CCoP Compliance Solution for Critical Information Infrastructure (CII)

Meet Singapore’s CCoP Cybersecurity Requirements — Without Managing 6 Different Security Tools

How Mamori Supports Key CCoP Requirements

CCoP 5.1

Access Control

Mamori provides Role-Based authorization and authentication access control.

CCoP 5.2

Accounts Management

Mamori manages Role-Based access to Remote Desktop (RDP), SSH (Linux), databases and records all sessions.

CCoP 5.3

Privileged Access Management

Mamori provides Role-Based Multi-Factored administration access to resources and prevents themselves from auto-approving access to resources that requires approval.

CCoP 5.4

Domain Controller Access Control

Mamori provides Role-Based Multi-Factored Access to specific network IP-Port combinations.

CCoP 5.5

Network Segmentation

Firewall manages the main subnets (layer 0-2), Mamori manages the Role Based micro-segmentations across the subnets.

CCoP 5.6

Network Security

Mamori manages all TCP traffics that it has been configured to control. Manage means that we check the user is able to access a particular IP-Port, multi-factor them, provides the access, logged the access, monitor for abnormal TCP activities.

CCoP 5.7

Secure Remote Connections

Mamori is able to provide secure, multi-factored, encrypted remote access for RDP, SSH and database.

CCoP 5.13

Database Security

Using Mamori Database Activity Monitoring (DAM) through database proxies in Mamori to track all SQLs executed in the database.

CCoP 6.1

Logging

Mamori logs all activities (RDP, SSH, Database, HTTP).

CCoP 6.2

Monitoring and Detection

Mamori creates a security data mart and has a dashboarding capabilities. Mamori also detects database and network abnormalities (e.g. network scan). 

CCoP 10.2

OT Architecture & Security

Mamori solutions works in an air-gap environment in which data flows are restricted. Credentials are protected, for example users do not use database id/password to access database directly.

Other Benefits for CII Operators

1. Strengthen Security Posture

Protect critical infrastructure systems from unauthorized access, external attacks, and insider threats.

3. Simplify Security Operations

Replace multiple solutions with one, unified platform.

2. Achieve Full Visibility

Monitor access activity across servers, networks, and databases in one platform.

4. Accelerate Audit Readiness

Generate detailed logs and audit trails required for regulatory reporting.

Designed for High-Security Environments

Mamori is trusted in environments where security, compliance, and operational continuity are critical, including:

Critical Infrastructure Operators

Healthcare Systems

Government Agencies & Financial Institutions

Energy & Utilities Organizations

Why Security Teams Choose Mamori.io

All-in-One Solution – Our free PAM solution is part of the an all-in-one solution that includes other security and privacy modules such as Zero Trust Network Access (ZTNA), Database Activity Management (DAM), data privacy solution, workflow automation solutions, and AI solutions.

Securing Connection to Anything with an IP AddressAnything with an IP address can be secured, such as desktops, laptops, mobile devices and tablets, Internet of Things (IoT), servers, and databases.

Granular Security Down to Databases – Many security solutions stop at the network or application level. However, it is your databases that holds the mission-critical data. Our free ZTNA solution not only secures connection to the network, but also all devices, including your databases.

Database PAM - Most PAM solutions lack access controls to the database. Our free PAM solution extends access controls down to the database – who has access, what they can see, and what they can do to your data.

2FA Everything - We at Mamori.io believe passwords are inherently insecure. That is why all access are secure with Two-Factor Authentication (2FA) to verify each access by identity.

Workflow Automation - Automate and simplify ISO 27001 A.9 access controls with the ability to terminate unused privileged accounts automatically.

Fast and Frictionless Implementation in 3 Simple Steps with No Network Changes:

  1. Deploy a Mamori Server – After downloading your free ZTNA solution, install it in one of your servers, whether on-premise or cloud. No agents. No changes to servers, directories, or databases required. Setup an admin account and configure 2FA and alert settings.

  2. Integrate with Existing Directory or Create New Identities – Your existing directory and access settings can be easily rolled over.  

  3. Define Access Controls – After defining roles and identities, configure what these roles can access and what they can do with those data. 

Start Your CCoP Compliance Journey

FAQ

  • CCoP is a regulatory framework issued under Singapore’s Cybersecurity Act that defines minimum cybersecurity requirements for Critical Information Infrastructure operators.

  • Organizations designated as Critical Information Infrastructure operators must comply with the code and implement the required cybersecurity controls.

  • Mamori provides a unified platform that supports access control, privileged access management, database monitoring, logging, and anomaly detection required by several CCoP controls.

  • Yes. Mamori supports OT environments, including air-gapped architectures, and provides secure access mechanisms without exposing system credentials.