Cloud 101CircleEventsBlog
Download Presentations from the CSA AI Summit at RSAC Now

Download Publication

Enterprise Architecture to CCM v3.01 Reordered Mapping
Enterprise Architecture to CCM v3.01 Reordered Mapping

Enterprise Architecture to CCM v3.01 Reordered Mapping

Release Date: 05/18/2021

The Enterprise Architecture (EA) is CSA’s standard cloud reference architecture, while the Cloud Controls Matrix (CCM) is CSA’s standard control set. By applying the CCM controls, an organization ensures that the EA is operating securely. However, until now, the link between the EA and CCM has never been demonstrated. This spreadsheet by CSA’s EA Working Group provides a mapping between the Enterprise Architecture 2.0 and Cloud Controls Matrix 3.0.1, showing how they can be used together to secure an enterprise architecture.

For an overview and explanation of this mapping, refer to the Enterprise Architecture v2 to CCM v3.01 Mapping Guide. For a full explanation of CSA’s Enterprise Architecture, including a description of each domain and its components, refer to the Enterprise Architecture v2 Reference Guide. For quick reference and a visual representation, refer to the Enterprise Architecture Reference Diagram.

Key Takeaways:
  • How the CCM controls relate to each EA component
  • Statistics from the mapping
Who It’s For:
  • Cybersecurity architects
  • Cloud engineers
  • Cloud security professionals
  • Compliance professionals
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
HSM-as-a-Service Use Cases, Considerations, and Best Practices
HSM-as-a-Service Use Cases, Considerations, and...
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
CSA Community Spotlight: Educating the Security Industry with CISO Rick Doten
CSA Community Spotlight: Educating the Security Industry with CISO ...
Published: 05/08/2024
Navigating Legacy Infrastructure: A CISO’s Strategy for Success
Navigating Legacy Infrastructure: A CISO’s Strategy for Success
Published: 05/08/2024
Resource Constraints in Kubernetes and Security
Resource Constraints in Kubernetes and Security
Published: 05/06/2024
Business Risks Explored: Practical Insights for Resilience
Business Risks Explored: Practical Insights for Resilience
Published: 05/03/2024

Acknowledgements

Jon-Michael Brook
Jon-Michael Brook

Jon-Michael Brook

Jon-Michael C. Brook is a certified, 25-year practitioner of cybersecurity, cloud, and privacy. He is the principal contributor to certification sites for privacy and cloud security, and has published books on privacy. Jon-Michael received numerous awards and recognition during his time with Raytheon, Northrop Grumman, Symantec, and Starbucks. He holds patents and trade secrets in intrusion detection, GUI design, and semantic data redaction...

Read more

Michael Roza
Michael Roza
Head of Risk, Audit, Control and Compliance

Michael Roza

Head of Risk, Audit, Control and Compliance

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Sean Heide
Sean Heide
Technical Research Director, CSA

Sean Heide

Technical Research Director, CSA

Shahid Sharif Headshot Missing
Shahid Sharif

Shahid Sharif

Jeff Maley Headshot Missing
Jeff Maley

Jeff Maley

Nabeel Yousif Headshot Missing
Nabeel Yousif

Nabeel Yousif

Troy Peterson Headshot Missing
Troy Peterson

Troy Peterson

Sunil Jaikumar Headshot Missing
Sunil Jaikumar

Sunil Jaikumar

Mike Greer Headshot Missing
Mike Greer

Mike Greer

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training