Cloud Security Alliance Cloud Controls Matrix (CCM) v4.0.1
Cloud Security Alliance Cloud Controls Matrix - cybersecurity control framework for cloud computing
Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.
Framework Domains (31)
AIS - Audit & Assurance
Audit planning, compliance, and assurance programs
| Code | Title |
|---|---|
| CSA-AIS-01 | Audit planning |
| CSA-AIS-02 | Independent assessments |
| CSA-AIS-03 | Risk based planning assessment |
| CSA-AIS-04 | Requirements compliance |
| CSA-AIS-05 | Audit management process |
| CSA-AIS-06 | Remediation |
Application and Interface Security
| Code | Title |
|---|---|
| AIS-01 | Application and Interface Security Policy and Procedures |
| AIS-04 | Secure Application Design and Development |
Audit and Assurance
| Code | Title |
|---|---|
| A&A-01 | Audit and Assurance Policy and Procedures |
| A&A-02 | Independent Assessments |
BCR - Business Continuity Management & Operational Resilience
Business continuity planning and operational resilience
| Code | Title |
|---|---|
| CSA-BCR-01 | Business continuity management policy |
| CSA-BCR-02 | Risk assessment and impact analysis |
| CSA-BCR-03 | Business continuity strategy |
| CSA-BCR-04 | Business continuity planning |
| CSA-BCR-05 | Documentation |
| CSA-BCR-06 | Business continuity exercises |
| CSA-BCR-07 | Communication |
| CSA-BCR-08 | Backup |
| CSA-BCR-09 | Disaster response plan |
| CSA-BCR-10 | Response plan exercise |
| CSA-BCR-11 | Equipment redundancy |
Business Continuity Mgmt and Op Resilience
| Code | Title |
|---|---|
| BCR-01 | Business Continuity Management Policy |
| BCR-09 | Disaster Response Testing |
CCC - Change Control and Configuration Management
Change management and configuration controls
| Code | Title |
|---|---|
| CSA-CCC-01 | Change management policy |
| CSA-CCC-02 | Quality testing |
| CSA-CCC-03 | Change management technology |
| CSA-CCC-04 | Unauthorized change protection |
| CSA-CCC-05 | Change agreements |
| CSA-CCC-06 | Change management baseline |
| CSA-CCC-07 | Detection of baseline deviation |
| CSA-CCC-08 | Exception management |
| CSA-CCC-09 | Change restoration |
CEK - Cryptography, Encryption & Key Management
Cryptographic controls and key management
| Code | Title |
|---|---|
| CSA-CEK-01 | Encryption and key management policy |
| CSA-CEK-02 | CEK roles and responsibilities |
| CSA-CEK-03 | Data encryption |
| CSA-CEK-04 | Encryption algorithm |
| CSA-CEK-05 | Encryption change management |
| CSA-CEK-06 | Encryption risk management |
| CSA-CEK-07 | Key management capability |
| CSA-CEK-08 | CSC key management capability |
| CSA-CEK-09 | Encryption and key management audit |
| CSA-CEK-10 | Key generation |
| CSA-CEK-11 | Key purpose |
| CSA-CEK-12 | Key rotation |
| CSA-CEK-13 | Key revocation |
| CSA-CEK-14 | Key destruction |
| CSA-CEK-15 | Key activation |
| CSA-CEK-16 | Key suspension |
| CSA-CEK-17 | Key deactivation |
| CSA-CEK-18 | Key archival |
| CSA-CEK-19 | Key compromise |
| CSA-CEK-20 | Key recovery |
| CSA-CEK-21 | Key inventory management |
Change Control and Configuration Mgmt
| Code | Title |
|---|---|
| CCC-03 | Change Management Technology |
Cryptography, Encryption and Key Mgmt
| Code | Title |
|---|---|
| CEK-03 | Data Encryption |
| CEK-11 | Key Rotation |
DSP - Data Security & Privacy Lifecycle Management
Data security, privacy, and lifecycle management
| Code | Title |
|---|---|
| CSA-DSP-01 | Security and privacy policy and procedures |
