Download Publication
.png)
CCM Video Series: IPY - Interoperability & Portability
Release Date: 11/18/2024
In this presentation we explore the Interoperability and Portability (IPY) domain of the Cloud Control Matrix (CCM), which comprises four control specifications aimed at ensuring secure and seamless data exchange across multiple platforms and Cloud Service Providers (CSPs). These controls help Cloud Service Customers (CSCs) avoid vendor lock-in and foster an environment where interoperability and portability are not limited by security concerns.
In the Shared Security Responsibility Model (SSRM), both CSPs and CSCs independently share responsibility for ensuring interoperability and portability in the cloud ecosystem. CSPs are typically responsible for implementing standardized communication protocols, maintaining cross-platform compatibility, and ensuring secure data exchange. CSCs, on the other hand, must leverage these tools for secure data backup, transfer, and restoration, as well as manage the integration of cloud environments. Both parties are responsible for documenting data portability obligations, such as defining data ownership and migration procedures.
In the Shared Security Responsibility Model (SSRM), both CSPs and CSCs independently share responsibility for ensuring interoperability and portability in the cloud ecosystem. CSPs are typically responsible for implementing standardized communication protocols, maintaining cross-platform compatibility, and ensuring secure data exchange. CSCs, on the other hand, must leverage these tools for secure data backup, transfer, and restoration, as well as manage the integration of cloud environments. Both parties are responsible for documenting data portability obligations, such as defining data ownership and migration procedures.
Download this Resource
Are you a research volunteer? Request to have your profile displayed on the website here.
Related Certificates & Training

Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more
Learn more