Cloud Security Alliance
CSA offers a practical road map for secure cloud adoption
The Cloud Security Alliance (CSA) today unveiled the third version of its Security Guidance for Critical Areas of Focus in Cloud Computing. This effort provides a practical, …
CSA issues first Security as a Service white paper
The Cloud Security Alliance (CSA) announced that the Security as a Service working group has published its first white paper, “Defined Categories of Service 2011”. …
CSA releases Cloud Controls Matrix 1.2
The Cloud Security Alliance (CSA) launched revision 1.2 of the Cloud Controls Matrix (CCM), available for free here. The CCM is designed to provide fundamental security …
Assessing the security of cloud providers
The Cloud Security Alliance announced the launch of a new initiative to encourage transparency of security practices within cloud providers. The CSA Security, Trust & …
CSA to use CloudTrust Protocol
Cloud Security Alliance (CSA) announced that it has received a no‑cost license for the CloudTrust Protocol (CTP) from CSC. The CTP is being integrated as the fourth …
Cloud Controls Matrix 1.1 released
The Cloud Security Alliance (CSA) launched revision 1.1 of the CCM Security Controls Matrix, available for free here. The Cloud Security Alliance Cloud Controls Matrix (CCM), …
Toolkit to implement and assess cloud security
The Cloud Security Alliance (CSA) announced the free download of the CSA Governance, Risk Management and Compliance (GRC) Stack, a suite of enabling tools for GRC in the …
CloudAudit joins the Cloud Security Alliance
The Cloud Security Alliance (CSA) announced that CloudAudit has become an official project of the CSA, with the joint mission of promoting the use of best practices for …
Questions to ask of a cloud provider
At the RSA Conference Europe 2010, the Cloud Security Alliance (CSA) released version 1.0 of the Consensus Assessments Initiative Questionnaire. The questionnaire is available …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD