Mission Statement

To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing. Learn more

Latest News

January 05, 2018

Launching of Application Containers and Microservices

The Cloud Security Alliance is launching the Application Containers and Microservices (ACM) Working Group. The CSA ACM Working Group previously work with the National Institute of Standards and Technology (NIST) ACM Working Group to provide research, guidance, and best practices for the secure use of application containers and microservices. CSA is currently looking for volunteers…

December 04, 2017

Cloud Security Alliance Announces Launch of CCSKv4

Updates to industry leading cloud certificate reflect evolving cloud landscape and the need for qualified security professionals SEATTLE, WA – December 4, 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced the general availability…

November 30, 2017

Cloud Security Alliance Announces 2017 Ron Knode Service Award Recipients

Volunteers recognized for dedication, efforts to furthering cloud security best practices SEATTLE, WA – November 30, 2017 –The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced the recipients of its sixth annual Ron Knode Service Award,…

November 21, 2017

Cloud Security Alliance Issues New Code of Conduct for GDPR Compliance

Significant updates provide actionable guidance to reflect new European personal protection obligations Edinburgh, Scotland – November 21, 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today released the CSA Code of Conduct for GDPR Compliance,…

November 20, 2017

Cloud Security Alliance Releases New Cloud Security for Startups Report

New White Paper Helps Software-as-a-Service Startups Build Solid Security by Aligning Security Controls with Product Development and Investment Rounds SEATTLE, WA – November 20, 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today released a…

October 20, 2017

Cloud Security Alliance Releases Updates to ‘The Treacherous 12: Cloud Computing Top Threats in 2016’

Updates Extend Real-World Examples to Align with Top Security Threats SEATTLE, WA – October 20, 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced an updated ‘Treacherous 12: Top Threats to Cloud Computing +…

August 30, 2017

Cloud Security Alliance Announces Release of Newest Report on ‘Improving Metrics in Cyber Resiliency”

White paper introduces key metrics to measure threats, recover lost functionality in wake of attack SEATTLE, WA – August 30, 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced the release of Improving Metrics…

July 27, 2017

Cloud Security Alliance Announces Upcoming Launch of CCSK v4

Updates to industry leading cloud certificate reflect evolving cloud landscape and the need for qualified security professionals. LAS VEGAS, NV – Black Hat 2017, Booth BB5 – July 26, 2017 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud…

See all news

Press Coverage

Recent Blog Posts

January 19, 2018

Cloud App Encryption and CASB

By Kyle Watson, Partner/Information Security, Cedrus Digital Many organizations are implementing Cloud Access Security Broker (CASB) technology to protect critical corporate data stored within cloud apps. Amongst many other preventative and detective controls, a key feature of CASBs is the ability to encrypt data stored within cloud apps. At the highest...

January 15, 2018

Saturday Morning Security Spotlight: Breaches and Intel

By Jacob Serpa, Product Marketing Manager, Bitglass Here are the top cybersecurity stories of recent weeks: —Data on 123 million US households leaked —Tech giants investing in healthcare technology —Intel chips contain security vulnerability —DHS suffers breach of over 247,000 records —Forever 21 finds malware in PoS systems Data on 123 million...

January 11, 2018

GDPR and the Art of Applying Common Sense

By Daniele Catteddu, Chief Technology Officer , Cloud Security Alliance On November 21, the CSA released the Code of Conduct for GDPR Compliance. This new document is part of CSA’s continuous effort to support the community with best practices that will help cloud providers and customers alike face the tremendous challenge...

January 11, 2018

Your Top Three Cloud Security Resolutions for 2018 Categories: Blog, Cloud Security

By  Doug Lane, Vice President/Product Marketing, Vaultive With 2017 behind us, it’s time to prepare your IT strategy and goals for the new year. There is a good chance that, if you aren’t using the cloud already, there’s a cloud services migration in store for your organization this year. No...

January 09, 2018

Cloud Access Security Brokers: Past, Present, and Future

By Jacob Serpa, Product Marketing Manager, Bitglass Leading cloud access security brokers (CASBs) currently provide data protection, threat protection, identity management, and visibility. However, this has not always been the case.  Since the inception of the CASB market, cloud access security brokers have offered a variety of tools and undergone a number of evolutions. For organizations...

January 04, 2018

The Stakes for Protecting Personally Identifiable Information Will Be Higher in 2018

By  Doug Lane, Vice President/Product Marketing, Vaultive While it’s tough to predict what the most significant single threat of 2018 will be, it’s safe to say that 2017 was certainly a wake-up call for both businesses and consumers when it comes to data breaches. From the rampant misconfiguration of Amazon...