| CSA-DSP-02 | Secure disposal |
| CSA-DSP-03 | Data inventory |
| CSA-DSP-04 | Data classification |
| CSA-DSP-05 | Data flow documentation |
| CSA-DSP-06 | Data ownership and stewardship |
| CSA-DSP-07 | Data protection by design and default |
| CSA-DSP-08 | Data privacy by design and default |
| CSA-DSP-09 | Data protection impact assessment |
| CSA-DSP-10 | Sensitive data transfer |
| CSA-DSP-11 | Personal data access, reversal, rectification and deletion |
| CSA-DSP-12 | Limitation of purpose in personal data processing |
| CSA-DSP-13 | Personal data sub-processing |
| CSA-DSP-14 | Disclosure of data sub-processors |
| CSA-DSP-15 | Limitation of production data use |
| CSA-DSP-16 | Data retention and deletion |
| CSA-DSP-17 | Sensitive data protection |
| CSA-DSP-18 | Disclosure notification |
| CSA-DSP-19 | Data location |
Data Security and Privacy
| Code | Title |
|---|---|
| DSP-07 | Data Protection by Design and Default |
Datacenter Security
| Code | Title |
|---|---|
| DCS-05 | Assets Classification |
GRC - Governance, Risk and Compliance
Governance, risk management, and compliance programs
| Code | Title |
|---|---|
| CSA-GRC-01 | Governance program |
| CSA-GRC-02 | Risk management program |
| CSA-GRC-03 | Organizational policy |
| CSA-GRC-04 | Policy exception process |
| CSA-GRC-05 | Information security program |
| CSA-GRC-06 | Governance responsibility model |
| CSA-GRC-07 | Information system regulatory mapping |
| CSA-GRC-08 | Special interest groups |
Governance, Risk and Compliance
| Code | Title |
|---|---|
| GRC-04 | Policy Exception Process |
HRS - Human Resources
Human resources security controls
| Code | Title |
|---|---|
| CSA-HRS-01 | Background screening policy and procedures |
| CSA-HRS-02 | Acceptable use of technology policy |
| CSA-HRS-03 | Clean desk policy |
| CSA-HRS-04 | Remote and home working policy |
| CSA-HRS-05 | Asset returns |
| CSA-HRS-06 | Employment termination |
| CSA-HRS-07 | Employment agreement process |
| CSA-HRS-08 | Employment agreement content |
| CSA-HRS-09 | Personnel roles and responsibilities |
| CSA-HRS-10 | Non-disclosure agreements |
| CSA-HRS-11 | Security awareness training |
| CSA-HRS-12 | Personal and sensitive data awareness and training |
| CSA-HRS-13 | Compliance user responsibility |
Human Resources
| Code | Title |
|---|---|
| HRS-04 | Employment Termination |
IAM - Identity & Access Management
Identity and access management controls
| Code | Title |
|---|---|
| CSA-IAM-01 | Identity and access management policy and procedures |
| CSA-IAM-02 | Strong password policy and procedures |
| CSA-IAM-03 | Identity inventory |
| CSA-IAM-04 | Separation of duties |
| CSA-IAM-05 | Least privilege |
| CSA-IAM-06 | User access provisioning |
| CSA-IAM-07 | User access changes and revocation |
| CSA-IAM-08 | User access review |
| CSA-IAM-09 | Segregation of privileged access roles |
| CSA-IAM-10 | Management of privileged access roles |
| CSA-IAM-11 | CSC authorization to tenant and service component provisioning |
| CSA-IAM-12 | Safeguard logs integrity |
| CSA-IAM-13 | Uniquely identifiable users |
| CSA-IAM-14 | Strong authentication |
| CSA-IAM-15 | Passwords management |
| CSA-IAM-16 | Authorization mechanisms |
IVS - Infrastructure & Virtualization Security
Infrastructure and virtualization security controls
| Code | Title |
|---|---|
| CSA-IVS-01 | Infrastructure and virtualization security policy |
| CSA-IVS-02 | Capacity and resource planning |
| CSA-IVS-03 | Network security |
| CSA-IVS-04 | OS hardening and base controls |
| CSA-IVS-05 | Production and non-production environments |
| CSA-IVS-06 | Segmentation and segregation |
| CSA-IVS-07 | Migration to cloud environments |
| CSA-IVS-08 | Network architecture documentation |
| CSA-IVS-09 | Network defense |
Identity and Access Mgmt
| Code | Title |
|---|---|
| IAM-03 | Identity Inventory |
| IAM-14 | Strong Authentication |
Infrastructure and Virtualization Security
| Code | Title |
|---|---|
| IVS-04 | Network Security |
Interoperability and Portability
| Code | Title |
|---|---|
| IPY-02 | Interoperability and Portability Policies |
LOG - Logging and Monitoring
Logging, monitoring, and alerting controls
| Code | Title |
|---|---|
| CSA-LOG-01 | Logging and monitoring policy |
| CSA-LOG-02 | Security incident management |
| CSA-LOG-03 | Security monitoring and alerting |
| CSA-LOG-04 | Audit logs protection |
| CSA-LOG-05 | Audit logs monitoring and response |
| CSA-LOG-06 | Clock synchronization |
| CSA-LOG-07 | Logging scope |
| CSA-LOG-08 | Log records |
| CSA-LOG-09 | Log protection |
| CSA-LOG-10 | Encryption monitoring and reporting |
| CSA-LOG-11 | Transaction/activity logging |
| CSA-LOG-12 | Access control logs |
| CSA-LOG-13 | Failures and anomalies reporting |
Logging and Monitoring
| Code | Title |
|---|---|
| LOG-08 | Log Records |
| LOG-13 | Failures and Anomalies |
SEF - Security Incident Management, E-Discovery & Cloud Forensics
Security incident management and forensic investigation
| Code | Title |
|---|---|
| CSA-SEF-01 | Security incident management policy and procedures |
| CSA-SEF-02 | Service management policy and procedures |
| CSA-SEF-03 | Incident response plans |
| CSA-SEF-04 | Incident response testing |
| CSA-SEF-05 | Incident response metrics |
| CSA-SEF-06 | Event triage processes |
| CSA-SEF-07 | Security breach notification |
| CSA-SEF-08 | Points of contact maintenance |
STA - Supply Chain Management, Transparency & Accountability
Supply chain management, transparency, and accountability
| Code | Title |
|---|---|
| CSA-STA-01 | Supply chain management policy and procedures |
| CSA-STA-02 | Supply chain inventory |
| CSA-STA-03 | Supply chain agreement assurance |
| CSA-STA-04 | Supply chain data security assessment |
| CSA-STA-05 | Supply chain governance review |
| CSA-STA-06 | Supply chain governance assurance |
| CSA-STA-07 | Supply chain due diligence |
| CSA-STA-08 | Supply chain service agreement review |
| CSA-STA-09 | Primary service agreements |
| CSA-STA-10 | Supply chain data governance |
| CSA-STA-11 | Internal compliance testing |
| CSA-STA-12 | Supply chain service agreement compliance |
| CSA-STA-13 | Supply chain governance exception processes |
| CSA-STA-14 | Supply chain metrics |
Security Incident Management
| Code | Title |
|---|---|
| SEF-03 | Incident Response Plans |
Supply Chain Management
| Code | Title |
|---|---|
| STA-06 | Supply Chain Data Security |
TVM - Threat & Vulnerability Management
Threat and vulnerability management controls
| Code | Title |
|---|---|
| CSA-TVM-01 | Vulnerability Management |
| CSA-TVM-02 | Penetration Testing |
| CSA-TVM-03 | Application Security (DevSecOps) |
| CSA-TVM-04 | Vulnerability detection |
| CSA-TVM-05 | Vulnerability management reporting |
| CSA-TVM-06 | Penetration testing |
| CSA-TVM-07 | Vulnerability management metrics |
| CSA-TVM-08 | Vulnerability prioritization |
