ChaptersEventsBlog
Register now for NHIcon 2026, a half-day online event, to learn what the future of AI security requires.

Download Publication

Enterprise Architecture to CCM v3.0.1 Mapping
Enterprise Architecture to CCM v3.0.1 Mapping

Enterprise Architecture to CCM v3.0.1 Mapping

Release Date: 12/18/2020

The EA-CCM Mapping is a companion piece with the EA-CCM Shared Responsibility Model.

The Enterprise Architecture working group's Enterprise Reference Architecture (ERA) is both a methodology and a set of tools enabling security architects, enterprise architects and GRC professionals to leverage a common set of solutions that fulfill their common needs. The expectation is the ERA will assist in assessments where their internal IT and their cloud providers are in terms of security capabilities and roadmap planning to meet the security needs of their business. The ERA provides a security viewpoint on a typical Enterprise Architecture, thus taking a domain-based approach covering Business Operations, IT Operations, Security and Risk Management as well as the classic layered architecture of Presentation, Application, Information, and Infrastructure domains.

The mapping of CCM controls per the Shared Responsibility Model according to the following service levels - IaaS, PaaS, SaaS. It is intended to give the reader an overview of cloud responsibility with the specific control domain from the view of either the cloud service provider and/or the cloud consumer. 0 (zero) signifies no responsibility, whereas the placement of a 1 (one) signifies the given responsibility. From here, the reader can map that control domain back to the CCM control for further guidance and architecture.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Introductory Guidance to AICM
Introductory Guidance to AICM
Capabilities-Based Risk Assessment (CBRA) for AI Systems
Capabilities-Based Risk Assessment (CBRA) for A...
AICM Implementation & Auditing Guidelines (Frameworks)
AICM Implementation & Auditing Guidelines (Fram...
Micro-Segment the Metal: A Zero Trust Field Guide for Physical Hosts
Micro-Segment the Metal: A Zero Trust Field Guide for Physical Hosts
Published: 12/12/2025
The Ghost in the Machine is a Compulsive Liar
The Ghost in the Machine is a Compulsive Liar
Published: 12/12/2025
Why Your Copilot Needs a Security Co-Pilot: Enhancing GenAI with Deterministic Fixes
Why Your Copilot Needs a Security Co-Pilot: Enhancing GenAI with De...
Published: 12/10/2025
How to Build AI Prompt Guardrails: An In-Depth Guide for Securing Enterprise GenAI
How to Build AI Prompt Guardrails: An In-Depth Guide for Securing E...
Published: 12/10/2025

Interested in helping develop research with CSA?

Related Certificates & Training