CCSK

MISSION STATEMENT

To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.

Learn More
Page Dividing Line

Latest News Arrow to Content

April 21, 2015

(ISC)²® and Cloud Security Alliance Introduce New Cloud Security Certification

Rapid growth and adoption of cloud services increase demand for cloud security expertise

April 20, 2015

Qualys CEO Philippe Courtot Receives the 2015 Industry Leadership Award from the Cloud Security Alliance

Courtot Honored for His Industry Innovations and Support as a Founding Member of the Cloud Security Alliance

April 20, 2015

CSA STAR Registry Surpasses 100 Entries; New CSA STAR Watch Tool Now in Open Beta

Cloud Security Alliance (CSA) today announced significant momentum for the CSA Security, Trust and Assurance Registry (STAR) program.

Read More News

Latest In Research Arrow to Content

April 28, 2015

OPEN PEER REVIEW: Privacy Level Agreement 4 Europe V2

The Cloud Security Alliance would like to invite you to review and comment on the Privacy Level Agreement 4 Europe V2. The Cloud Security Alliance published in February 2013 the “Privacy Level Agreement Outline for CSPs Providing Services in the European Union” (PLA4EU V.1). The PLA4EU V.1 should be considered as a powerful transparency and…

April 20, 2015

CSA Launches New Security Guidance for Early Adopters of the IoT

Cross-Industry Guidance Highlights Key Challenges and Recommended IoT Security Controls. These controls have been tailored to IoT-specific characteristics to allow early adopters to mitigate many of the risks associated with this new technology. San Francisco, CA – April 20, 2015 – The Cloud Security Alliance (CSA) today unveiled a new guidance report titled, New Security Guidance for Early…

April 09, 2015

OPEN PEER REVIEW: Cloud Forensics Capability Maturity Model

The Cloud Security Alliance would like to invite you to review and comment on the Cloud Forensics Capability Maturity Model. This document describes a process maturity model that can be used by both cloud consumers and cloud service provider’s (CSP’s) in assessing their process maturity in conducting digital forensic investigations. The following chapter will describe…

Read More Research News

certification Arrow to Content

CCSK: Certificate of Cloud Security Knowledge

The Certificate of Cloud Security Knowledge (CCSK) is designed to ensure that a broad range of professionals with a responsibility related to cloud computing have a demonstrated awareness of the security threats and best practices for securing the cloud. Learn More

Training Arrow to Content

CSA Training

The Cloud Security Alliance offers training in the following three areas: CCSK training, PCI Cloud training, GRC Stack training. Learn More

Downloads Arrow to Content

Big Data Taxonomy

Big Data Taxonomy

A research document outlining the six dimensions of big data to help decision makers navigate the myriad choices in compute and storage infrastructures as well as data analytics techniques, and security and privacy frameworks.

Release Date: September 18, 2014

Consensus Assessments Initiative Questionnaire v3.0.1

Consensus Assessments Initiative Questionnaire v3.0.1

Realigns the CAIQ questions to CCM v3.0.1 control domains and the Cloud Security Alliance “Security Guidance for Critical Areas of Focus in Cloud Computing V3.0″

Release Date: July 11, 2014

Cloud Controls Matrix v3.0.1

Cloud Controls Matrix v3.0.1

New and updated mappings, consolidation of redundant controls, rewritten controls for clarity of intent, STAR enablement, and SDO alignment.

Release Date: July 11, 2014

Enterprise Architecture v2.0

Enterprise Architecture v2.0

The Enterprise Architecture is both a methodology and a set of tools that enable security architects, enterprise architects and risk management professionals to leverage a common set of solutions that fulfill their common needs to be able to assess where their internal IT and their cloud providers are in terms of security capabilities and to plan a roadmap to meet the security needs of their business.

Release Date: February 25, 2013

Privacy Level Agreement (PLA) Outline for the Sale of Cloud Services in the European Union

Privacy Level Agreement (PLA) Outline for the Sale of Cloud Services in the European Union

The Outline provides a structure for Cloud Service Providers (CSP) to disclose, in a consistent matter, information about the privacy and data protection policies, procedures and practices used when processing personal data that customers upload or store in the CSP’s servers.

Release Date: February 24, 2013

Security Guidance for Critical Areas of Mobile Computing

Security Guidance for Critical Areas of Mobile Computing

Mobile devices empower employees to do what they need to do — whenever and wherever. People can work and collaborate “in the field” with customers, partners, patients or students and each other. But they need to be supported with always current operational processes and information, whether from apps, the Internet, or documents from other people.

Release Date: November 08, 2012

Security Guidance for Critical Areas of Focus in Cloud Computing V3.0

Security Guidance for Critical Areas of Focus in Cloud Computing V3.0

The CSA guidance as it enters its third edition seeks to establish a stable, secure baseline for cloud operations. This effort provides a practical, actionable road map to managers wanting to adopt the cloud paradigm safely and securely. Domains have been rewritten to emphasize security, stability and privacy, ensuring corporate privacy in a multi-tenant environment.

Release Date: November 14, 2011

Consensus Assessments Initiative Questionnaire v1.1

Consensus Assessments Initiative Questionnaire v1.1

Questionnaire is organized using CSA 13 governing & operating domains divided into “control areas” within CSA’s Control Matrix structure.

Release Date: September 01, 2011

STAR Overview PDF

STAR Overview PDF

The CSA STAR Program is a publicly accessible registry designed to recognize the varying assurance requirements and maturity levels of providers and consumers, and is used by customers, providers, industries and governments around the world.

Release Date: April 20, 2015

AOSSL and CCM Technote

AOSSL and CCM Technote

Release Date: December 18, 2014

Quantum-Safe Security Working Group Charter

Quantum-Safe Security Working Group Charter

Charter outlining the purpose and operations of the Quantum-Safe Security Working Group.

Release Date: December 12, 2014

Privacy Level Agreement Europe, v.2

Privacy Level Agreement Europe, v.2

An updated PLA for Europe.

Release Date: December 04, 2014

Big Data Taxonomy

Big Data Taxonomy

A research document outlining the six dimensions of big data to help decision makers navigate the myriad choices in compute and storage infrastructures as well as data analytics techniques, and security and privacy frameworks.

Release Date: September 18, 2014

Data Protection Heat Index Survey Report

Data Protection Heat Index Survey Report

Release Date: September 12, 2014

Page Dividing Line
This website uses cookies to improve functionality and performance. If you continue browsing the site, you are giving implied consent to the use of cookies on this website. See our Cookie Policy for details.