CSA CCM v4
Cloud Security Alliance Cloud Controls Matrix - cybersecurity control framework for cloud computing
Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.
Framework Domains (14)
AIS - Audit & Assurance
Audit planning, compliance, and assurance programs
| Code | Title |
|---|---|
| CSA-AIS-01 | Audit planning |
| CSA-AIS-02 | Independent assessments |
| CSA-AIS-03 | Risk based planning assessment |
| CSA-AIS-04 | Requirements compliance |
| CSA-AIS-05 | Audit management process |
| CSA-AIS-06 | Remediation |
BCR - Business Continuity Management & Operational Resilience
Business continuity planning and operational resilience
| Code | Title |
|---|---|
| CSA-BCR-01 | Business continuity management policy |
| CSA-BCR-02 | Risk assessment and impact analysis |
| CSA-BCR-03 | Business continuity strategy |
| CSA-BCR-04 | Business continuity planning |
| CSA-BCR-05 | Documentation |
| CSA-BCR-06 | Business continuity exercises |
| CSA-BCR-07 | Communication |
| CSA-BCR-08 | Backup |
| CSA-BCR-09 | Disaster response plan |
| CSA-BCR-10 | Response plan exercise |
| CSA-BCR-11 | Equipment redundancy |
CCC - Change Control and Configuration Management
Change management and configuration controls
| Code | Title |
|---|---|
| CSA-CCC-01 | Change management policy |
| CSA-CCC-02 | Quality testing |
| CSA-CCC-03 | Change management technology |
| CSA-CCC-04 | Unauthorized change protection |
| CSA-CCC-05 | Change agreements |
| CSA-CCC-06 | Change management baseline |
| CSA-CCC-07 | Detection of baseline deviation |
| CSA-CCC-08 | Exception management |
| CSA-CCC-09 | Change restoration |
CEK - Cryptography, Encryption & Key Management
Cryptographic controls and key management
| Code | Title |
|---|---|
| CSA-CEK-01 | Encryption and key management policy |
| CSA-CEK-02 | CEK roles and responsibilities |
| CSA-CEK-03 | Data encryption |
| CSA-CEK-04 | Encryption algorithm |
| CSA-CEK-05 | Encryption change management |
| CSA-CEK-06 | Encryption risk management |
| CSA-CEK-07 | Key management capability |
| CSA-CEK-08 | CSC key management capability |
| CSA-CEK-09 | Encryption and key management audit |
| CSA-CEK-10 | Key generation |
| CSA-CEK-11 | Key purpose |
| CSA-CEK-12 | Key rotation |
| CSA-CEK-13 | Key revocation |
| CSA-CEK-14 | Key destruction |
| CSA-CEK-15 | Key activation |
| CSA-CEK-16 | Key suspension |
| CSA-CEK-17 | Key deactivation |
| CSA-CEK-18 | Key archival |
| CSA-CEK-19 | Key compromise |
| CSA-CEK-20 | Key recovery |
| CSA-CEK-21 | Key inventory management |
DSP - Data Security & Privacy Lifecycle Management
Data security, privacy, and lifecycle management
| Code | Title |
|---|---|
| CSA-DSP-01 | Security and privacy policy and procedures |
| CSA-DSP-02 | Secure disposal |
| CSA-DSP-03 | Data inventory |
| CSA-DSP-04 | Data classification |
| CSA-DSP-05 | Data flow documentation |
| CSA-DSP-06 | Data ownership and stewardship |
| CSA-DSP-07 | Data protection by design and default |
| CSA-DSP-08 | Data privacy by design and default |
| CSA-DSP-09 | Data protection impact assessment |
| CSA-DSP-10 | Sensitive data transfer |
| CSA-DSP-11 | Personal data access, reversal, rectification and deletion |
| CSA-DSP-12 | Limitation of purpose in personal data processing |
| CSA-DSP-13 | Personal data sub-processing |
| CSA-DSP-14 | Disclosure of data sub-processors |
| CSA-DSP-15 | Limitation of production data use |
| CSA-DSP-16 | Data retention and deletion |
| CSA-DSP-17 | Sensitive data protection |
| CSA-DSP-18 | Disclosure notification |
| CSA-DSP-19 | Data location |
GRC - Governance, Risk and Compliance
Governance, risk management, and compliance programs
