Skip to main content

CCC.VPC.C03: Restrict VPC Peering to Authorized Accounts

Control ID:CCC.VPC.C03
Title:Restrict VPC Peering to Authorized Accounts
Objective:Ensure VPC peering connections are only established with explicitly authorized destinations to limit network exposure and enforce boundary controls.
Control Family:
Network Security

Related Threats

IDTitleDescriptionExternal MappingsCapability MappingsControl Mappings
CCC.VPC.TH03Unauthorized Network Access Through VPC PeeringUnauthorized VPC peering connections can allow network traffic between untrusted or unapproved subscriptions, leading to potential data exposure or exfiltration.
1
1
0

Related Capabilities

IDTitleDescription
CCC.VPC.F11Connectivity Options - VPC PeeringEstablishing a private connection between two VPCs to communicate seamlessly.

Guideline Mappings

Reference IDEntry IDStrengthRemarks
NIST-CSF
PR.AC-3
0
-
CCM
IVS-01
0
-
ISO_27001
2013 A.13.1.3
0
-
NIST_800_53
AC-4
0
-

Assessment Requirements

IDDescriptionApplicability
CCC.VPC.C03.TR01When a VPC peering connection is requested, the service MUST prevent connections from VPCs that are not explicitly allowed.
tlp-green
tlp-amber
tlp-red