Download Publication

Enterprise Architecture v2 to CCM v3.01 Mapping Guide
Release Date: 05/18/2021
Working Group: Enterprise Architecture
- An overview of CSA’s EA and CCM
- An example of how an EA component was mapped to the relevant CCM controls
- Statistics from the mapping, including the mapping universe, the count of the CCM controls that relate to each EA component, and the percentage of the controls identified as relating to each component
- Cybersecurity architects
- Cloud engineers
- Cloud security professionals
- Compliance professionals
Download this Resource
Prefer to access this resource without an account? Download it now.
Related Resources
Acknowledgements

Michael Roza
Risk, Audit, Control, and Compliance Professional
Since 2012 Michael has contributed to over 85 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud Ke...

Jon-Michael Brook
Jon-Michael C. Brook, Principal at Guide Holdings, LLC, has 20 years of experience in Information Security with such organizations as Raytheon, Northrop Grumman, Booz Allen Hamilton, Optiv Security and Symantec. Mr. Brook's work traverses the government, financial, healthcare, gaming, oil and gas and pharmaceutical industries. Mr. Brook obtained a number of industry certifications, including CISSP and CCSK, has patents and trade secrets in...

Ashish Vashishtha
Security Compliance Leader
Analytical, results-oriented IS/IT Audit, Governance, Risk, and Compliance (GRC) leader over 19 years of experience managing enterprise-wide IT/IS security risk approach for large healthcare and IT services organizations. Passionate design thinker with an ability to harness innovation by facilitating collaboration to develop enterprise-wide security risk assessments (onsite as well as remote) for high-risk Third-Parties leveraging NIST 800-...

Renu Bedi
Manager-IT Security
This person does not have a biography listed with CSA.

Sean Heide
Technical Research Director, CSA
This person does not have a biography listed with CSA.

Michael Theriault
This person does not have a biography listed with CSA.

Rolando Marcelo Vallejos
This person does not have a biography listed with CSA.

Henry Werchan
This person does not have a biography listed with CSA.

Jeff Maley
This person does not have a biography listed with CSA.