| Code | Title |
|---|---|
| CSA-GRC-01 | Governance program |
| CSA-GRC-02 | Risk management program |
| CSA-GRC-03 | Organizational policy |
| CSA-GRC-04 | Policy exception process |
| CSA-GRC-05 | Information security program |
| CSA-GRC-06 | Governance responsibility model |
| CSA-GRC-07 | Information system regulatory mapping |
| CSA-GRC-08 | Special interest groups |
HRS - Human Resources
Human resources security controls
| Code | Title |
|---|---|
| CSA-HRS-01 | Background screening policy and procedures |
| CSA-HRS-02 | Acceptable use of technology policy |
| CSA-HRS-03 | Clean desk policy |
| CSA-HRS-04 | Remote and home working policy |
| CSA-HRS-05 | Asset returns |
| CSA-HRS-06 | Employment termination |
| CSA-HRS-07 | Employment agreement process |
| CSA-HRS-08 | Employment agreement content |
| CSA-HRS-09 | Personnel roles and responsibilities |
| CSA-HRS-10 | Non-disclosure agreements |
| CSA-HRS-11 | Security awareness training |
| CSA-HRS-12 | Personal and sensitive data awareness and training |
| CSA-HRS-13 | Compliance user responsibility |
IAM - Identity & Access Management
Identity and access management controls
| Code | Title |
|---|---|
| CSA-IAM-01 | Identity and access management policy and procedures |
| CSA-IAM-02 | Strong password policy and procedures |
| CSA-IAM-03 | Identity inventory |
| CSA-IAM-04 | Separation of duties |
| CSA-IAM-05 | Least privilege |
| CSA-IAM-06 | User access provisioning |
| CSA-IAM-07 | User access changes and revocation |
| CSA-IAM-08 | User access review |
| CSA-IAM-09 | Segregation of privileged access roles |
| CSA-IAM-10 | Management of privileged access roles |
| CSA-IAM-11 | CSC authorization to tenant and service component provisioning |
| CSA-IAM-12 | Safeguard logs integrity |
| CSA-IAM-13 | Uniquely identifiable users |
| CSA-IAM-14 | Strong authentication |
| CSA-IAM-15 | Passwords management |
| CSA-IAM-16 | Authorization mechanisms |
IVS - Infrastructure & Virtualization Security
Infrastructure and virtualization security controls
| Code | Title |
|---|---|
| CSA-IVS-01 | Infrastructure and virtualization security policy |
| CSA-IVS-02 | Capacity and resource planning |
| CSA-IVS-03 | Network security |
| CSA-IVS-04 | OS hardening and base controls |
| CSA-IVS-05 | Production and non-production environments |
| CSA-IVS-06 | Segmentation and segregation |
| CSA-IVS-07 | Migration to cloud environments |
| CSA-IVS-08 | Network architecture documentation |
| CSA-IVS-09 | Network defense |
LOG - Logging and Monitoring
Logging, monitoring, and alerting controls
| Code | Title |
|---|---|
| CSA-LOG-01 | Logging and monitoring policy |
| CSA-LOG-02 | Security incident management |
| CSA-LOG-03 | Security monitoring and alerting |
| CSA-LOG-04 | Audit logs protection |
| CSA-LOG-05 | Audit logs monitoring and response |
| CSA-LOG-06 | Clock synchronization |
| CSA-LOG-07 | Logging scope |
| CSA-LOG-08 | Log records |
| CSA-LOG-09 | Log protection |
| CSA-LOG-10 | Encryption monitoring and reporting |
| CSA-LOG-11 | Transaction/activity logging |
| CSA-LOG-12 | Access control logs |
| CSA-LOG-13 | Failures and anomalies reporting |
SEF - Security Incident Management, E-Discovery & Cloud Forensics
Security incident management and forensic investigation
| Code | Title |
|---|---|
| CSA-SEF-01 | Security incident management policy and procedures |
| CSA-SEF-02 | Service management policy and procedures |
| CSA-SEF-03 | Incident response plans |
| CSA-SEF-04 | Incident response testing |
| CSA-SEF-05 | Incident response metrics |
| CSA-SEF-06 | Event triage processes |
| CSA-SEF-07 | Security breach notification |
