Software-Defined Perimeter and Zero Trust
A Zero Trust implementation using Software-Defined Perimeter enables organizations to defend new variations of old attack methods.Access it now
Telehealth Data in the Cloud
In the wake of COVID-19 health organizations are rapidly increasing their utilization of telehealth capabilities. This paper addresses privacy and security concerns telehealth solutions.Access it now
Explore the resources CSA has available to further your education and expand your network online. Join online events, webinars, training classes, and more.View Resources
Expand your network to the cloud security community
Build relationships with members of the industry and take a leadership role in shaping the future by becoming a member of the Cloud Security Alliance. Our community encompases industry practitioners, associations, governments, along with our corporate and individual members. The extensive network benefits the entire community impacted by cloud — from providers and customers, to governments, entrepreneurs and the assurance industry — and provides a forum through which diverse parties can work together to create and maintain a trusted cloud ecosystem.
Ask the Experts
CSA Corporate Members have direct access to research analysts to get briefed on research initiatives first-hand. CSA is a resource of subject matter experts, and we're here to support your roadmap and strategy. As a member, start a conversation around what you're doing, and CSA can help connect you with the right people to talk through that strategy.
Tools & Platforms
CSA Corporate Members receive complimentary seats for the cyber threat intelligence exchange. Security operations teams can leverage this platform to quickly and anonymously collaborate with other members on attack mitigation and solutions. It can be used to communicate threats either internally or externally. Companies hesitant about sharing data outside of their organization can still leverage it to communicate threats between departments.
Certificate of Cloud Auditing Knowledge (CCAK)
The CCAK is the only credential for industry professionals that demonstrates expertise in the essential principles of auditing cloud computing systems. Because the Cloud Security Alliance has developed the most widely adopted cloud security audit criteria and organizational certification, we are uniquely positioned to lead industry efforts to ensure industry professionals have the requisite skill set for auditing the cloud environment.
Join us for the virtual CSA EMEA Congress on November 3-5, 2020 and learn how organizations are accelerating their migration to the cloud as the optimal strategy to support a virtual workforce and enable digital transformation. Earn CPE credits from attending this free virtual event and hear from our trusted experts on a range of topics from the growing complexity of cloud certification to navigating continuous assurance and compliance.
Leverage frameworks and architectures specific to cloud
Adopt core tools used by government and regulated industries for the use and management of cloud services. Build a foundation for secure cloud environments with proven models for mitigations, countermeasures, and capabilities specific to cloud computing. The following tools have been used by enterprises to implement frameworks, architectures, and approaches:
Innovate from the cloud
Cloud has become the foundation for launching new technologies. Explore emerging technologies that impact the enterprise and adopt industry best practices for implementing and preparing for the future.
Go beyond security and start building trust. Programs like CSA STAR help improve transparency between cloud customers and providers and bridge the communication gap. From streamlining risk assessments to improving your organization's position to offering an option for continuous self-assessments, it allows our industry to unite effectively to secure the cloud.
Join the Alliance
CSA Security Trust Assurance and Risk (STAR) Registry Reaches Significant Milestone with 1,000 Entries
September 30, 2020
Cloud Security Alliance Releases Top Threats to Cloud Computing: Egregious 11 Deep Dive; Articulates Cloud Computing’s Most Significant Issues
September 23, 2020
Resources & Education
CSA Knowledge Center
Our training platform is a place to access courses and educational resources on vendor-neutral & industry-backed research that stretches your training budget and complements other security certifications on the market.
STAR verifies cloud providers that are prepared for the cloud. Ensuring trust & transparency in both security and privacy. View organizations who are cloud verified.
Our webinars are designed to inform our audience about trending topics, new technologies, and the latest research. It also allows audience members the opportunity to earn CPE Credits.
For Solution ProvidersShowcase your expertise and good practices to a global
Connect with other security professionals from around the world in an exclusive community tailored to cloud security. Whether you are part of a CSA chapter, working group, or a member organization, we have a forum for you.