Specify how specific technical security controls must be implemented (for example, a security policy might mandate at-rest encryption for a particular class of data and a technical security standard might specify that the encryption implementation must be FIPS 140-2 certified AES-256).
Cloud Controls Matrix (CCM) Data
Physical | Network | Compute | App | Data |
---|---|---|---|---|
False | False | False | True | True |
Corp Gov Relevance |
---|
False |
SaaS | PaaS | IaaS |
---|---|---|
True | True | True |
Service Provider | Tenant / Consumer |
---|---|
True | False |
COBIT 4.1 | HIPAA / HITECH Act | ISO/IEC 27001-2005 |
---|---|---|
45 CFR 164.308(a)(4)(ii)(B) | A.7.1.3 |
NIST SP800-53 R3 | FedRAMP (Final 2012) Low Impact | FedRAMP (Final 2012) Moderate Impact | PCI DSS v2.0 |
---|---|---|---|
SA-11 | NIST SP 800-53 R3 SA-11 | 6.4.3 |
BITS Shared Assessments SIG v6.0 | BITS Shared Assessments SIG v5.0 | GAPP (Aug 2009) |
---|---|---|
I.2.18 | 1.2.6 |
Jericho Forum | NERC CIP |
---|---|
Commandment #9 | CIP-003-3 - R6 |
Consensus Assessments Initiative Questionnaire (CAIQ) Data
COBIT | HIPAA | ISO27001 | SP800_53 |
---|---|---|---|
45 CFR 164.308(a)(4)(ii)(B) | A.7.1.3 | NIST SP800-53 R3 SA-11 |
FedRAMP | PCI_DSS | BITS | GAPP |
---|---|---|---|
NIST SP800-53 R3 SA-11 | PCI DSS v2.0 6.4.3 | SIG v6.0: I.2.18 | GAPP Ref 1.2.6 |
SaaS | PaaS | IaaS |
---|---|---|
True | True | True |
SP | CUST |
---|---|
True | True |