December 29, 2017

Saturday Morning Security Spotlight: Jail Breaks and Cyberattacks

By Jacob Serpa, Product Marketing Manager, Bitglass Here are the top cybersecurity stories of recent weeks: — Man attempts prison break through cyberattacks — Mailsploit allows for perfect phishing attacks — 1.4 billion credentials found in dark web database — Starbucks WiFi hijacks connected devices — Hackers target cryptocurrency employees for bitcoins...

December 27, 2017

Adding Value to Native Cloud Application Security with CASB

By Paul Ilechko, Senior Security Architect, Cedrus Many companies are starting to look at the Cloud Access Security Broker (CASB) technology as an extra layer of protection for critical corporate data as more and more business processes move to the cloud. CASB technologies protect critical corporate data stored within cloud apps...

Read the blog

Certification

CCSK: Certificate of Cloud Security Knowledge

The Certificate of Cloud Security Knowledge (CCSK) is designed to ensure that a broad range of professionals with a responsibility related to cloud computing have a demonstrated awareness of the security threats and best practices for securing the cloud.

Learn more

Training

CSA Training

The Cloud Security Alliance offers training in the following three areas: CCSK training, PCI Cloud training, GRC Stack training.

Learn more

Downloads

Cloud Security for Startups

Release Date: November 20, 2017

Top Threats to Cloud Computing Plus: Industry Insights

Abstract: The Top Threats to Cloud Computing Plus: Industry Insights serves as a validation of the relevance of security issues discussed in the earlier document as wells as provides references and overviews of these incidents. In total, 21 anecdotes and examples are featured in the document. The references and overview of each anecdote and example…

Release Date: October 20, 2017

Improving Metrics in Cyber Resiliency

Release Date: August 30, 2017

Security Guidance v4.0 Info Sheet

Release Date: July 26, 2017

Cloud Controls Matrix v3.0.1 (10-6-16 Update)

Cloud Security Alliance Releases Candidate Mapping of ISO 27002/27017/27018 Security Controls At the Cloud Security Alliance Summit San Francisco 2016, the CSA announced the release of the Candidate Mappings of ISO 27002/27017/27018 to version 3.0.1 of the CSA Cloud Controls Matrix (CCM). The ISO 27XXX series provides an overview of information security management systems. ISO…

Release Date: June 06, 2016

Consensus Assessments Initiative Questionnaire v3.0.1 (12-5-16 Update)

Realigns the CAIQ questions to CCM v3.0.1 control domains and the Cloud Security Alliance “Security Guidance for Critical Areas of Focus in Cloud Computing V3.0”

Release Date: February 01, 2016

Big Data Taxonomy

A research document outlining the six dimensions of big data to help decision makers navigate the myriad choices in compute and storage infrastructures as well as data analytics techniques, and security and privacy frameworks.

Release Date: September 18, 2014

Enterprise Architecture v2.0

The Enterprise Architecture is both a methodology and a set of tools that enable security architects, enterprise architects and risk management professionals to leverage a common set of solutions that fulfill their common needs to be able to assess where their internal IT and their cloud providers are in terms of security capabilities and to plan a roadmap to meet the security needs of their business.

Release Date: February 25, 2013

Privacy Level Agreement (PLA) Outline for the Sale of Cloud Services in the European Union

The Outline provides a structure for Cloud Service Providers (CSP) to disclose, in a consistent matter, information about the privacy and data protection policies, procedures and practices used when processing personal data that customers upload or store in the CSP’s servers.

Release Date: February 24, 2013

Security Guidance for Critical Areas of Mobile Computing

Mobile devices empower employees to do what they need to do — whenever and wherever. People can work and collaborate “in the field” with customers, partners, patients or students and each other. But they need to be supported with always current operational processes and information, whether from apps, the Internet, or documents from other people.

Release Date: November 08, 2012

Security Guidance for Critical Areas of Focus in Cloud Computing V3.0

The CSA guidance as it enters its third edition seeks to establish a stable, secure baseline for cloud operations. This effort provides a practical, actionable road map to managers wanting to adopt the cloud paradigm safely and securely. Domains have been rewritten to emphasize security, stability and privacy, ensuring corporate privacy in a multi-tenant environment.

Release Date: November 14, 2011

Consensus Assessments Initiative Questionnaire v1.1

Questionnaire is organized using CSA 13 governing & operating domains divided into “control areas” within CSA’s Control Matrix structure.

Release Date: September 01, 2011

This website uses cookies to improve functionality and performance. If you continue browsing the site, you are giving implied consent to the use of cookies on this website. See our Cookie Policy for details.