Skip to main content

CCC.Core.C10: Restrict Data Replication to Trust Perimeter

Control ID:CCC.Core.C10
Title:Restrict Data Replication to Trust Perimeter
Objective:Ensure that data is only replicated on infrastructure in locations that are explicitly included within a defined trust perimeter.
Control Family:
Data

Related Threats

IDTitleDescriptionExternal MappingsCapability MappingsControl Mappings
CCC.Core.TH04Data is Replicated to Untrusted or External LocationsSystems are susceptible to unauthorized access or interception by actors with political or physical control over the network in which they are deployed. Confidentiality may be impacted if the data is replicated to a network where the geopolitical status is untrusted, unstable, or insecure.
1
1
0

Related Capabilities

IDTitleDescription
CCC.Core.F21Resource ReplicationThe service may be configured to replicate child resources across multiple deployments.

Guideline Mappings

Reference IDEntry IDStrengthRemarks
NIST-CSF
PR.DS-5
0
-
CCM
DSP-10
8
Sensitive Data Transfer (only processed within scope as permitted)
CCM
DSP-19
10
Data Location (specify and document the physical locations of data)
NIST_800_53
AC-4
0
-

Assessment Requirements

IDDescriptionApplicability
CCC.Core.C10.TR01When data is replicated, the service MUST ensure that replication only occurs to destinations that are explicitly included within the defined trust perimeter.
tlp-green
tlp-amber
tlp-red