Download Publication
![Enterprise Architecture to CCM v3.01 Reordered Mapping](https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NDYyNSwicHVyIjoiYmxvYl9pZCJ9fQ==--e0eaf6dfaf15c87460bf326913cd966898ef9554/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJyZXNpemVfdG9fbGltaXQiOlsyMjUsMzAwXX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--ed3d8b3503f8660626bf50138e90f4b6f3228621/index.png)
Enterprise Architecture to CCM v3.01 Reordered Mapping
Release Date: 05/18/2021
Working Groups: Cloud Controls Matrix Enterprise Architecture
- How the CCM controls relate to each EA component
- Statistics from the mapping
- Cybersecurity architects
- Cloud engineers
- Cloud security professionals
- Compliance professionals
Download this Resource
Prefer to access this resource without an account? Download it now.
Related Resources
Acknowledgements
![Jon-Michael Brook](/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MjQyMTQsInB1ciI6ImJsb2JfaWQifX0=--a7375654b40b8faf0196d2525ed503f465a8aabb/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGVnIiwiYXV0b19vcmllbnQiOnRydWUsInJvdGF0ZSI6MCwiZ3Jhdml0eSI6ImNlbnRlciIsInJlc2l6ZSI6IjE4MHgyNDBeIiwiYmFja2dyb3VuZCI6Im5vbmUifSwicHVyIjoidmFyaWF0aW9uIn19--bce64e6cd8e04ad10bf1b7b6142bab4d14a520af/Jon-Michael_Brook_1676316333698001Ti4g_1676328890534001qP6z.jpeg)
Jon-Michael Brook
Jon-Michael C. Brook is a certified, 25-year practitioner of cybersecurity, cloud, and privacy. He is the principal contributor to certification sites for privacy and cloud security, and has published books on privacy. Jon-Michael received numerous awards and recognition during his time with Raytheon, Northrop Grumman, Symantec, and Starbucks. He holds patents and trade secrets in intrusion detection, GUI design, and semantic data redaction...
![Michael Roza](/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6Mzc3NCwicHVyIjoiYmxvYl9pZCJ9fQ==--2ee3c93fe3c1fbe44c00209688a02592cb8f251c/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMTgweDI0MF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ce1f0b273c14895214513c640abe6c284218f1db/roza.jpg)
Michael Roza
Risk, Control and Compliance Professional at EVC
Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...
![Sean Heide](/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTA1OTAsInB1ciI6ImJsb2JfaWQifX0=--6fec6119dd82805dcd73b1f5bee2b5241e75a27e/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGVnIiwiYXV0b19vcmllbnQiOnRydWUsInJvdGF0ZSI6MCwiZ3Jhdml0eSI6ImNlbnRlciIsInJlc2l6ZSI6IjE4MHgyNDBeIiwiYmFja2dyb3VuZCI6Im5vbmUifSwicHVyIjoidmFyaWF0aW9uIn19--bce64e6cd8e04ad10bf1b7b6142bab4d14a520af/sean-h.jpeg)
Sean Heide
Technical Research Director, CSA
![Shahid Sharif Headshot Missing](/assets/fallback/csa-headshot-7b449f5deff0b8be963d29536d108a63e2ef86ec765da989bb085a7d8c14217c.png)
Shahid Sharif
![Jeff Maley Headshot Missing](/assets/fallback/csa-headshot-7b449f5deff0b8be963d29536d108a63e2ef86ec765da989bb085a7d8c14217c.png)
Jeff Maley
![Nabeel Yousif Headshot Missing](/assets/fallback/csa-headshot-7b449f5deff0b8be963d29536d108a63e2ef86ec765da989bb085a7d8c14217c.png)
Nabeel Yousif
![Troy Peterson Headshot Missing](/assets/fallback/csa-headshot-7b449f5deff0b8be963d29536d108a63e2ef86ec765da989bb085a7d8c14217c.png)
Troy Peterson
![Sunil Jaikumar Headshot Missing](/assets/fallback/csa-headshot-7b449f5deff0b8be963d29536d108a63e2ef86ec765da989bb085a7d8c14217c.png)
Sunil Jaikumar
![Mike Greer Headshot Missing](/assets/fallback/csa-headshot-7b449f5deff0b8be963d29536d108a63e2ef86ec765da989bb085a7d8c14217c.png)
Mike Greer