ChaptersEventsBlog
How is your enterprise using AI Agents? Help us benchmark security and take the survey before November 30 →

Download Publication

Enterprise Architecture to CCM v3.01 Reordered Mapping
Enterprise Architecture to CCM v3.01 Reordered Mapping

Enterprise Architecture to CCM v3.01 Reordered Mapping

Release Date: 05/18/2021

The Enterprise Architecture (EA) is CSA’s standard cloud reference architecture, while the Cloud Controls Matrix (CCM) is CSA’s standard control set. By applying the CCM controls, an organization ensures that the EA is operating securely. However, until now, the link between the EA and CCM has never been demonstrated. This spreadsheet by CSA’s EA Working Group provides a mapping between the Enterprise Architecture 2.0 and Cloud Controls Matrix 3.0.1, showing how they can be used together to secure an enterprise architecture.

For an overview and explanation of this mapping, refer to the Enterprise Architecture v2 to CCM v3.01 Mapping Guide. For a full explanation of CSA’s Enterprise Architecture, including a description of each domain and its components, refer to the Enterprise Architecture v2 Reference Guide. For quick reference and a visual representation, refer to the Enterprise Architecture Reference Diagram.

Key Takeaways:
  • How the CCM controls relate to each EA component
  • Statistics from the mapping
Who It’s For:
  • Cybersecurity architects
  • Cloud engineers
  • Cloud security professionals
  • Compliance professionals
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Introductory Guidance to AICM
Introductory Guidance to AICM
AICM Implementation & Auditing Guidelines (Frameworks)
AICM Implementation & Auditing Guidelines (Fram...
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation
Zero Trust Guidance for Small and Medium Size B...
Implementing CCM: Threat & Vulnerability Management Controls
Implementing CCM: Threat & Vulnerability Management Controls
Published: 11/21/2025
It’s Time to Make Cloud Threat Modeling Continuous
It’s Time to Make Cloud Threat Modeling Continuous
Published: 11/20/2025
Understanding STAR for AI Level 2: A Practical Step Toward AI Security Compliance
Understanding STAR for AI Level 2: A Practical Step Toward AI Secur...
Published: 11/19/2025
VDI, DaaS, or Local Secure Enclaves? A CCM‑Aligned Playbook for BYOD in 2025
VDI, DaaS, or Local Secure Enclaves? A CCM‑Aligned Playbook for BYO...
Published: 11/04/2025

Interested in helping develop research with CSA?

Related Certificates & Training