CSA Cloud Controls Matrix v4
Cloud Security Alliance Cloud Controls Matrix v4. 197 controls across 17 cloud security domains.
Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.
Framework Domains (17)
Application & Interface Security
| Code | Title |
|---|---|
| AIS-01 | Application and Interface Security Policy and Procedures |
| AIS-02 | Application Security Baseline Requirements |
| AIS-03 | Application Security Metrics |
| AIS-04 | Secure Application Design and Development |
| AIS-05 | Automated Application Security Testing |
| AIS-06 | Automated Secure Application Deployment |
| AIS-07 | Application Vulnerability Remediation |
Audit & Assurance
| Code | Title |
|---|---|
| AAS-01 | Audit and Assurance Policy and Procedures |
| AAS-02 | Independent Assessments |
| AAS-03 | Risk Based Planning Assessment |
| AAS-04 | Requirements Compliance |
| AAS-05 | Audit Management Process |
| AAS-06 | Remediation |
Business Continuity
| Code | Title |
|---|---|
| BCR-01 | Business Continuity Management Policy |
| BCR-02 | Risk Assessment and Impact Analysis |
| BCR-03 | Business Continuity Strategy |
| BCR-04 | Business Continuity Planning |
| BCR-05 | Documentation |
| BCR-06 | Business Continuity Exercises |
| BCR-07 | Communication |
| BCR-08 | Backup |
| BCR-09 | Disaster Response Testing |
| BCR-10 | Response Plan Exercise |
| BCR-11 | Equipment Redundancy |
Change Control & Configuration Management
| Code | Title |
|---|---|
| CCC-01 | Change Management Policy |
| CCC-02 | Quality Testing |
| CCC-03 | Change Management Technology |
| CCC-04 | Unauthorized Change Protection |
| CCC-05 | Change Agreements |
| CCC-06 | Change Management Baseline |
| CCC-07 | Detection of Baseline Deviation |
| CCC-08 | Exception Management |
| CCC-09 | Change Restoration |
Cryptography Encryption & Key Management
| Code | Title |
|---|---|
| CEK-01 | Encryption and Key Management Policy |
| CEK-02 | CEK Roles and Responsibilities |
| CEK-03 | Data Encryption |
| CEK-04 | Encryption Algorithm |
| CEK-05 | Encryption Change Management |
| CEK-06 | Encryption Change Cost Benefit Analysis |
| CEK-07 | Encryption Risk Management |
| CEK-08 | CSC Key Management Capability |
| CEK-09 | Encryption and Key Management Audit |
| CEK-10 | Key Generation |
| CEK-11 | Key Rotation |
| CEK-12 | Key Rotation |
| CEK-13 | Key Revocation |
| CEK-14 | Key Destruction |
| CEK-15 | Key Activation |
| CEK-16 | Key Suspension |
| CEK-17 | Key Deactivation |
| CEK-18 | Key Archival |
| CEK-19 | Key Compromise |
| CEK-20 | Key Recovery |
| CEK-21 | Key Inventory Management |
Data Security & Privacy
| Code | Title |
|---|---|
| DSP-01 | Disposal and End-of-Mission |
| DSP-02 | Data Inventory |
| DSP-03 | Data Inventory |
| DSP-04 | Data Classification |
| DSP-05 | Data Flow Documentation |
| DSP-06 | Data Ownership and Stewardship |
| DSP-07 | Data Protection by Design and Default |
| DSP-08 | Data Privacy by Design and Default |
| DSP-09 | Data Protection Impact Assessment |
| DSP-10 | Sensitive Data Transfer |
| DSP-11 | Personal Data Access Disclosure and Notification |
| DSP-12 | Limitation of Purpose in Personal Data Processing |
| DSP-13 | Personal Data Sub processing |
| DSP-14 | Disclosure of Data Sub processors |
| DSP-15 | Limitation of Production Data Use |
| DSP-16 | Data Retention and Deletion |
| DSP-17 | Sensitive Data Protection |
| DSP-18 | Disclosure Notification |
| DSP-19 | Data Location |
Datacenter Security
| Code | Title |
|---|---|
