Skip to main content

CCC.Core.C06: Restrict Deployments to Trust Perimeter

Control ID:CCC.Core.C06
Title:Restrict Deployments to Trust Perimeter
Objective:Ensure that the service and its child resources are only deployed on infrastructure in locations that are explicitly included within a defined trust perimeter.
Control Family:
Data

Related Threats

IDTitleDescriptionExternal MappingsCapability MappingsControl Mappings
CCC.Core.TH03Deployment Region Network is UntrustedSystems are susceptible to unauthorized access or interception by actors with social or physical control over the network in which they are deployed. If the geopolitical status of the deployment network is untrusted, unstable, or insecure, this could result in a loss of confidentiality, integrity, or availability of the service and its data.
1
1
0

Related Capabilities

IDTitleDescription
CCC.Core.F22Location Lock-InThe service may be configured to restrict the deployment of child resources to specific geographic locations.

Guideline Mappings

Reference IDEntry IDStrengthRemarks
NIST-CSF
PR.DS-1
0
-
CCM
DSP-19
10
Data Location (specify and document processing and backup locations)
ISO_27001
2013 A.11.1.1
0
-
NIST_800_53
AC-6
0
-

Assessment Requirements

IDDescriptionApplicability
CCC.Core.C06.TR01When the service is running, its region and availability zone MUST be included in a list of explicitly trusted or approved locations within the trust perimeter.
tlp-clear
tlp-green
tlp-amber
tlp-red
CCC.Core.C06.TR02When a child resource is deployed, its region and availability zone MUST be included in a list of explicitly trusted or approved locations within the trust perimeter.
tlp-clear
tlp-green
tlp-amber
tlp-red