrastructure‑as‑code, reference architectures, CI/CD checks and cloud‑posture tooling.
  • Extend those patterns into the contracts and technical controls you use with critical SaaS and managed‑service providers.

Using ISMS.online, you can connect each misconfiguration risk to:

  • The cloud services and workloads where it could appear.
  • The agreed baselines and patterns that reduce the risk.
  • The monitoring activities and reviews that will spot drift.

That helps you show auditors and regulators that you are not just reacting to cloud weaknesses as they appear. Instead, you are using A.5.23 to systematically reduce the kinds of mistakes that can endanger fairness, player protection and your licences.


How should we handle cloud and managed‑service suppliers so that A.5.23 and gambling regulators both see strong control?

You treat cloud and managed‑service suppliers as extensions of your control environment, not as a separate universe. For iGaming and sportsbook operators, this is especially important because many critical functions-payments, KYC, AML, fraud analytics, CRM-live in external platforms that regulators expect you to understand and oversee.

A.5.23 is a useful anchor for presenting that oversight. Regulators are generally reassured when they can see that your suppliers move through a predictable lifecycle and that risk decisions are recorded, not just implied.

What does a regulator‑friendly lifecycle for cloud suppliers look like?

A clear lifecycle typically follows these steps:

  • Classify: – Group suppliers by function and data sensitivity: core platform, payments, KYC/AML, trading support, responsible‑gambling tooling, marketing, analytics, infrastructure. Suppliers touching funds, player identity, odds or licence evidence sit in your highest tier.
  • Assess: – Run structured security and privacy assessments for key suppliers, reviewing certifications, hosting locations, sub‑processors, access paths, incident processes and resilience arrangements.
  • Contract & SLA: – Include specific language on uptime and recovery, breach notification timing, data residency, data‑processing terms, audit and inspection rights, and exit support (including data export and deletion).
  • Onboard: – Control how initial access is granted, align shared‑responsibility expectations, confirm starter configurations, and assign internal owners and review schedules.
  • Monitor & review: – Reassess suppliers periodically according to tier, and when key triggers occur (incidents, ownership changes, service scope expansion, new regions). Track findings and remediation to closure.
  • Exit: – When you leave a supplier, ensure access is removed, data is returned or securely deleted, and any learnings are recorded for future decisions.

When this lifecycle is reflected in your ISMS, and supported by actual evidence, it becomes straightforward to answer questions from auditors and regulators such as:

  • “Why did you choose this provider?”
  • “How do you know they continue to meet your security and licence obligations?”
  • “What would you do if this service suffered a breach or had to be replaced?”

An ISMS platform like ISMS.online lets you keep supplier classifications, risk scores, questionnaires, contracts, SLAs, reviews and issues together. That makes your A.5.23 position much easier to defend because you can show, rather than just assert, that outsourced cloud services are controlled as carefully as systems you host yourself.


How do we translate A.5.23 into concrete access, logging and data‑residency patterns on our cloud platforms?

You turn A.5.23 from a clause into day‑to‑day reality by deciding on a handful of standard patterns for access, logging and data location, then baking those patterns into how engineers provision and change cloud workloads.

For an iGaming or sportsbook operator, these patterns should be built around what actually matters to your business:

  • Odds and market integrity: – ensuring that only the right people and processes can change what players see.
  • Fund protection: – preventing silent manipulation of balances and payouts.
  • Player privacy: – controlling where identity and behavioural data is stored and processed.
  • Regulatory evidence: – keeping the logs and reports that support your licence.

What could these patterns look like in practice?

For access and identity:

  • Use role designs that map directly to your jobs-traders, risk analysts, operations, support, engineers-and enforce least privilege for each.
  • Separate duties so that no single identity can both configure odds or balances and alter the logs that track those changes.
  • Require multi‑factor authentication for all privileged actions and use time‑limited or approval‑based elevation for live environments.

For logging and observability:

  • Decide which events are essential for fairness and licence protection (bet placement, settlement, odds updates, bonus grants, AML decisions, admin actions).
  • Route those events to a central logging service with write‑once or tamper‑evident storage and retention that matches your regulatory obligations.
  • Limit who can read, export or mask those logs, and ensure regular checks are in place to verify coverage and integrity.

For data residency and data movement:

  • Define, in plain rules, where EU player data, UK regulatory logs and payments information may reside and be processed.
  • Hard‑code those rules into choices of regions, replication strategies, encryption‑key locations and cross‑border access pathways.
  • Record any exceptions, the reasons behind them, and the compensating controls.

By documenting these patterns in your ISMS and referencing them in your architecture templates, IaC modules and change processes, you make it much easier to prove to an auditor or gambling regulator that A.5.23 underpins real technical decisions. With a platform like ISMS.online, you can go further and link each workload to the specific pattern it uses, so reviewers can follow the chain from written rule to implemented configuration.


How can we demonstrate A.5.23 compliance in ISO audits and gambling regulator reviews without creating another mountain of paperwork?

You can make A.5.23 evidence much lighter to handle by designing it so that it falls naturally out of how you already run cloud services, rather than existing as a separate project you dust off before each audit or licence review.

Auditors and regulators are usually looking for three things:

  • You know which cloud and SaaS services you depend on.
  • You have thought about the risk and responsibility split for each.
  • You can show how those decisions are applied and revisited over time.

What does a “lean but complete” A.5.23 evidence set look like?

Instead of duplicating information across different reports, you can anchor your evidence in a small set of artefacts that match the lifecycle you have chosen:

  • Cloud‑service inventory: – covering IaaS, PaaS and key SaaS, with owners, purpose, criticality and links to workloads (wallets, trading, KYC, AML, CRM, reporting).
  • Risk assessments: – concise records showing security, privacy and licence impacts for each important service, and which Annex A controls you rely on to manage those risks.
  • Shared‑responsibility documents: – matrices per workload family that show how duties are split between cloud provider and your teams across identity, network, platform, data and logging.
  • Supplier assessments and SLAs: – evidence of due‑diligence, certifications, agreed service levels and exit terms for hyperscalers and key managed services.
  • Architecture diagrams and baselines: – up‑to‑date diagrams and configuration standards that illustrate how access, logging, data residency and resilience are implemented.
  • Review and change records: – logs of regular reviews, significant change decisions, incident learnings and resulting improvements.
  • Exit and migration outlines: – documented options for replacing or exiting critical providers without endangering funds, player data or licence evidence.

When these artefacts are created and updated as part of normal work-onboarding a new fraud platform, moving logs to a new region, tuning IAM for odds management-you avoid the typical “audit panic”. Instead of building a bespoke pack every time, you can show auditors and regulators the same living picture that your teams use.

Processes that quietly collect decisions as you go usually impress reviewers more than complex documents written at the last minute.

An ISMS platform such as ISMS.online helps by tying all of this together: cloud‑service records, risks, controls, supplier information, patterns, reviews and approvals live in one place. That way, when someone asks how you comply with A.5.23, you are not simply describing intent-you are walking them through a visible, consistent way of running cloud services that keeps player protection, fairness and licences at the centre of your public‑cloud strategy.



Mark Sharron

Mark Sharron leads Search & Generative AI Strategy at ISMS.online. His focus is communicating how ISO 27001, ISO 42001 and SOC 2 work in practice - tying risk to controls, policies and evidence with audit-ready traceability. Mark partners with product and customer teams so this logic is embedded in workflows and web content - helping organisations understand, prove security, privacy and AI governance with confidence.

Take a virtual tour

Start your free 2-minute interactive demo now and see
ISMS.online in action!

platform dashboard full on mint

We’re a Leader in our Field

4/5 Stars
Users Love Us
Leader - Spring 2026
High Performer - Spring 2026 Small Business UK
Regional Leader - Spring 2026 EU
Regional Leader - Spring 2026 EMEA
Regional Leader - Spring 2026 UK
High Performer - Spring 2026 Mid-Market EMEA

"ISMS.Online, Outstanding tool for Regulatory Compliance"

— Jim M.

"Makes external audits a breeze and links all aspects of your ISMS together seamlessly"

— Karen C.

"Innovative solution to managing ISO and other accreditations"

— Ben H.