| DCS-01 | Off-site Equipment Disposal |
| DCS-02 | Off Site Transfer Authorization Policy and Procedures |
| DCS-03 | Secure Area Policy and Procedures |
| DCS-04 | Secure Media Transportation Policy and Procedures |
| DCS-05 | Assets Classification |
| DCS-06 | Assets Cataloguing and Tracking |
| DCS-07 | Controlled Access Points |
| DCS-08 | Equipment Identification |
| DCS-09 | Secure Area Authorization |
| DCS-10 | Surveillance System |
| DCS-11 | Unauthorized Access Response Training |
| DCS-12 | Cabling Security |
| DCS-13 | Environmental Systems |
| DCS-14 | Secure Utilities |
| DCS-15 | Equipment Location |
Governance Risk & Compliance
| Code | Title |
|---|---|
| GRC-01 | Governance Program |
| GRC-02 | Risk Management Program |
| GRC-03 | Organizational Policy Reviews |
| GRC-04 | Policy Exception Process |
| GRC-05 | Information Security Program |
| GRC-06 | Governance Responsibility Model |
| GRC-07 | Information System Regulatory Mapping |
| GRC-08 | Special Interest Groups |
Human Resources
| Code | Title |
|---|---|
| HRS-01 | Background Screening |
| HRS-02 | Security Training |
| HRS-03 | Clean Desk Policy and Procedures |
| HRS-04 | Employment Termination |
| HRS-05 | Asset returns |
| HRS-06 | Employment Termination |
| HRS-07 | Employment Agreement Process |
| HRS-08 | Employment Agreement Content |
| HRS-09 | Personnel Roles and Responsibilities |
| HRS-10 | Non Disclosure Agreements |
| HRS-11 | Security Awareness Training |
| HRS-12 | Personal and Sensitive Data Awareness and Training |
| HRS-13 | Compliance User Responsibility |
Identity & Access Management
| Code | Title |
|---|---|
| IAM-01 | Identity and Access Management Policy |
| IAM-02 | Strong Authentication |
| IAM-03 | Identity Inventory |
| IAM-04 | Separation of Duties |
| IAM-05 | Least Privilege |
| IAM-06 | User Access Provisioning |
| IAM-07 | User Access Changes and Revocation |
| IAM-08 | User Access Review |
| IAM-09 | Segregation of Privileged Access Roles |
| IAM-10 | Management of Privileged Access Roles |
| IAM-11 | CSCs Approval for Agreed Privileged Access Roles |
| IAM-12 | Safeguard Logs Integrity |
| IAM-13 | Uniquely Identifiable Users |
| IAM-14 | Strong Authentication |
| IAM-15 | Passwords Management |
| IAM-16 | Authorization Mechanisms |
Infrastructure & Virtualization Security
| Code | Title |
|---|---|
| IVS-01 | Infrastructure and Virtualization Security |
| IVS-02 | Capacity and Resource Planning |
| IVS-03 | Network Security |
| IVS-04 | Network Security |
| IVS-05 | Production and Non Production Environments |
| IVS-06 | Segmentation and Segregation |
| IVS-07 | Migration to Cloud Environments |
| IVS-08 | Network Architecture Documentation |
| IVS-09 | Network Defense |
Interoperability & Portability
| Code | Title |
|---|---|
| IPY-01 | Interoperability and Portability |
| IPY-02 | Interoperability and Portability Policies |
| IPY-03 | Secure Interoperability and Portability Management |
| IPY-04 | Data Portability Contractual Obligations |
Logging and Monitoring
| Code | Title |
|---|---|
| LOG-01 | Logging and Monitoring |
| LOG-02 | Audit Logs Protection |
| LOG-03 | Security Monitoring and Alerting |
| LOG-04 | Audit Logs Access and Accountability |
| LOG-05 | Audit Logs Monitoring and Response |
| LOG-06 | Clock Synchronization |
| LOG-07 | Logging Scope |
| LOG-08 | Log Records |
| LOG-09 | Log Protection |
| LOG-10 | Encryption Monitoring and Reporting |
| LOG-11 | Transaction/Activity Logging |
| LOG-12 | Access Control Logs |
