ChaptersEventsBlog
Register now for NHIcon 2026, a half-day online event, to learn what the future of AI security requires.

Download Publication

Mapping of 'The Guidelines' Security Recommendations to CCM
Mapping of 'The Guidelines' Security Recommendations to CCM

Mapping of 'The Guidelines' Security Recommendations to CCM

Release Date: 09/05/2019

This document contains the additional controls that serve to bridge the gap between CCM V3.0.1 and the controls within 'Guideline on Effectively Managing Security Services in the Cloud' published by Cloud Security Services Working Group.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Introductory Guidance to AICM
Introductory Guidance to AICM
AICM Implementation & Auditing Guidelines (Frameworks)
AICM Implementation & Auditing Guidelines (Fram...
AI Controls Matrix
AI Controls Matrix
Micro-Segment the Metal: A Zero Trust Field Guide for Physical Hosts
Micro-Segment the Metal: A Zero Trust Field Guide for Physical Hosts
Published: 12/12/2025
The Ghost in the Machine is a Compulsive Liar
The Ghost in the Machine is a Compulsive Liar
Published: 12/12/2025
The CSA Cloud Controls Matrix v4.1: Strengthening the Future of Cloud Security
The CSA Cloud Controls Matrix v4.1: Strengthening the Future of Clo...
Published: 12/02/2025
It's Time to Rethink Cloud Investigations
It's Time to Rethink Cloud Investigations
Published: 12/02/2025

Interested in helping develop research with CSA?

Related Certificates & Training