| CSA-TVM-09 | Vulnerability identification |
| CSA-TVM-10 | Vulnerability management response |
Threat and Vulnerability Mgmt
| Code | Title |
|---|---|
| TVM-04 | Detection Updates |
| TVM-07 | Vulnerability Prioritization |
UEM - Universal Endpoint Management
Endpoint management and protection
| Code | Title |
|---|---|
| CSA-UEM-01 | Endpoint devices policy and procedures |
| CSA-UEM-02 | Application and service approval |
| CSA-UEM-03 | Compatibility |
| CSA-UEM-04 | Endpoint inventory |
| CSA-UEM-05 | Endpoint management |
| CSA-UEM-06 | Automatic lock screen |
| CSA-UEM-07 | Operating systems |
| CSA-UEM-08 | Storage encryption |
| CSA-UEM-09 | Anti-malware detection and prevention |
| CSA-UEM-10 | Software firewall |
| CSA-UEM-11 | Data loss prevention |
| CSA-UEM-12 | Remote locate |
| CSA-UEM-13 | Remote wipe |
| CSA-UEM-14 | Third-party endpoint security posture |
Universal Endpoint Management
| Code | Title |
|---|---|
| UEM-09 | Endpoint Management Software Firewall |
| UEM-12 | Remote Locate |
Your Compliance Coverage
If you comply with Cloud Security Alliance Cloud Controls Matrix (CCM) v4.0.1, you already cover:
ISO 27001:2022
63%
123 controls mapped
Compare →TISAX - Trusted Information Security Assessment Exchange
23%
46 controls mapped
Compare →PAS 1192-5:2015 - Security-Minded Approach to BIM and Digital Built Environments
22%
43 controls mapped
Compare →+ 661 more: New Zealand Information Security Manual (NZISM) (22%), FAA Cybersecurity Framework for Aviation (22%)
See all 664 mapped frameworks ↓Maps to 664 other frameworks
Frequently Asked Questions
What is Cloud Security Alliance Cloud Controls Matrix (CCM) v4.0.1?
Cloud Security Alliance Cloud Controls Matrix (CCM) v4.0.1 is a compliance framework from International with 31 domains and 196 controls. Cloud Security Alliance Cloud Controls Matrix - cybersecurity control framework for cloud computing It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.
How many controls does Cloud Security Alliance Cloud Controls Matrix (CCM) v4.0.1 have?
Cloud Security Alliance Cloud Controls Matrix (CCM) v4.0.1 has 196 controls organised across 31 domains. The largest domains are CEK - Cryptography, Encryption & Key Management (21 controls), DSP - Data Security & Privacy Lifecycle Management (19 controls), IAM - Identity & Access Management (16 controls). Each control defines specific requirements that organisations must implement to achieve compliance.
What frameworks does Cloud Security Alliance Cloud Controls Matrix (CCM) v4.0.1 map to?
Cloud Security Alliance Cloud Controls Matrix (CCM) v4.0.1 maps to 664 other compliance frameworks. The top mapping partners are ISO 27001:2022 (63% coverage), TISAX - Trusted Information Security Assessment Exchange (23% coverage), PAS 1192-5:2015 - Security-Minded Approach to BIM and Digital Built Environments (22% coverage). Use our comparison tool to explore control-level mappings between frameworks.
How do I get started with Cloud Security Alliance Cloud Controls Matrix (CCM) v4.0.1 compliance?
Start your Cloud Security Alliance Cloud Controls Matrix (CCM) v4.0.1 compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about Cloud Security Alliance Cloud Controls Matrix (CCM) v4.0.1 requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 196 controls and track your progress.
Start Your Compliance Journey
Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 768 frameworks.
Get Started Free →Free forever — no credit card required