CCSK CCSK

MISSION STATEMENT

To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.

Learn More
Page Dividing Line

Latest News Arrow to Content

March 20, 2015

Cloud Security Alliance Summit 2015 at RSA Conference To Spotlight Enterprise Lessons Learned at the Security Industry’s Largest Event

Opening Keynote to Feature Philippe Courtot, Chairman & CEO of Qualys San Francisco, CA – March 20, 2015 – The Cloud Security Alliance (CSA) today announced the agenda for the CSA Summit 2015, being held at the RSA Conference on Monday, April 20 at Moscone Center West, Room 2014. This year’s opening keynote will be presented by Philippe…

March 19, 2015

EMEA Congress 2015 CFP

Cloud Security Alliance Opens Call for Presentations for EMEA Congress 2015 Berlin, Germany – March 18, 2015 – The Cloud Security Alliance (CSA) has opened the call for papers for the 2015 CSA EMEA Congress, to be held November 17-18th at the DBB Forum Berlin in Germany. CSA EMEA Congress is Europe’s premier cloud security…

March 17, 2015

Cloud Security Alliance Announces New Federal Summit Event

Stellar Program to Feature Leaders from FedRAMP and NIST Providing Key Insights into Security Compliance, Architecture, Technology and Defending the Latest Threats Washington, DC – March 17, 2015 – The Cloud Security Alliance (CSA) today announced a brand new conference to be hosted on May 5, 2015 in Washington, DC. The Cloud Security Alliance Federal Summit, is a…

Read More News

Latest In Research Arrow to Content

March 24, 2015

OPEN PEER REVIEW: Security Guidance for Early Adopters of IoT

The Cloud Security Alliance would like to invite you to review and comment on the Security Guidance for Early Adopters of the Internet of Things (IoT). This guidance discusses some of the challenges associated with the adoption of the IoT and concludes with a set of recommendations that can be followed by early business adopters…

March 18, 2015

Cloud Security Alliance: Insider Threat Survey

The Cloud Security Alliance Cloud Data Governance Group is running a very short survey to better understand insider threat vectors and mitigating strategies for public cloud. I would be most appreciative if you could spend a few minutes taking the survey – there are 12 questions in total. Your insights would be very valuable and…

January 09, 2015

Cloud Security Alliance New Survey Finds Companies are in the Dark on Shadow IT Usage

Security of Data in the Cloud Now an Executive-Level Concern; Skills Gap an Added Barrier to Cloud Adoption

Read More Research News

certification Arrow to Content

CCSK: Certificate of Cloud Security Knowledge

The Certificate of Cloud Security Knowledge (CCSK) is designed to ensure that a broad range of professionals with a responsibility related to cloud computing have a demonstrated awareness of the security threats and best practices for securing the cloud. Learn More

Training Arrow to Content

CSA Training

The Cloud Security Alliance offers training in the following three areas: CCSK training, PCI Cloud training, GRC Stack training. Learn More

Downloads Arrow to Content

Big Data Taxonomy

Big Data Taxonomy

A research document outlining the six dimensions of big data to help decision makers navigate the myriad choices in compute and storage infrastructures as well as data analytics techniques, and security and privacy frameworks.

Release Date: September 18, 2014

Consensus Assessments Initiative Questionnaire v3.0.1

Consensus Assessments Initiative Questionnaire v3.0.1

Realigns the CAIQ questions to CCM v3.0.1 control domains and the Cloud Security Alliance “Security Guidance for Critical Areas of Focus in Cloud Computing V3.0″

Release Date: July 11, 2014

Cloud Controls Matrix v3.0.1

Cloud Controls Matrix v3.0.1

New and updated mappings, consolidation of redundant controls, rewritten controls for clarity of intent, STAR enablement, and SDO alignment.

Release Date: July 11, 2014

Enterprise Architecture v2.0

Enterprise Architecture v2.0

The Enterprise Architecture is both a methodology and a set of tools that enable security architects, enterprise architects and risk management professionals to leverage a common set of solutions that fulfill their common needs to be able to assess where their internal IT and their cloud providers are in terms of security capabilities and to plan a roadmap to meet the security needs of their business.

Release Date: February 25, 2013

Privacy Level Agreement (PLA) Outline for the Sale of Cloud Services in the European Union

Privacy Level Agreement (PLA) Outline for the Sale of Cloud Services in the European Union

The Outline provides a structure for Cloud Service Providers (CSP) to disclose, in a consistent matter, information about the privacy and data protection policies, procedures and practices used when processing personal data that customers upload or store in the CSP’s servers.

Release Date: February 24, 2013

Security Guidance for Critical Areas of Mobile Computing

Security Guidance for Critical Areas of Mobile Computing

Mobile devices empower employees to do what they need to do — whenever and wherever. People can work and collaborate “in the field” with customers, partners, patients or students and each other. But they need to be supported with always current operational processes and information, whether from apps, the Internet, or documents from other people.

Release Date: November 08, 2012

Security Guidance for Critical Areas of Focus in Cloud Computing V3.0

Security Guidance for Critical Areas of Focus in Cloud Computing V3.0

The CSA guidance as it enters its third edition seeks to establish a stable, secure baseline for cloud operations. This effort provides a practical, actionable road map to managers wanting to adopt the cloud paradigm safely and securely. Domains have been rewritten to emphasize security, stability and privacy, ensuring corporate privacy in a multi-tenant environment.

Release Date: November 14, 2011

Consensus Assessments Initiative Questionnaire v1.1

Consensus Assessments Initiative Questionnaire v1.1

Questionnaire is organized using CSA 13 governing & operating domains divided into “control areas” within CSA’s Control Matrix structure.

Release Date: September 01, 2011

AOSSL and CCM Technote

AOSSL and CCM Technote

Release Date: December 18, 2014

Quantum-Safe Security Working Group Charter

Quantum-Safe Security Working Group Charter

Charter outlining the purpose and operations of the Quantum-Safe Security Working Group.

Release Date: December 12, 2014

Privacy Level Agreement Europe, v.2

Privacy Level Agreement Europe, v.2

An updated PLA for Europe.

Release Date: December 04, 2014

Big Data Taxonomy

Big Data Taxonomy

A research document outlining the six dimensions of big data to help decision makers navigate the myriad choices in compute and storage infrastructures as well as data analytics techniques, and security and privacy frameworks.

Release Date: September 18, 2014

Data Protection Heat Index Survey Report

Data Protection Heat Index Survey Report

Release Date: September 12, 2014

Page Dividing Line
This website uses cookies to improve functionality and performance. If you continue browsing the site, you are giving implied consent to the use of cookies on this website. See our Cookie Policy for details.