ChaptersEventsBlog

Download Publication

Mapping of 'The Guidelines' Security Recommendations to CCM
Mapping of 'The Guidelines' Security Recommendations to CCM

Mapping of 'The Guidelines' Security Recommendations to CCM

Release Date: 09/05/2019

This document contains the additional controls that serve to bridge the gap between CCM V3.0.1 and the controls within 'Guideline on Effectively Managing Security Services in the Cloud' published by Cloud Security Services Working Group.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Introductory Guidance to AICM
Introductory Guidance to AICM
AICM Implementation & Auditing Guidelines (Frameworks)
AICM Implementation & Auditing Guidelines (Fram...
AI Controls Matrix
AI Controls Matrix
Agentic AI Security: New Dynamics, Trusted Foundations
Agentic AI Security: New Dynamics, Trusted Foundations
Published: 12/18/2025
AI Security Governance: Your Maturity Multiplier
AI Security Governance: Your Maturity Multiplier
Published: 12/18/2025
Enhancing the Agentic AI Security Scoping Matrix: A Multi-Dimensional Approach
Enhancing the Agentic AI Security Scoping Matrix: A Multi-Dimension...
Published: 12/16/2025
Micro-Segment the Metal: A Zero Trust Field Guide for Physical Hosts
Micro-Segment the Metal: A Zero Trust Field Guide for Physical Hosts
Published: 12/12/2025

Interested in helping develop research with CSA?

Related Certificates & Training