Skip to main content

CCC Virtual Private Cloud

This documents the minimal set of features that should be present for a virtual private cloud service to be considered for use in financial services ecosystems.

Release Details

Version:
2025.01
View on GitHub
Assurance Level:
None
Release Manager:
DB
Damien Burksdamienjburks
Citi

Contributors

ML
Michael Lysaghtmlysaght2017
Citi
SM
Sonali Mendissmendis-scottlogic
Scott Logic
EK
Eddie Knighteddie-knight
Sonatype
DO
Scott Logic
K
kazmik23kazmik23
Google

Change Log

  • This initial release contains a variety of commits designed to capture all of the features, threats, and controls for this service category.

Features

IDTitleDescription
CCC.F01Encryption in Transit Enabled by DefaultProvides default encryption of data in transit through SSL or TLS.
CCC.F02Encryption at Rest Enabled by DefaultProvides default encryption of data before storage, with the option for clients to maintain control over the encryption keys.
CCC.F03Access/Activity LogsProvides users with the ability to track all requests made to or activities performed on resources for audit purposes.
CCC.F04Transaction Rate LimitsAllows the setting of a threshold where industry-standard throughput is achieved up to the specified rate limit.
CCC.F05Signed URLsProvides the ability to grant temporary or restricted access to a resource through a custom URL that contains authentication information.
CCC.F06Identity Based Access ControlProvides the ability to determine access to resources based on attributes associated with a user identity.
CCC.F07Event NotificationsPublishes events for creation, deletion, and modification of objects in a way that enables users to trigger actions in response.
CCC.F08Multi-zone DeploymentProvides the ability for the service to be deployed in multiple availability zones or regions to increase availability and fault tolerance.
CCC.F09MonitoringProvides the ability to continuously observe, track, and analyze the performance, availability, and health of the service resources or applications.
CCC.F10LoggingProvides the ability to transmit system events, application activities, and/or user interactions to a logging service
CCC.F11BackupProvides the ability to create copies of associated data or configurations in the form of automated backups, snapshot-based backups, and/or incremental backups.
CCC.F12RecoveryProvides the ability to restore data, a system, or an application to a functional state after an incident such as data loss, corruption or a disaster.
CCC.F13Infrastructure as CodeAllows for managing and provisioning service resources through machine-readable configuration files, such as templates.
CCC.F14API AccessAllows users to interact programmatically with the service and its resources using APIs, SDKs and CLI.
CCC.F15Cost ManagementProvides the ability to filter spending and to detect cost anomalies for the service.
CCC.F16BudgetingProvides the ability to trigger alerts when spending thresholds are approached or exceeded for the service.
CCC.F17AlertingProvides the ability to set an alarm based on performance metrics, logs, events or spending thresholds of the service.
CCC.F18VersioningProvides the ability to maintain multiple versions of the same resource.
CCC.F19On-demand ScalingProvide scaling of resources based on demand.
CCC.F20TaggingProvide the ability to tag a resource to effectively manage and gain insights of the resource.
CCC.F21ReplicationProvides the ability to copy data or resource to multiple locations to ensure availability and durability.
CCC.F22Location Lock-InProvides the ability to control where the resources are created.
CCC.F23Network Access RulesAbility to control access to the resource by defining network access rules.
CCC.VPC.F01Isolated Custom Network CreationAbility to create a virtual network that is isolated from other users of the same public cloud.
CCC.VPC.F02IPv4 CIDR BlockAbility to specify a IPv4 CIDR block to the virtual network.
CCC.VPC.F03IPv6 CIDR BlockAbility to specify a IPv6 CIDR block to the virtual network.
CCC.VPC.F04Public Subnet CreationAbility to create a subnet that allows resources within the subnet to communicate with the public internet.
CCC.VPC.F05Private Subnet CreationAbility to create a subnet that resources within the subnet cannot directly access the public internet.
CCC.VPC.F06Multiple Availability Zones for SubnetsAbility to spread the subnets in more than one availability zones.
CCC.VPC.F07Routing ControlAbility to control traffic within the VPC and between the VPC and the internet or on-premises networks using customizable route tables.
CCC.VPC.F08Connectivity Options - Internet GatewayEnables direct internet access for resources within a VPC.
CCC.VPC.F09Connectivity Options - NAT GatewaysAllows instances in private subnets to access the internet without exposing them to inbound internet traffic.
CCC.VPC.F10Connectivity Options - Private ConnectionDedicated, private, high-speed connections between on-premises networks and cloud VPC.
CCC.VPC.F11Connectivity Options - VPC PeeringEstablishing a private connection between two VPCs to communicate seamlessly.
CCC.VPC.F12Connectivity Options - Transit GatewaysA hub-and-spoke model for connecting multiple VPCs and on-premises networks.
CCC.VPC.F13Connectivity Options - Site-to-site VPNProvides an encrypted connection over the internet between a VPC and an on-premises network.
CCC.VPC.F14Built-in DNS ResolutionResolves hostnames to IP addresses for instances within the VPC allowing instances to communicate using hostnames instead of IP addresses.
CCC.VPC.F15Built-in DHCP ResolutionAutomatically assign IP addresses, subnet masks, default gateways and other network configurations to instances within the VPC.
CCC.VPC.F16Flow LogsAbility to capture information about the IP traffic going through the VPC.
CCC.VPC.F17VPC EndpointsAbility to allow secure, private connectivity between resources within a VPC and other services without the need for a public internet.

