CCoP Compliance Solution for Critical Information Infrastructure (CII)
Meet Singapore’s CCoP Cybersecurity Requirements — Without Managing 6 Different Security Tools
How Mamori Supports Key CCoP Requirements
CCoP 5.1
Access Control
Mamori provides Role-Based authorization and authentication access control.
CCoP 5.2
Accounts Management
Mamori manages Role-Based access to Remote Desktop (RDP), SSH (Linux), databases and records all sessions.
CCoP 5.3
Privileged Access Management
Mamori provides Role-Based Multi-Factored administration access to resources and prevents themselves from auto-approving access to resources that requires approval.
CCoP 5.4
Domain Controller Access Control
Mamori provides Role-Based Multi-Factored Access to specific network IP-Port combinations.
CCoP 5.5
Network Segmentation
Firewall manages the main subnets (layer 0-2), Mamori manages the Role Based micro-segmentations across the subnets.
CCoP 5.6
Network Security
Mamori manages all TCP traffics that it has been configured to control. Manage means that we check the user is able to access a particular IP-Port, multi-factor them, provides the access, logged the access, monitor for abnormal TCP activities.
CCoP 5.7
Secure Remote Connections
Mamori is able to provide secure, multi-factored, encrypted remote access for RDP, SSH and database.
CCoP 5.13
Database Security
Using Mamori Database Activity Monitoring (DAM) through database proxies in Mamori to track all SQLs executed in the database.
CCoP 6.1
Logging
Mamori logs all activities (RDP, SSH, Database, HTTP).
CCoP 6.2
Monitoring and Detection
Mamori creates a security data mart and has a dashboarding capabilities. Mamori also detects database and network abnormalities (e.g. network scan).
CCoP 10.2
OT Architecture & Security
Mamori solutions works in an air-gap environment in which data flows are restricted. Credentials are protected, for example users do not use database id/password to access database directly.
Other Benefits for CII Operators
1. Strengthen Security Posture
Protect critical infrastructure systems from unauthorized access, external attacks, and insider threats.
3. Simplify Security Operations
Replace multiple solutions with one, unified platform.
2. Achieve Full Visibility
Monitor access activity across servers, networks, and databases in one platform.
4. Accelerate Audit Readiness
Generate detailed logs and audit trails required for regulatory reporting.
Designed for High-Security Environments
Mamori is trusted in environments where security, compliance, and operational continuity are critical, including:
Critical Infrastructure Operators
Healthcare Systems
Government Agencies & Financial Institutions
Energy & Utilities Organizations
Why Security Teams Choose Mamori.io
All-in-One Solution – Our free PAM solution is part of the an all-in-one solution that includes other security and privacy modules such as Zero Trust Network Access (ZTNA), Database Activity Management (DAM), data privacy solution, workflow automation solutions, and AI solutions.
Securing Connection to Anything with an IP Address – Anything with an IP address can be secured, such as desktops, laptops, mobile devices and tablets, Internet of Things (IoT), servers, and databases.
Granular Security Down to Databases – Many security solutions stop at the network or application level. However, it is your databases that holds the mission-critical data. Our free ZTNA solution not only secures connection to the network, but also all devices, including your databases.
Database PAM - Most PAM solutions lack access controls to the database. Our free PAM solution extends access controls down to the database – who has access, what they can see, and what they can do to your data.
2FA Everything - We at Mamori.io believe passwords are inherently insecure. That is why all access are secure with Two-Factor Authentication (2FA) to verify each access by identity.
Workflow Automation - Automate and simplify ISO 27001 A.9 access controls with the ability to terminate unused privileged accounts automatically.
Fast and Frictionless Implementation in 3 Simple Steps with No Network Changes:
Deploy a Mamori Server – After downloading your free ZTNA solution, install it in one of your servers, whether on-premise or cloud. No agents. No changes to servers, directories, or databases required. Setup an admin account and configure 2FA and alert settings.
Integrate with Existing Directory or Create New Identities – Your existing directory and access settings can be easily rolled over.
Define Access Controls – After defining roles and identities, configure what these roles can access and what they can do with those data.
Start Your CCoP Compliance Journey
Are you a small business?
Get Mamori’s free cybersecurity and CCoP compliance solution for small business.
FAQ
-
CCoP is a regulatory framework issued under Singapore’s Cybersecurity Act that defines minimum cybersecurity requirements for Critical Information Infrastructure operators.
-
Organizations designated as Critical Information Infrastructure operators must comply with the code and implement the required cybersecurity controls.
-
Mamori provides a unified platform that supports access control, privileged access management, database monitoring, logging, and anomaly detection required by several CCoP controls.
-
Yes. Mamori supports OT environments, including air-gapped architectures, and provides secure access mechanisms without exposing system credentials.