Skip to main content

CCC.SecMgmt.C02: Enforce Secret Replication Policies

Control ID:CCC.SecMgmt.C02
Title:Enforce Secret Replication Policies
Objective:Ensure that secrets are replicated only to authorized locations as per organizational data residency and compliance requirements.
Control Family:
Data Protection

Related Threats

IDTitleDescriptionExternal MappingsCapability MappingsControl Mappings
CCC.Core.TH03Deployment Region Network is UntrustedSystems are susceptible to unauthorized access or interception by actors with social or physical control over the network in which they are deployed. If the geopolitical status of the deployment network is untrusted, unstable, or insecure, this could result in a loss of confidentiality, integrity, or availability of the service and its data.
1
1
0
CCC.Core.TH04Data is Replicated to Untrusted or External LocationsSystems are susceptible to unauthorized access or interception by actors with political or physical control over the network in which they are deployed. Confidentiality may be impacted if the data is replicated to a network where the geopolitical status is untrusted, unstable, or insecure.
1
1
0

Guideline Mappings

Reference IDEntry IDStrengthRemarks
NIST-CSF
PR.DS-5
0
-
NIST_800_53
AC-3
0
-
NIST_800_53
SC-7
0
-

Assessment Requirements

IDDescriptionApplicability
CCC.SecMgmt.C02.TR01Attempt to retrieve a secret from an unauthorized region and verify that access is denied.
tlp-red
tlp-amber