| LOG-13 | Failures and Anomalies |
Security Incident Mgmt
| Code | Title |
|---|---|
| SEF-01 | Security Incident Management Policy |
| SEF-02 | Service Management Policy and Procedures |
| SEF-03 | Incident Response Plans |
| SEF-04 | Incident Response Testing |
| SEF-05 | Incident Response Metrics |
| SEF-06 | Event Triage Processes |
| SEF-07 | Security Breach Notification |
| SEF-08 | Points of Contact Maintenance |
Supply Chain Management
| Code | Title |
|---|---|
| STA-01 | SSRM Policy and Procedures |
| STA-02 | SSRM Supply Chain |
| STA-03 | SSRM Guidance |
| STA-04 | SSRM Control Ownership |
| STA-05 | SSRM Documentation Review |
| STA-06 | Supply Chain Data Security |
| STA-07 | Supply Chain Inventory |
| STA-08 | Supply Chain Risk Management |
| STA-09 | Primary Service and Contractual Agreement |
| STA-10 | Supply Chain Agreement Review |
| STA-11 | Internal Compliance Testing |
| STA-12 | Supply Chain Service Agreement Compliance |
| STA-13 | Supply Chain Governance Review |
| STA-14 | Supply Chain Data Security Assessment |
Threat & Vulnerability
| Code | Title |
|---|---|
| TVM-01 | Threat and Vulnerability Management Policy |
| TVM-02 | Malware Protection Policy and Procedures |
| TVM-03 | Vulnerability Remediation Schedule |
| TVM-04 | Detection Updates |
| TVM-05 | External Library Vulnerabilities |
| TVM-06 | Penetration Testing |
| TVM-07 | Vulnerability Prioritization |
| TVM-08 | Vulnerability Prioritization |
| TVM-09 | Vulnerability Management Reporting |
| TVM-10 | Vulnerability Management Metrics |
Universal Endpoint Management
| Code | Title |
|---|---|
| UEM-01 | Endpoint Management |
| UEM-02 | Application and Service Approval |
| UEM-03 | Compatibility |
| UEM-04 | Endpoint Inventory |
| UEM-05 | Endpoint Management |
| UEM-06 | Automatic Lock Screen |
| UEM-07 | Operating Systems |
| UEM-08 | Storage Encryption |
| UEM-09 | Endpoint Management Software Firewall |
| UEM-10 | Software Firewall |
| UEM-11 | Data Loss Prevention |
| UEM-12 | Remote Locate |
| UEM-13 | Remote Wipe |
| UEM-14 | Third Party Endpoint Security Posture |
Frequently Asked Questions
What is CSA Cloud Controls Matrix v4?
CSA Cloud Controls Matrix v4 is a compliance framework from International with 17 domains and 197 controls. Cloud Security Alliance Cloud Controls Matrix v4. 197 controls across 17 cloud security domains. It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.
How many controls does CSA Cloud Controls Matrix v4 have?
CSA Cloud Controls Matrix v4 has 197 controls organised across 17 domains. The largest domains are Cryptography Encryption & Key Management (21 controls), Data Security & Privacy (19 controls), Identity & Access Management (16 controls). Each control defines specific requirements that organisations must implement to achieve compliance.
What frameworks does CSA Cloud Controls Matrix v4 map to?
CSA Cloud Controls Matrix v4 does not currently have cross-framework mappings in our system. Check back as we continuously expand our mapping database.
How do I get started with CSA Cloud Controls Matrix v4 compliance?
Start your CSA Cloud Controls Matrix v4 compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about CSA Cloud Controls Matrix v4 requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 197 controls and track your progress.
Start Your Compliance Journey
Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 769 frameworks.
Get Started Free →Free forever — no credit card required