Cloud 101CircleEventsBlog

Download Publication

Enterprise Architecture v2 to CCM v3.01 Mapping Guide
Enterprise Architecture v2 to CCM v3.01 Mapping Guide

Enterprise Architecture v2 to CCM v3.01 Mapping Guide

Release Date: 05/18/2021

The Enterprise Architecture (EA) is the CSA’s standard cloud reference architecture, while the Cloud Controls Matrix (CCM) is the CSA’s standard control set. By applying the CCM controls, an organization ensures that the EA is operating securely. However, until now, the link between the EA and CCM has never been demonstrated. The EA v2 to CCM v3.0.1 Mapping relates the Enterprise Architecture 2.0 and Cloud Controls Matrix 3.0.1, showing how they can be used together to secure an enterprise architecture.

This document by CSA’s EA Working Group serves as an overview and explanation of the EA to CCM Mapping. We first define the CSA EA and CSA CCM, then demonstrate through example how the mapping was accomplished. After this, the mapping results are provided and explained in a summary. Click here to access the Enterprise Architecture v2 to CCM v3.01 Mapping itself.

For a full explanation of CSA’s Enterprise Architecture, including a description of each domain and its components, refer to the Enterprise Architecture v2 Reference Guide. For quick reference and a visual representation, refer to the Enterprise Architecture Reference Diagram.

Key Takeaways:
  • An overview of CSA’s EA and CCM
  • An example of how an EA component was mapped to the relevant CCM controls
  • Statistics from the mapping, including the mapping universe, the count of the CCM controls that relate to each EA component, and the percentage of the controls identified as relating to each component
Who It’s For:
  • Cybersecurity architects
  • Cloud engineers
  • Cloud security professionals
  • Compliance professionals
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Map the Transaction Flows for Zero Trust
Map the Transaction Flows for Zero Trust
Top Concerns With Vulnerability Data
Top Concerns With Vulnerability Data
Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives
Using Asymmetric Cryptography to Help Achieve Z...
Legacy MFT Solutions Might Not Look Broken, But They Are
Legacy MFT Solutions Might Not Look Broken, But They Are
Published: 12/03/2024
Defining Identities, Accounts, and the Challenge of Privilege Sprawl
Defining Identities, Accounts, and the Challenge of Privilege Sprawl
Published: 12/02/2024
Readiness Assessments: A Crucial Part of Your SOC Engagement
Readiness Assessments: A Crucial Part of Your SOC Engagement
Published: 12/02/2024
A Wednesday in the Life of a Threat Hunter
A Wednesday in the Life of a Threat Hunter
Published: 11/27/2024

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 125 projects, as a Lead Author or Author/Contributor and many more as a Reviewer/Editor.

Michael's extensive contributions encompass critical areas including Artificial Intelligence, Zero Trust/Software Defined Perimeter, Internet of Things, Top Threats, Cloud Control Matrix, DevSecOps, and Key Management. His lea...

Read more

Jon-Michael Brook
Jon-Michael Brook

Jon-Michael Brook

Jon-Michael C. Brook is a certified, 25-year practitioner of cybersecurity, cloud, and privacy. He is the principal contributor to certification sites for privacy and cloud security, and has published books on privacy. Jon-Michael received numerous awards and recognition during his time with Raytheon, Northrop Grumman, Symantec, and Starbucks. He holds patents and trade secrets in intrusion detection, GUI design, and semantic data redaction...

Read more

Ashish Vashishtha
Ashish Vashishtha
Security Compliance Leader

Ashish Vashishtha

Security Compliance Leader

Analytical, results-oriented IS/IT Audit, Governance, Risk, and Compliance (GRC) leader over 19 years of experience managing enterprise-wide IT/IS security risk approach for large healthcare and IT services organizations. Passionate design thinker with an ability to harness innovation by facilitating collaboration to develop enterprise-wide security risk assessments (onsite as well as remote) for high-risk Third-Parties leveraging NIST 800-...

Read more

Renu Bedi
Renu Bedi
Manager-IT Security

Renu Bedi

Manager-IT Security

Jeff Maley Headshot Missing
Jeff Maley

Jeff Maley

Sean Heide
Sean Heide
Technical Research Director, CSA

Sean Heide

Technical Research Director, CSA

Michael Theriault Headshot Missing
Michael Theriault

Michael Theriault

Rolando Marcelo Vallejos Headshot Missing
Rolando Marcelo Vallejos

Rolando Marcelo Vallejos

Henry Werchan Headshot Missing
Henry Werchan

Henry Werchan

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training