Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

All Articles

All Articles
Cloud Security Alliance Welcomes Inaugural Members of the CxO Trust Advisory Council

Press Release Published: 08/24/2021

Members will contribute to, advise on the overall strategy and roadmap of CxO Trust and CxO Working GroupSEATTLE – Aug. 24, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud ...

Why IaaS Security Should be a Priority

Blog Published: 08/20/2021

This blog was originally published by Bitglass here. Written by Jonathan Andresen, Bitglass. Why are CIOs and IT organizations prioritizing investment in cloud infrastructure? The answer is simple: to better support virtual workforces, supply chains, and partners. Getting the most value out of le...

STAR Testimonial: CSA STAR + SOC2 - From Readiness to Attestation

Blog Published: 08/20/2021

CSA’s STAR Attestation is the first cloud-specific attestation program designed to quickly assess and understand the types and rigor of security controls applied by cloud service providers. This is a collaboration between CSA and the AICPA to provide guidelines for CPAs to conduct SOC2 engagemen...

Five Recommendations for Securing Cloud Containers

Blog Published: 08/19/2021

Written by the members of the Security Guidance Working Group. This blog came from Domain 8 of the CSA Security Guidance for Cloud Computing v4.Understanding the impacts of virtualization on security is fundamental to properly architecting and implementing cloud security. In this blog, we will be...

Cloud Security Alliance’s STAR Registry Now Accepting Version 4 of CAIQ

Press Release Published: 08/19/2021

SEATTLE – Aug. 19, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, is pleased to announce that cloud service providers (CSPs) are now able to submit ...

Secure Containers and Microservices Series

Blog Published: 08/18/2021

Last updated: May 9, 2024CSA’s Secure Containers and Microservices SeriesApplication containers and a microservices architecture, as defined in NIST SP 800-180, are being used to design, develop and deploy applications leveraging agile software development approaches such as Development Operation...

Security Agents Don’t Belong In Your Cloud!

Blog Published: 08/18/2021

This blog was originally published by Blue Hexagon here. Written by Saumitra Das, Blue Hexagon. COVID-19 has significantly accelerated migration to the cloud as organizations enable an increasingly remote workforce and adopt cloud-native services to serve increasingly online customers. Unfortunat...

C-Level Stakeholders to Take on Digital Transformation’s Impact on Security Strategies at CxO Trust Summit

Press Release Published: 08/17/2021

Event to provide CISOs, other C-level stakeholders with unique insight on navigating companies through today’s cybersecurity challengesSEATTLE – Aug. 17, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices ...

SaaS Security: Risks and Mitigation Methods

Blog Published: 08/16/2021

Written by Dipen Rana and Pooja Patil, TCS As a pandemic-triggered hybrid work model settles in, many enterprises are moving onto the cloud for better agility and greater efficiency. With the cloud offering subscription-based models and eliminating infrastructure cost, organizations have the flex...

CCM Testimonial: The Advantages and Future of the Cloud Controls Matrix

Blog Published: 08/12/2021

The Cloud Controls Matrix (CCM) is composed of 197 control objectives that cover all key aspects of cloud technology. It can be used as a tool for the systematic assessment of cloud implementation and provides guidance on which security controls should be implemented by which actor within the clo...

Jen Easterly, Director of the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) to Headline Cloud Security Alliance’s SECtember

Press Release Published: 08/11/2021

Premier cloud event offers insight into trending topics such as digital transformation, Zero Trust, and cyber-supply chain risk managementSEATTLE – Aug. 11, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practice...

Top 20 Dockerfile Best Practices

Blog Published: 08/10/2021

This blog was originally published by Sysdig here.Written by Álvaro Iradier, Sysdig.Learn how to prevent security issues and optimize containerized applications by applying a quick set of Dockerfile best practices in your image builds.If you are familiar with containerized applications and micros...

Understanding Cloud Drift Enables Zero Trust Cloud Management

Blog Published: 08/09/2021

This blog was originally published by OpsCompass here.Written by John Grange, OpsCompass.True Insight into Your Security Posture and Drift is Key to Zero-TrustIn the cloud everything is configurable software. This sounds a little obvious, if not trite, but it actually represents an important insi...

You Can’t Detect What You Can’t See – In Real-Time. The Modern Cloud Security Edition

Blog Published: 08/06/2021

This blog was originally published by Blue Hexagon here.Written by Arun Raman, Blue Hexagon.There is an old maxim in cybersecurity: “You cannot detect what you cannot see.” While we hold the need for security visibility as a self-evident truth, there are implications for a cloud security architec...

The Visionary CCM/CAIQ v4 Early Adopters

Blog Published: 08/06/2021

This blog was updated on 8/16/21 with the news that organizations can now submit CAIQ v4 to the STAR Registry.The Cloud Controls Matrix (CCM) is a cybersecurity control framework for cloud computing aligned to CSA best practices and is considered the de-facto standard for cloud security and priva...

The Importance of Properly Scoping Cloud Environments

Blog Published: 08/05/2021

PCI Security Standards Council (PCI SSC) and the Cloud Security Alliance (CSA) recently released a joint industry threat bulletin highlighting the importance of properly scoping cloud environments. In this blog, the PCI SSC and CSA share guidance and best practices for properly scoping cloud envi...

Blue Team Diaries: Becoming ‘data-smart’

Blog Published: 08/05/2021

Written by Derek Wood, Open Raven“I can’t afford to not be data-smart.” - Doug Clendening, Principal Services Consultant at Open Raven (Previously Principal Cyber Incident Commander at Splunk) Blue teams aren’t quite the cape-wearing heroes featured in comics, but they aren't far off when it come...

Two Top Cybersecurity Organizations Issue Joint Bulletin on the Importance of Cloud Scoping

Press Release Published: 08/05/2021

PCI Security Standards Council (PCI SSC) and the Cloud Security Alliance (CSA) join forces to highlight properly scoping cloud environmentsWashington, D.C., August 5, 2021 – Today the PCI Security Standards Council (PCI SSC) and the Cloud Security Alliance (CSA) issued a joint bulletin to highlig...

Three Network Weaknesses that Zero Trust Addresses

Blog Published: 08/04/2021

Zero Trust is a network security concept that aims to protect enterprise assets. Under Zero Trust, organizations should not automatically trust anything inside or outside traditional perimeters. Before granting access to assets, organizations should require the verification of anything and everyt...

SECtember 2021: Why I’ll Be There

Blog Published: 08/03/2021

Written by Larry Hughes, Principal Compliance Consultant, LJH Compliance ConsultingI first got involved in the Seattle information security scene in 1996. I was busy building a security consulting practice for a startup. It wasn’t long before I met this affable fellow named Jim Reavis, who had al...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.