ChaptersEventsBlog

Download Publication

Mapping of 'The Guidelines' Security Recommendations to CCM
Mapping of 'The Guidelines' Security Recommendations to CCM

Mapping of 'The Guidelines' Security Recommendations to CCM

Release Date: 09/05/2019

This document contains the additional controls that serve to bridge the gap between CCM V3.0.1 and the controls within 'Guideline on Effectively Managing Security Services in the Cloud' published by Cloud Security Services Working Group.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Introductory Guidance to AICM
Introductory Guidance to AICM
AICM Implementation & Auditing Guidelines (Frameworks)
AICM Implementation & Auditing Guidelines (Fram...
AI Controls Matrix
AI Controls Matrix
How Organizations are Addressing Cloud Investigation and Response
How Organizations are Addressing Cloud Investigation and Response
Published: 01/22/2026
Beyond Badge-Selling: Why Compliance Automation Needs Trust by Design
Beyond Badge-Selling: Why Compliance Automation Needs Trust by Design
Published: 01/21/2026
AWS Launches European Sovereign Cloud: What You Need to Know and What You Need to Do
AWS Launches European Sovereign Cloud: What You Need to Know and Wh...
Published: 01/16/2026
Reimagining the Browser as a Critical Policy Enforcement Point: A Zero Trust Security Architecture for Modern Enterprises
Reimagining the Browser as a Critical Policy Enforcement Point: A Z...
Published: 01/14/2026

Interested in helping develop research with CSA?

Related Certificates & Training