Download Publication
Enterprise Architecture v2 to CCM v3.01 Mapping Guide
Release Date: 05/18/2021
Working Group: Enterprise Architecture
The Enterprise Architecture (EA) is the CSA’s standard cloud reference architecture, while the Cloud Controls Matrix (CCM) is the CSA’s standard control set. By applying the CCM controls, an organization ensures that the EA is operating securely. However, until now, the link between the EA and CCM has never been demonstrated. The EA v2 to CCM v3.0.1 Mapping relates the Enterprise Architecture 2.0 and Cloud Controls Matrix 3.0.1, showing how they can be used together to secure an enterprise architecture.
This document by CSA’s EA Working Group serves as an overview and explanation of the EA to CCM Mapping. We first define the CSA EA and CSA CCM, then demonstrate through example how the mapping was accomplished. After this, the mapping results are provided and explained in a summary. Click here to access the Enterprise Architecture v2 to CCM v3.01 Mapping itself.
For a full explanation of CSA’s Enterprise Architecture, including a description of each domain and its components, refer to the Enterprise Architecture v2 Reference Guide. For quick reference and a visual representation, refer to the Enterprise Architecture Reference Diagram.
Key Takeaways:
- An overview of CSA’s EA and CCM
- An example of how an EA component was mapped to the relevant CCM controls
- Statistics from the mapping, including the mapping universe, the count of the CCM controls that relate to each EA component, and the percentage of the controls identified as relating to each component
Who It’s For:
- Cybersecurity architects
- Cloud engineers
- Cloud security professionals
- Compliance professionals
Download this Resource
Prefer to access this resource without an account? Download it now.
Related Resources
Interested in helping develop research with CSA?
Related Certificates & Training
.png)
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more
Learn more

.jpeg)
.jpeg)
.jpeg)
