CryptoCurrency Security Standard (CCSS) v9.0
Industry de facto standard for cryptocurrency exchange and custodian security. 47 control objectives across 10 security aspects covering key/seed generation, wallet creation, key storage, key usage, key compromise protocol, keyholder grant/revoke, third-party audits, data sanitization, proof of reserve, and log auditing. Three certification levels (Level 1-3) with increasing rigour. Published by the CryptoCurrency Certification Consortium (C4).
Controls: 67
Total Mappings: 165
Publisher: CryptoCurrency Certification Consortium (C4) Version: 9.0 (2024) AC (6) AT (1) AU (8) CA (4) CM (5) CP (5) IA (3) IR (5) MP (3) PE (8) PL (1) PM (2) PS (3) RA (1) SA (2) SC (5) SI (5)
AC Access Control
AT Awareness and Training
| Control | Name | CCSS v9.0 References |
|---|---|---|
| AT-03 | Security Training | 1.04.4 |
AU Audit and Accountability
| Control | Name | CCSS v9.0 References |
|---|---|---|
| AU-01 | Audit And Accountability Policy And Procedures | 2.04.1 |
| AU-02 | Auditable Events | 1.05.22.04.1 |
| AU-03 | Content Of Audit Records | 1.05.22.04.1 |
| AU-06 | Audit Monitoring, Analysis, And Reporting | 1.02.82.01.32.03.12.03.22.04.22.04.3 |
| AU-09 | Protection Of Audit Information | 1.04.51.05.22.04.12.04.22.04.3 |
| AU-10 | Non-Repudiation | 1.01.71.04.51.05.11.05.22.02.22.02.32.04.2 |
| AU-11 | Audit Record Retention | 2.03.12.04.3 |
| AU-12 | Audit Record Generation | 1.04.51.05.22.04.1 |
CA Security Assessment and Authorization
CM Configuration Management
CP Contingency Planning
IA Identification and Authentication
IR Incident Response
MP Media Protection
PE Physical and Environmental Protection
| Control | Name | CCSS v9.0 References |
|---|---|---|
| PE-02 | Physical Access Authorizations | 1.01.11.01.71.03.6 |
| PE-03 | Physical Access Control | 1.01.11.01.71.03.61.05.5 |
| PE-06 | Monitoring Physical Access | 1.01.1 |
| PE-09 | Power Equipment And Power Cabling | 1.03.31.03.7 |
| PE-10 | Emergency Shutoff | 1.03.3 |
| PE-13 | Fire Protection | 1.03.3 |
| PE-14 | Temperature And Humidity Controls | 1.03.31.03.7 |
| PE-18 | Location Of Information System Components | 1.03.4 |
PL Planning
| Control | Name | CCSS v9.0 References |
|---|---|---|
| PL-01 | Security Planning Policy And Procedures | 1.01.51.02.5 |
PM Program Management
PS Personnel Security
RA Risk Assessment
| Control | Name | CCSS v9.0 References |
|---|---|---|
| RA-05 | Vulnerability Scanning | 2.01.12.01.2 |
SA System and Services Acquisition
SC System and Communications Protection
| Control | Name | CCSS v9.0 References |
|---|---|---|
| SC-08 | Transmission Integrity | 1.01.41.06.4 |
| SC-12 | Cryptographic Key Establishment And Management | 1.01.11.01.21.01.41.01.51.01.61.01.71.02.11.02.21.02.31.02.41.02.51.02.61.03.11.03.21.03.61.05.51.06.1 |
| SC-13 | Use Of Cryptography | 1.01.21.01.61.02.11.02.21.03.1 |
| SC-17 | Public Key Infrastructure Certificates | 1.02.4 |
| SC-28 | Protection of Information at Rest | 1.01.11.01.41.03.11.03.61.05.5 |