Mission Statement

To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing. Learn more

Check out our calendar of upcoming CCSK & CCM training courses

Latest News

June 05, 2017

Cloud Security Alliance Announces “Grand Opening” of Its New Third-Party Global Consultancy Program

Selected Inaugural Providers BH Consulting, KPMG, Optiv and Securosis Ready to Help Organizations Ensure Secure Cloud Implementation Best Practices SEATTLE, WA – June 5, 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced the…

May 25, 2017

Cloud Security Alliance Releases New Guidance for Connected Vehicle Security

New Report from Internet of Things (IoT) Working Group Identifies Vehicle Attack Vectors and Impacts, Provides Recommendations for Securing the Connected Vehicle Environment SEATTLE, WA – May 25, 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing…

May 03, 2017

Cloud Security Alliance Announces Third Annual Federal Summit

Program to Feature Experts from DHS, HHS, and GSA on the State and Future of Cloud Security in Government and Industry, IoT and More Washington, DC – May 2, 2017 – The Cloud Security Alliance (CSA) today announced the line-up of featured speakers and discussions for its third annual Cloud Security Alliance Federal Summit, a…

May 01, 2017

Cloud Security Alliance Hosts 28th ISO/IEC JTC 1/SC 27 Meetings

NEW ZEALAND – April 25, 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced that it has successfully hosted the 28th ISO/IEC JTC 1/SC 27 Plenary and Working Group Meetings. The meeting in New…

April 17, 2017

Cloud Security Alliance Hosts Successful APAC Summit 2017

Singapore – April 13, 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced that it successfully hosted its 6th annual CSA APAC Summit in Singapore on April 10, 2017. The one-day event was attended by thought…

April 03, 2017

CSA to Host Inaugural Summit in Boston

First Annual Boston Event to Focus on Cloud Revolution and Accelerating Business BOSTON, MA – April 3, 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced that the CSA Boston Chapter is hosting the…

March 15, 2017

CSA Launches 2 New Research Working Groups with Huawei – Call for Participation

In our mission to build a more secure Cloud ecosystem, the Cloud Security Alliance (CSA) is commencing on working on 2 new research working groups together with our executive member Huawei. Cloud Component Specifications WG Looking at the current environment, there are several internationally recognized standards that guide and evaluate cloud service providers in ISMS…

March 13, 2017

Call for Participation: SaaS Governance Working Group

The Cloud Security Alliance would like to invite you to participate in the SaaS Governance Working Group. The SaaS Governance working group aims to benefit all parties in the Software-as-a-Service (SaaS) ecosystem by supporting a common understanding of SaaS related risks from the perspectives of the cloud customer and cloud service provider. We are currently…

See all news

Press Coverage

EcnonoTimes | April 04, 2017

Cloud Security Alliances annual Boston Summit to focus on blockchain

SC Magazine | April 03, 2017

Tools are never a solution

Data Center News Asia | March 09, 2017

Curing security alert fatigue while still protecting your cloud infrastructure

Dataversity | February 24, 2017

80 Percent of IT and Security Professionals Admit to Using Antiquated Collaboration Tools

Beta News | February 21, 2017

The top three barriers to digital transformation

eWEEK | February 21, 2017

Cloud Security Alliance Adds New Tools to Improve Compliance

Channel Partners | February 21, 2017

RSA Trends: Cloud, IoT, Cybersecurity Skills Gap Drive Security Services Demand

eSecurityPlanet | February 21, 2017

62 Percent of Companies Store Sensitive Customer Data in the Public Cloud

Search CIO | February 17, 2017

New security threat: Custom applications in the cloud

SearchCloudComputing | February 17, 2017

Beyond shadow IT risks, opportunity awaits

Security Intelligence | February 16, 2017

Shadow IT Clouds Security

CXO Today | February 16, 2017

Custom Enterprise Apps Posing Shadow Cloud Threats: CSA

FCW | February 15, 2017

Security in the Cloud

Help Net Security | February 15, 2017

Companies struggle to deploy security for custom applications

ReadItQuik | February 15, 2017

CSA Announces Global Consultancy Program

Dark Reading | February 14, 2017

National Security, Regulation, Identity Top Themes At Cloud Security Summit

eWEEK | February 14, 2017

Former NSA Chief Optimistic About Cloud Security

Enterprise Innovation | February 14, 2017

How can we secure our smart cities?