Threats

IDTitleDescriptionMITRE ATT&CK
CCC.TH01Access Control is MisconfiguredAn attacker can exploit misconfigured access controls to grant excessive privileges or gain unauthorized access to sensitive resources.
CCC.TH02Data is Intercepted in TransitIn the event that encrypted communication is not properly in effect, an attacker can intercept traffic between clients and the service to read or modify the data during transmission.
CCC.TH03Deployment Region Network is UntrustedIf any part of the service is deployed in a hostile, unstable, or insecure location, an attacker may attempt to access the resource or intercept data by exploiting privileged network access or physical vulnerabilities.
CCC.TH04Data is Replicated to Untrusted or External LocationsAn attacker could replicate data to untrusted or external locations if replication configurations are not properly restricted. This could result in data leakage or exposure to unauthorized entities outside the organization's trusted perimeter.
CCC.TH05Data is Corrupted During ReplicationMalicious actors may attempt to corrupt, delay, or delete data during replication processes across multiple regions or availability zones, affecting the integrity and availability of data.
CCC.TH06Data is Lost or CorruptedData loss or corruption can occur due to accidental deletion, misconfiguration, or malicious activity. This can result in the loss of critical data, service disruption, or unauthorized access to sensitive information.
CCC.TH07Logs are Tampered With or DeletedAttackers may tamper with or delete logs to cover their tracks and evade detection. This prevents security teams from identifying the full scope of an attack and may disrupt forensic investigations.
CCC.TH08Cost Management Data is ManipulatedAttackers may manipulate cost management data to hide excessive resource consumption or to deceive users about resource usage. This could be used to exhaust budgets, cause financial losses, or evade detection of other attacks.
CCC.TH09Logs or Monitoring Data are Read by Unauthorized UsersUnauthorized access to logs or monitoring data can provide attackers with valuable information about the system's configuration, operations, and security mechanisms. This can be used to identify vulnerabilities, plan attacks, or evade detection.
CCC.TH10Alerts are InterceptedMalicious actors may exploit event notifications to monitor and intercept information about sensitive operations or access patterns.
CCC.TH11Event Notifications are Incorrectly TriggeredMalicious actors may exploit event notifications to trigger sensitive operations or access patterns. Alternately, attackers may flood the system with notifications to obfuscate another attack or overwhelm the service to disrupt legitimate operations.
CCC.TH12Resource Constraints are ExhaustedAn attack or misconfiguration can consume all available resources, such as memory, CPU, or storage, to disrupt the service or deny access to legitimate users. This can be achieved through repeated requests, resource-intensive operations, or the lowering of rate/budget limits. Through auto-scaling, the attacker may also attempt to exhaust higher-level budget thresholds to impact other systems in the same scope.
CCC.TH13Resource Tags are ManipulatedAttackers may manipulate resource tags to alter organizational policies, disrupt billing, or evade detection. This can result in mismanaged resources, unauthorized access, or financial abuse.
CCC.TH14Older Resource Versions are ExploitedAttackers may exploit vulnerabilities in older versions of resources, taking advantage of deprecated or insecure configurations. Without proper version control and monitoring, outdated versions can be used to bypass security measures.
CCC.TH15Automated Enumeration and Reconnaissance by Non-human EntitiesAttackers may deploy automated processes or bots to perform reconnaissance activities by enumerating resources such as APIs, file systems, or directories. These activities can help attackers identify vulnerabilities, misconfigurations, or unsecured resources, which can then be exploited for unauthorized access or data theft.
CCC.VPC.TH01Unauthorized Access via Insecure Default NetworksDefault network configurations may include insecure settings and open firewall rules,leading to unauthorized access and potential data breaches.
CCC.VPC.TH02Exposure of Resources to Public InternetAssignment of external IP addresses to resources exposes resources to the public internet, increasing the risk of attacks such as brute force, exploitation of vulnerabilities, or unauthorized access.
CCC.VPC.TH03Unauthorized Network Access Through VPC PeeringUnauthorized VPC peering connections can allow network traffic between untrusted or unapproved subscriptions, leading to potential data exposure or exfiltration.
CCC.VPC.TH04Lack of Network Visibility due to Disabled VPC Flow LogsVPC subnets with disabled flow logs lack critical network traffic visibility, which can lead to undetected unauthorized access, data exfiltration, and network misconfigurations. This lack of visibility increases the risk of undetected security incidents.
CCC.VPC.TH05Overly Permissive VPC Endpoint PoliciesVPC Endpoint policies that are overly permissive may inadvertently expose resources within the VPC to unintended principals or external threats.

