Download Publication
Enterprise Architecture v2 to CCM v3.01 Mapping Guide
Release Date: 05/18/2021
Working Group: Enterprise Architecture
- An overview of CSA’s EA and CCM
- An example of how an EA component was mapped to the relevant CCM controls
- Statistics from the mapping, including the mapping universe, the count of the CCM controls that relate to each EA component, and the percentage of the controls identified as relating to each component
- Cybersecurity architects
- Cloud engineers
- Cloud security professionals
- Compliance professionals
Download this Resource
Prefer to access this resource without an account? Download it now.
Acknowledgements
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC
Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 125 projects, as a Lead Author or Author/Contributor and many more as a Reviewer/Editor.
Michael's extensive contributions encompass critical areas including Artificial Intelligence, Zero Trust/Software Defined Perimeter, Internet of Things, Top Threats, Cloud Control Matrix, DevSecOps, and Key Management. His lea...
Jon-Michael Brook
Jon-Michael C. Brook is a certified, 25-year practitioner of cybersecurity, cloud, and privacy. He is the principal contributor to certification sites for privacy and cloud security, and has published books on privacy. Jon-Michael received numerous awards and recognition during his time with Raytheon, Northrop Grumman, Symantec, and Starbucks. He holds patents and trade secrets in intrusion detection, GUI design, and semantic data redaction...
Ashish Vashishtha
Security Compliance Leader
Analytical, results-oriented IS/IT Audit, Governance, Risk, and Compliance (GRC) leader over 19 years of experience managing enterprise-wide IT/IS security risk approach for large healthcare and IT services organizations. Passionate design thinker with an ability to harness innovation by facilitating collaboration to develop enterprise-wide security risk assessments (onsite as well as remote) for high-risk Third-Parties leveraging NIST 800-...
Renu Bedi
Manager-IT Security
Jeff Maley
Sean Heide
Technical Research Director, CSA
Michael Theriault
Rolando Marcelo Vallejos
Henry Werchan
Interested in helping develop research with CSA?
Related Certificates & Training
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more