Yahoo Finance | February 13, 2017

Cloud Security Alliance Establishes New Third-Party Consultancy Program to Ensure Best Practices in Secure Cloud Implementation

Yahoo Finance | February 13, 2017

Cloud Security Alliance Announces General Availability of STARWatch Cloud Security Management Application

See all press

Recent Blog Posts

July 19, 2017

Cyberattacks Are Here: Security Lessons from Jon Snow, White Walkers & Others from Game of Thrones

An analysis of Game of Thrones characters as cyber threats to your enterprise. By Virginia Satrom, Senior Public Relations Specialist, Forcepoint As most of you have probably seen, we recently announced our new human point brand campaign. Put simply, we are leading the way in making security not just a technology issue, but...

July 10, 2017

CSA Industry Blog Listed Among 100 Top Information Security Blogs for Data Security

Our blog was recently ranked 35th among 100 top information security blogs for data security professionals by Feedspot. Among the other blogs named to the list were The Hacker News, Krebs on Security and Dark Reading. Needless to say, we’re honored to be in such good company. To be listed, Feedspot’s editorial...

July 06, 2017

Locking-in the Cloud: Seven Best Practices for AWS

By Sekhar Sarukkai, Co-founder and Chief Scientist, Skyhigh Networks With the voter information of 198 million Americans exposed to the public, the Deep Root Analytics leak brought cloud security to the forefront. The voter data was stored in an AWS S3 bucket with minimal protection. In fact, the only level of security...

July 03, 2017

Clouding Within the Lines: Keeping User Data Where It Belongs in the Age of GDPR

By Nathan Narayanan, Director of Product Management, Netskope Importance around data residency hygiene has been around for a long time, but cloud services that often show up tend to focus more on user productivity and less on user data privacy. The highly-productive nature of these services increases their adoption resulting...

June 12, 2017

Crank Up Your Cloud Security Knowledge with These Upcoming Webinars

By Hillary Barron, Research Analyst and CloudBytes Program Manager, Cloud Security Alliance Whether you’re trying to make the move to cloud while managing an outdated endpoint backup, attempting to figure out how to overcome the challenges pertaining to developing and deploying security automation, or determining how and why you should build...

June 09, 2017

Who Touched My Data?

You don’t know what you don’t know By Yael Nishry, Vice President of Business Development, Vaultive, and Arthur van der Wees, Founder and Managing Director, Arthur’s Legal Ransomware IT teams generally use encryption to enable better security and data protection. However, in the hands of malicious parties, encryption can be...

June 07, 2017

My Second Attempt at Explaining Blockchain to My Wife

I tried explaining blockchain to my wife and here’s what happened… By Antony Ma, CTO/PowerData2Go, Founding Chairman/CSA Hong Kong and Macau Chapter, and Board Member/CSA Singapore Chapter I introduced my wife to Python around nine months ago, and now she’s tinkering and has drawn a tortoise on her MacBook. After spending more...

June 02, 2017

Office 365 Deployment: Research Suggests Companies Need to “Think Different”

Survey shows what companies expected and what they found out By Atri Chatterjee, Chief Marketing Officer, Zscaler It’s been six years since Microsoft introduced Office 365, the cloud version of the most widely used productivity software suite. In those years, Office 365 has earned its place as the fastest-growing cloud-delivered application...

Read the blog


CCSK: Certificate of Cloud Security Knowledge

The Certificate of Cloud Security Knowledge (CCSK) is designed to ensure that a broad range of professionals with a responsibility related to cloud computing have a demonstrated awareness of the security threats and best practices for securing the cloud.