Controls

IDTitleObjectiveControl Family
CCC.C01Prevent Unencrypted RequestsEnsure that all communications are encrypted in transit to protect data integrity and confidentiality.
Data
CCC.C02Ensure Data Encryption at Rest for All Stored DataEnsure that all data stored is encrypted at rest to maintain confidentiality and integrity.
Encryption
CCC.C03Implement Multi-factor Authentication (MFA) for AccessEnsure that all sensitive activities require two or more identity factors during authentication to prevent unauthorized access. This may include something you know, something you have, or something you are. In the case of programattically accessible services, such as API endpoints, this includes a combination of API keys or tokens and network restrictions.
Identity and Access Management
CCC.C04Log All Access and ChangesEnsure that all access and changes are logged to maintain a detailed audit trail for security and compliance purposes.
Logging & Monitoring
CCC.C05Prevent Access from Untrusted EntitiesEnsure that secure access controls prevent unauthorized access, mitigate risks of data exfiltration, and block misuse of services by adversaries. This includes restricting access based on trust criteria such as IP allowlists, domain restrictions, and tenant isolation.
Identity and Access Management
CCC.C06Prevent Deployment in Restricted RegionsEnsure that resources are not provisioned or deployed in geographic regions or cloud availability zones that have been designated as restricted or prohibited, to comply with regulatory requirements and reduce exposure to geopolitical risks.
Data
CCC.C07Alert on Unusual Enumeration ActivityEnsure that logs and associated alerts are generated when unusual enumeration activity is detected that may indicate reconnaissance activities.
Logging & Monitoring
CCC.C08Enable Multi-zone or Multi-region Data ReplicationEnsure that data is replicated across multiple zones or regions to protect against data loss due to hardware failures, natural disasters, or other catastrophic events.
Data
CCC.C09Prevent Tampering, Deletion, or Unauthorized Access to Access LogsAccess logs should always be considered sensitive. Ensure that access logs are protected against unauthorized access, tampering, or deletion.
Data
CCC.C10Prevent Data Replication to Destinations Outside of Defined Trust PerimeterPrevent replication of data to untrusted destinations outside of defined trust perimeter. An untrusted destination is defined as a resource that exists outside of a specified trusted identity or network or data perimeter.
Data
CCC.C11Enforce Key Management PoliciesEnsure that encryption keys are managed securely by enforcing the use of approved algorithms, regular key rotation, and customer-managed encryption keys (CMEKs).
Encryption
CCC.VPC.C01Restrict Default Network CreationRestrict the automatic creation of default virtual networks and related resources during subscription initialization to avoid insecure default configurations and enforce custom network policies.
Network Security
CCC.VPC.C02Limit Resource Creation in Public SubnetRestrict the creation of resources in the public subnet with direct access to the internet to minimize attack surfaces.
Network Security
CCC.VPC.C03Restrict VPC Peering to Authorized AccountsEnsure VPC peering connections are only established with explicitly authorized destinations to limit network exposure and enforce boundary controls.
Network Security
CCC.VPC.C04Enforce VPC Flow Logs on VPCsEnsure VPCs are configured with flow logs enabled to capture traffic information.
Network Security