Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

All Articles

All Articles
CMMC – the New Protocol Droid for DoD Compliance

Blog Published: 11/06/2019

By Doug Barbin - Cybersecurity Practice Leader at Schellman & Company, LLCA long time ago in a galaxy exactly ours…There was 800-171. For some time, the US Department of Defense has been working to revise its funding procurement procedures referred to as the Defense Acquisition Regulation...

3 Technical Benefits of Service Mesh, and Security Best Practices

Blog Published: 11/04/2019

By Ran Ilany, co-founder and CEO for PortshiftOrganizations that implement containers often ask about using a service mesh layer. While this isn’t obligatory by any means, there are many benefits to running a service mesh that makes it the sensible choice for organizations seeking security, effic...

CSA Announces Advanced Cloud Security Practitioner Training, a Highly Technical Hands-on Course for Technical Security Professionals

Press Release Published: 11/04/2019

Program delves deep into practical cloud security, applied DevSecOps for enterprise-scale cloud deployments SEATTLE – Nov. 4, 2019 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud comp...

Cloud Security Alliance Releases Anti-DDoS: Software-Defined Perimeter 
As a DDoS Prevention Mechanism

Press Release Published: 10/28/2019

Document examines the operationalization of Software-Defined Perimeter as prevention mechanism against three well-known types of Distributed Denial of Service attacksORLANDO – (ISC)2 Security Congress – Oct. 28, 2019 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated ...

Cloud Security Alliance 2019 EMEA Congress Adds Focus on Risk Governance and European Cloud Certification Enablement

Press Release Published: 10/24/2019

William Ochs, Rolf Becker will share insight from 60 years combined experience in banking and cybersecurity risks Berlin, Germany – Oct. 24, 2019 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure...

Corporate Contractors and the Requirement for Zero-Trust Network Access

Blog Published: 10/21/2019

By Etay Bogner, VP, Zero-Trust Products Proofpoint and former CEO of Meta NetworksIt’s not a stretch to say that most industries and organizations today have contractors in the mix who need remote access to the company’s network. Yet the traditional virtual private network (VPN) method of enablin...

Introducing Reflexive Security for integrating security, development and operations

Blog Published: 10/14/2019

By the CSA DevSecOps Working Group Organizations today are confronted with spiraling compliance governance costs, a shortage of information security professionals, and a disconnect between strategic security and operational security. Due to these challenges, more and more companies value agility...

Cloud Penetration Testing the Capital One Breach

Blog Published: 10/10/2019

By Alexander Getsin, Lead Author for Cloud Penetration Testing PlaybookAligning the Capital One breach with the CSA Cloud Penetration Testing PlaybookIn March 2019, Capital One suffered a unique cloud breach. 140,000 Social Security numbers and 80,000 linked bank account numbers were exposed, alo...

It's all about the Data! - Preventative Security

Blog Published: 10/08/2019

By John DiMaria, Assurance Investigatory Fellow, Cloud Security AllianceI have always said I am a "data guy." Decisions made with data eliminate all bias, opinions, and ad hoc decisions that cause potential costly moves.In my most recent podcast interview with Phillip Merrick, CEO of Fugue, he di...

Guardians of the Cloud: The Latest Security Findings

Blog Published: 10/07/2019

By Juan Lugo from BitglassWith the emergence of cloud adoption and BYOD in the workplace, companies are experiencing an overwhelming amount of data breaches. This is largely because they are not taking the appropriate steps to secure data in the cloud. As such, Bitglass conducted a survey with IT...

​CSA Announces Availability of Certificate of Cloud Security Knowledge Foundation Exam Bundle

Press Release Published: 10/03/2019

Exam bundle makes it even easier to demonstrate knowledge in key areas of cloud securitySEATTLE – October 3, 2019 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment...

Why you can't have backdoored crypto that is secure

Blog Published: 10/03/2019

By Kurt Seifried, Chief Blockchain Officer, CSASo as you have probably seen some parts of the US government are again making noise about end-to-end encryption. We’ve seen this before (clipper chip, key escrow, etc., etc.). The new twist is that they appear to be trying a thin end of the wedge app...

What to Expect at the 2019 Colorado Chapter Forum

Blog Published: 10/02/2019

Understanding the complexities of cloud security can be very challenging. Because of this, Cloud Security Alliance has membership opportunities, resources, certifications, and local chapters to help explain it. The Colorado Chapter of Cloud Security Alliance is pleased to announce its 4th annual ...

Cloud Security Posture Management: Why You Need It Now

Blog Published: 10/01/2019

By Samantha Nguyen, Product Manager, BitglassGartner recommends that security and risk management leaders invest in CSPM (cloud security posture management) processes and tools to avoid misconfigurations that can lead to data leakage. Although it is a relatively new class of tools, this recommend...

How Blockchain Might Save Us All

Blog Published: 09/27/2019

By Kurt Seifried, Chief Blockchain Officer, CSAI’ve been seeing a lot of articles claiming that Blockchain will save us from hackers, and ransomware, and all sorts of other Cyber-Shenanigans. So… will Blockchain save us all? Yes, well . . . sort of, it’s complicated. Let’s start with a story:The ...

Announcing the Security@ San Francisco 2019 Agenda

Blog Published: 09/25/2019

By the HackerOne TeamThe agenda for the third annual hacker-powered security conference, Security@ San Francisco, is live! Security@ is the only conference dedicated to the booming hacker-powered security industry, where hackers and leaders come together to build a safer internet. The conference ...

Sidechains, beacon chains and why we shouldn’t give up on Blockchain performance quite yet

Blog Published: 09/18/2019

By Kurt Seifried, Chief Blockchain Officer, CSAIf you’ve been in IT you’ve probably learned one of the simple lessons:Scaling out is hard and can be expensive, but scaling up is easy and even more expensive. In simple terms if you can scale out you can keep costs down, ideally at a linear growth ...

CAIQ V3 Updates

Blog Published: 09/17/2019

Cloud Security Alliance (CSA) would like to present the next version of the Consensus Assessments Initiative Questionnaire (CAIQ) v3.1.The CAIQ offers an industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services, providing security control transparency. It pr...

The Four Pillars of CASB: Data Protection

Blog Published: 09/16/2019

By Will Houcheime, Product Marketing Manager, BitglassIn this blog series, we discuss the key capabilities of cloud access security brokers (CASBs), and why organizations are turning to them as they migrate to the cloud. One of the four pillars of CASBs is data protection, which focuses on securi...

Egregious 11 Meta-Analysis Part 3: Weak Control Plane and DoS

Blog Published: 09/12/2019

By Victor Chin, Research Analyst, CSAThis is the third blog post in the series where we analyze the security issues in the new iteration of the Top Threats to Cloud Computing report. Each blog post features a security issue that is being perceived as less relevant and one that is being perceived ...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.