Cloud 101CircleEventsBlog
Call for Presentations: Share your expertise at SECtember.ai 2024! Submit your proposals by June 28th.

Download Publication

CCM v4.0 Addendum - ECUC PP v2.1
CCM v4.0 Addendum - ECUC PP v2.1

CCM v4.0 Addendum - ECUC PP v2.1

Release Date: 02/12/2024

Working Group: Cloud Controls Matrix

This document is an addendum to the 'ECUC Position Paper v2.1 (ECUC PP v2.1) that contains controls mapping between the CSA CCM v4.0 and the ECUC PPv2.1. The document aims to help ECUC PPv2.1 compliant organizations meet CCM v4.0 requirements. This is achieved by identifying compliance gaps in ECUC PPv2.1 in relation to the CCM v4.0. This document contains the following information:
  • Controls Mapping 
  • Gap Identification (i.e. Partial, Full or No Gap)
  • Gap Analysis
 
The document is structured as follows. The tab 'CCMv4.0 - ECUC PPv2.1' contains the mappings as well as associated information such as the gap analysis and compensating controls. In this tab, columns:
• A-D contain the CCMv4.0 domains and control specifications.
• E-H contain the results of the mapping and gap analysis exercise.

The "Terminology" tab provides a list of terms used in this document and their definitions.
 
The CSA and the CCM working group hope that organizations will find this document useful for their cloud security compliance programs.
The contents of this document could contain technical inaccuracies, typographical errors and out-of-date information.

Download this Resource

Bookmark
Share
Related resources
CCM-Lite and CAIQ-Lite
CCM-Lite and CAIQ-Lite
CCM v4.0 Implementation Guidelines
CCM v4.0 Implementation Guidelines
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
Do SOC 2 and ISO 27001 the Right Way with CSA STAR
Do SOC 2 and ISO 27001 the Right Way with CSA STAR
Published: 06/21/2024
CSA STAR: Securing the Cloud and Beyond
CSA STAR: Securing the Cloud and Beyond
Published: 06/04/2024
The Path to SOC 2 Compliance for Startups
The Path to SOC 2 Compliance for Startups
Published: 05/30/2024
Cloud Security Assessment Fundamentals in 2024
Cloud Security Assessment Fundamentals in 2024
Published: 05/29/2024

Acknowledgements

Arpitha Kaushik
Arpitha Kaushik

Arpitha Kaushik

Karnika Sharma
Karnika Sharma
Senior Business Analyst, Infosys

Karnika Sharma

Senior Business Analyst, Infosys

John B. Oseh
John B. Oseh

John B. Oseh

John B. Oseh, M.Eng, CISSP, CCSP, CISA, CRISC, CDPSE, CCAK, CCSK, APMP. Experienced information security consultant.

Read more

Ankit Sharma
Ankit Sharma
Security Officer, Compute BU at Cisco Systems

Ankit Sharma

Security Officer, Compute BU at Cisco Systems

Akash Verma
Akash Verma
Technical Program Manager, Continuous Assurance Engineering, Google

Akash Verma

Technical Program Manager, Continuous Assurance Engineering, Google

Akash Verma serves as the Technical Program Manager for Cybersecurity Continuous Assurance Engineering at Google, overseeing various security engineering programs within Google Cloud's continuous risk and compliance assurance endeavors.

Beyond his responsibilities at Google, Akash collaborates with industry experts to drive research and development initiatives aimed at advancing cybersecurity practices and standards, including, but no...

Read more

Rajat Dubey
Rajat Dubey
Cybersecurity Expert, Allianz Commercial

Rajat Dubey

Cybersecurity Expert, Allianz Commercial

Rajat is an accomplished cybersecurity expert with over 13 years of experience safeguarding critical systems and data for global enterprises. His expertise spans cyber risk assessment, compliance, threat modeling, incident response, Penetration testing, Ethical hacking, Digital Forensic, Cloud Security and emerging technologies (AI, Blockchain, IoT, Quantum computing) for enhanced security.

Read more

Kerry Steele
Kerry Steele
Principal, Coalfire

Kerry Steele

Principal, Coalfire

Kerry Steele is a Principal at Coalfire, a leading cybersecurity advisory and assessment firm, where he provides strategic guidance and solutions for payments and cloud security. He has over 20 years of experience in information security, spanning various domains such as network security, endpoint security, application security, cloud architecture, cloud security, encryption, segmentation, identity and access management, penetration testing...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training