Learn more


CSA Training

The Cloud Security Alliance offers training in the following three areas: CCSK training, PCI Cloud training, GRC Stack training.

Learn more

Newsletter Archive

All of our past newsletters are available online for your convenience.

Read them here


Cloud Controls Matrix v3.0.1 (10-6-16 Update)

Cloud Security Alliance Releases Candidate Mapping of ISO 27002/27017/27018 Security Controls At the Cloud Security Alliance Summit San Francisco 2016, the CSA announced the release of the Candidate Mappings of ISO 27002/27017/27018 to version 3.0.1 of the CSA Cloud Controls Matrix (CCM). The ISO 27XXX series provides an overview of information security management systems. ISO…

Release Date: June 06, 2016

Consensus Assessments Initiative Questionnaire v3.0.1 (12-5-16 Update)

Realigns the CAIQ questions to CCM v3.0.1 control domains and the Cloud Security Alliance “Security Guidance for Critical Areas of Focus in Cloud Computing V3.0”

Release Date: February 01, 2016

Big Data Taxonomy

A research document outlining the six dimensions of big data to help decision makers navigate the myriad choices in compute and storage infrastructures as well as data analytics techniques, and security and privacy frameworks.

Release Date: September 18, 2014

Enterprise Architecture v2.0

The Enterprise Architecture is both a methodology and a set of tools that enable security architects, enterprise architects and risk management professionals to leverage a common set of solutions that fulfill their common needs to be able to assess where their internal IT and their cloud providers are in terms of security capabilities and to plan a roadmap to meet the security needs of their business.

Release Date: February 25, 2013

Privacy Level Agreement (PLA) Outline for the Sale of Cloud Services in the European Union

The Outline provides a structure for Cloud Service Providers (CSP) to disclose, in a consistent matter, information about the privacy and data protection policies, procedures and practices used when processing personal data that customers upload or store in the CSP’s servers.

Release Date: February 24, 2013

Security Guidance for Critical Areas of Mobile Computing

Mobile devices empower employees to do what they need to do — whenever and wherever. People can work and collaborate “in the field” with customers, partners, patients or students and each other. But they need to be supported with always current operational processes and information, whether from apps, the Internet, or documents from other people.

Release Date: November 08, 2012

Security Guidance for Critical Areas of Focus in Cloud Computing V3.0

The CSA guidance as it enters its third edition seeks to establish a stable, secure baseline for cloud operations. This effort provides a practical, actionable road map to managers wanting to adopt the cloud paradigm safely and securely. Domains have been rewritten to emphasize security, stability and privacy, ensuring corporate privacy in a multi-tenant environment.

Release Date: November 14, 2011

Consensus Assessments Initiative Questionnaire v1.1

Questionnaire is organized using CSA 13 governing & operating domains divided into “control areas” within CSA’s Control Matrix structure.

Release Date: September 01, 2011

A Repeatable Cloud-first Deployment Process Model

By now the benefits of cloud computing are generally understood at high level. What is not necessarily clear are the details of the potential security, legal, financial, and compliance impacts that cloud adoption will produce. The stakeholders who are currently responsible for these areas are sometimes not sufficiently familiar with how a cloud-first strategy affects…

Release Date: June 06, 2017

Observations and Recommendations on Connected Vehicle Security

The introduction of Connected Vehicles (CVs) has been discussed for many years. Pilot implementations currently underway are evaluating CV operations in realistic municipal environments. CVs are beginning to operate in complex environments composed of both legacy and modernized traffic infrastructure. Security systems, tools and guidance are needed to aid in protecting CVs and the supporting…

Release Date: May 25, 2017

State of Cloud Adoption in APAC 2017

Release Date: April 23, 2017

Applied Quantum Safe Security

Release Date: March 13, 2017

SDP for IaaS

Release Date: February 13, 2017

Quantum Safe Security Glossary

Release Date: January 24, 2017

This website uses cookies to improve functionality and performance. If you continue browsing the site, you are giving implied consent to the use of cookies on this website. See our Cookie Policy for details.