Cloud 101CircleEventsBlog
Download Presentations from the CSA AI Summit at RSAC Now

Download Publication

Enterprise Architecture to CCM Shared Responsibility Model
Enterprise Architecture to CCM Shared Responsibility Model

Enterprise Architecture to CCM Shared Responsibility Model

Release Date: 12/18/2020

The EA-CCM Shared Responsibility Model is a companion piece with the EA-CCM Mapping.

The Enterprise Architecture working group's Enterprise Reference Architecture (ERA) is both a methodology and a set of tools enabling security architects, enterprise architects and GRC professionals to leverage a common set of solutions that fulfill their common needs. The expectation is the ERA will assist in assessments where their internal IT and their cloud providers are in terms of security capabilities and roadmap planning to meet the security needs of their business. The ERA provides a security viewpoint on a typical Enterprise Architecture, thus taking a domain-based approach covering Business Operations, IT Operations, Security and Risk Management as well as the classic layered architecture of Presentation, Application, Information, and Infrastructure domains.

The mapping of CCM controls per the Shared Responsibility Model according to the following service levels - IaaS, PaaS, SaaS. It is intended to give the reader an overview of cloud responsibility with the specific control domain from the view of either the cloud service provider and/or the cloud consumer. 0 (zero) signifies no responsibility, whereas the placement of a 1 (one) signifies the given responsibility. From here, the reader can map that control domain back to the CCM control for further guidance and architecture.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
CCM v4.0 Addendum - ECUC PP v2.1
CCM v4.0 Addendum - ECUC PP v2.1
How to Design a Secure Serverless Architecture
How to Design a Secure Serverless Architecture
Utah S.B. 149: Creating a Safe Space for Developers While Regulating Deceptive AI
Utah S.B. 149: Creating a Safe Space for Developers While Regulatin...
Published: 05/09/2024
How DSPM Can Help Solve Healthcare Cybersecurity Attacks
How DSPM Can Help Solve Healthcare Cybersecurity Attacks
Published: 04/30/2024
Your Ultimate Guide to Security Frameworks
Your Ultimate Guide to Security Frameworks
Published: 04/29/2024
The Future of Cloud Cybersecurity
The Future of Cloud Cybersecurity
Published: 04/29/2024

Acknowledgements

Michael Roza
Michael Roza
Head of Risk, Audit, Control and Compliance

Michael Roza

Head of Risk, Audit, Control and Compliance

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Sean Heide
Sean Heide
Technical Research Director, CSA

Sean Heide

Technical Research Director, CSA

Jon-Michael Brook
Jon-Michael Brook

Jon-Michael Brook

Jon-Michael C. Brook is a certified, 25-year practitioner of cybersecurity, cloud, and privacy. He is the principal contributor to certification sites for privacy and cloud security, and has published books on privacy. Jon-Michael received numerous awards and recognition during his time with Raytheon, Northrop Grumman, Symantec, and Starbucks. He holds patents and trade secrets in intrusion detection, GUI design, and semantic data redaction...

Read more

Ashish Vashishtha
Ashish Vashishtha
Security Compliance Leader

Ashish Vashishtha

Security Compliance Leader

Analytical, results-oriented IS/IT Audit, Governance, Risk, and Compliance (GRC) leader over 19 years of experience managing enterprise-wide IT/IS security risk approach for large healthcare and IT services organizations. Passionate design thinker with an ability to harness innovation by facilitating collaboration to develop enterprise-wide security risk assessments (onsite as well as remote) for high-risk Third-Parties leveraging NIST 800-...

Read more

Michael Theriault Headshot Missing
Michael Theriault

Michael Theriault

Shahid Sharif Headshot Missing
Shahid Sharif

Shahid Sharif

Rolando Marcelo Vallejos Headshot Missing
Rolando Marcelo Vallejos

Rolando Marcelo Vallejos

Henry Werchan Headshot Missing
Henry Werchan

Henry Werchan

Sunil Shanthi Headshot Missing
Sunil Shanthi

Sunil Shanthi

Nataraj Bhargava Headshot Missing
Nataraj Bhargava

Nataraj Bhargava

Jeroen Morrien Headshot Missing
Jeroen Morrien

Jeroen Morrien

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training