| CSA-SEF-08 | Points of contact maintenance |
STA - Supply Chain Management, Transparency & Accountability
Supply chain management, transparency, and accountability
| Code | Title |
|---|---|
| CSA-STA-01 | Supply chain management policy and procedures |
| CSA-STA-02 | Supply chain inventory |
| CSA-STA-03 | Supply chain agreement assurance |
| CSA-STA-04 | Supply chain data security assessment |
| CSA-STA-05 | Supply chain governance review |
| CSA-STA-06 | Supply chain governance assurance |
| CSA-STA-07 | Supply chain due diligence |
| CSA-STA-08 | Supply chain service agreement review |
| CSA-STA-09 | Primary service agreements |
| CSA-STA-10 | Supply chain data governance |
| CSA-STA-11 | Internal compliance testing |
| CSA-STA-12 | Supply chain service agreement compliance |
| CSA-STA-13 | Supply chain governance exception processes |
| CSA-STA-14 | Supply chain metrics |
TVM - Threat & Vulnerability Management
Threat and vulnerability management controls
| Code | Title |
|---|---|
| CSA-TVM-01 | Vulnerability Management |
| CSA-TVM-02 | Penetration Testing |
| CSA-TVM-03 | Application Security (DevSecOps) |
| CSA-TVM-04 | Vulnerability detection |
| CSA-TVM-05 | Vulnerability management reporting |
| CSA-TVM-06 | Penetration testing |
| CSA-TVM-07 | Vulnerability management metrics |
| CSA-TVM-08 | Vulnerability prioritization |
| CSA-TVM-09 | Vulnerability identification |
| CSA-TVM-10 | Vulnerability management response |
UEM - Universal Endpoint Management
Endpoint management and protection
| Code | Title |
|---|---|
| CSA-UEM-01 | Endpoint devices policy and procedures |
| CSA-UEM-02 | Application and service approval |
| CSA-UEM-03 | Compatibility |
| CSA-UEM-04 | Endpoint inventory |
| CSA-UEM-05 | Endpoint management |
| CSA-UEM-06 | Automatic lock screen |
| CSA-UEM-07 | Operating systems |
| CSA-UEM-08 | Storage encryption |
| CSA-UEM-09 | Anti-malware detection and prevention |
| CSA-UEM-10 | Software firewall |
| CSA-UEM-11 | Data loss prevention |
| CSA-UEM-12 | Remote locate |
| CSA-UEM-13 | Remote wipe |
| CSA-UEM-14 | Third-party endpoint security posture |
Maps to 647 other frameworks
Frequently Asked Questions
What is CSA CCM v4?
CSA CCM v4 is a compliance framework from International with 14 domains and 171 controls. Cloud Security Alliance Cloud Controls Matrix - cybersecurity control framework for cloud computing It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.
How many controls does CSA CCM v4 have?
CSA CCM v4 has 171 controls organised across 14 domains. The largest domains are CEK - Cryptography, Encryption & Key Management (21 controls), DSP - Data Security & Privacy Lifecycle Management (19 controls), IAM - Identity & Access Management (16 controls). Each control defines specific requirements that organisations must implement to achieve compliance.
What frameworks does CSA CCM v4 map to?
CSA CCM v4 maps to 647 other compliance frameworks. The top mapping partners are TISAX — Trusted Information Security Assessment Exchange (27% coverage), PAS 1192-5:2015 — Security-Minded Approach to BIM and Digital Built Environments (25% coverage), New Zealand Information Security Manual (NZISM) (25% coverage). Use our comparison tool to explore control-level mappings between frameworks.
How do I get started with CSA CCM v4 compliance?
Start your CSA CCM v4 compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about CSA CCM v4 requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 171 controls and track your progress.
Start Your Compliance Journey
Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 692 frameworks.
Get Started Free →Free forever — no credit card required