Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

All Articles

All Articles
Major Cloud Providers to Participate In CSA STAR – CSA Security, Trust and Assurance Registry

Press Release Published: 11/16/2011

Google, Microsoft, Verizon, Intel and McAfee to Submit Reports; Major Consumers of Cloud Services Begin to Require Reports as Part of Procurement Process Orlando, FL – Nov 16, 2011 – The Cloud Security Alliance (CSA) today announced that Google, Verizon, Intel, McAfee, and Microsoft plan to...

Cloud Security Alliance Releases Results of Cloud Consumer Advocacy Questionnaire and Information Survey

Press Release Published: 11/16/2011

CCAQIS Identifies Top Requirements and Needs for Governing and Operating Data in the Cloud Orlando, FL – Nov 16, 2011 – The Cloud Security Alliance (CSA) Cloud Data Governance (CDG) working group today introduced the results of its Cloud Consumer Advocacy Questionnaire and Information Surve...

Cloud Security Alliance Releases Guidance Version 3

Press Release Published: 11/16/2011

Third Version of Security Guidance for Critical Areas of Focus In Cloud Computing Seeks to Establish a Stable, Secure Baseline for Cloud Operations Orlando, FL – Nov 16, 2011 – The Cloud Security Alliance (CSA) today unveiled the third version of its Security Guidance for Critical Areas of F...

Cloud Security Considerations

Blog Published: 11/14/2011

Can a cloud be as secure as a traditional network? In a word, yes! I agree that some may find this statement surprising. Depending on the network, that may be a low bar, but good security principles and approaches are just as applicable to cloud environments as they are to traditional network ...

Leveraging Managed Cloud Services to Meet Cloud Compliance Challenges

Blog Published: 11/04/2011

By Allen AllisonRegardless of your industry, customer base, or product, it is highly likely that you face regulatory compliance requirements. If you handle Protected Health Information (PHI), the Health Insurance Portability and Accountability Act (HIPAA) – along with the HITECH enhancements – a...

Cloud Security: Confident, Fearful, or Surprised

Blog Published: 11/04/2011

By Ken BieryThis two-part guest blog series explores the topic of cloud security. Part one of the series focuses on the questions enterprise IT decision makers should ask when considering moving business applications to a cloud-based computing environment.There is no shortage of information abou...

An Invitation for SME’s to contribute to CSA’s Cloud Data Governance Working Group by Tuesday, October 25th

Press Release Published: 10/19/2011

The Cloud Data Governance (CDG) Working Group is seeking Subject Matter Experts to help identify the current state of public cloud solution provider maturity in addressing the issues related to Information Lifecycle Management (ILM). Subject Matter Experts are needed to help us complete the initi...

Cloud Security Alliance Announces Trusted Cloud Initiative White Paper

Press Release Published: 10/18/2011

October 18, 2011 – The Cloud Security Alliance (CSA) today announces that the Trusted Cloud Initiative has published its first white paper, “Trusted Cloud Initiative Quick Guide to the Reference Architecture”. The purpose of the quick guide is to take a user through the Trusted Cloud architecture...

(ISC)² and The Cloud Security Alliance Expand Cloud Security Offerings to their Memberships

Press Release Published: 10/12/2011

Orlando, FL – October 12, 2011 – The Cloud Security Alliance (CSA) and (ISC)², the world’s largest information security professional body and administrators of the CISSP®, today announced they have signed a Memorandum of Understanding (“MOU”) to benefit members of both organizations who are looki...

Cloud Security Alliance Appoints Daniele Catteddu as EMEA Managing Director

Press Release Published: 10/09/2011

London, UK, #CSASummit at RSA – October 10, 2011 – The Cloud Security Alliance (CSA) today announced that it has appointed Daniele Catteddu as its Managing Director, EMEA, responsible for executing the CSA’s strategy across Europe. Catteddu will be presenting the CSA EU strategy at the CSA Summit...

Test Accounts: Another Compliance Risk

Blog Published: 10/07/2011

By: Merritt MaximiA major benefit associated with deploying identity management and/or identity governance into an organization is that these solutions provide the ability to detect and remove orphan accounts. Orphan accounts refer to active accounts belonging to a user who is no longer involved...

The Cloud Consumer Advocacy Questionnaire and Information Survey (CCAQIS) - Survey submission has been extended through October 11, 2011

Press Release Published: 10/06/2011

Data governance is a critical need within cloud computing to achieve organizational risk, compliance, and IT service level requirements. The Cloud Security Alliance (CSA) performed research in this area with version 2.1 of our guidance, specifically with Domain 5: Information Lifecycle Management...

(ISC)² Names 2011 Inaugural Americas Information Security Leadership Award Finalists and Winners

Press Release Published: 10/03/2011

Cloud Security Alliance’s Becky Swain Recognized as Finalist in Category of Information Security Practitioner Palm Harbor, Fla., U.S.A., Oct 3, 2011 – (ISC)²® (“ISC-squared”), the world’s largest information security professional body and administrators of the CISSP®, today recognized the finali...

When It Comes To Cloud Security, Don’t Forget SSL

Blog Published: 09/30/2011

By Michael Lin, SymantecCloud computing appears here to stay, bringing with it new challenges and security risks on one hand, while on the other hand boasting efficiencies, cost savings and competitive advantage. With the new security risks of cloud and the mounting skill and cunning of today’s m...

Securing Your File Transfer in the Cloud

Blog Published: 09/30/2011

By Stuart Lisk, Sr. Product Manager, Hubspan Inc. File transfer has been around since the beginning of time. Ok, well maybe that is an exaggeration, but the point is, file transfer was one of the earliest uses of “network” computing dating back to the early 1970’s when IBM introduced the floppy d...

Open Review Period for Guidance V.3: Domains 7, and 14 (Has Begun)

Press Release Published: 09/29/2011

The Cloud Security Alliance would like to invite you to review and comment on the following Guidance V.3 Domains: Domain 7: Traditional Security, Business Continuity and Disaster Recovery Domain 14: Security as a Service Your expertise will ensure that the domains have accurate content. The open ...

Cloud Security Alliance Issues First Security as a Service White Paper

Press Release Published: 09/26/2011

San Francisco, CA –September 26, 2011 – The Cloud Security Alliance (CSA) today announced that the Security as a Service working group has published its first white paper, “Defined Categories of Service 2011”. The purpose of this group’s research is to identify consensus definitions of what Secur...

Open Review Period for Guidance V.3: Domains 4, 8, 9 and 11(Has Begun)

Press Release Published: 09/22/2011

The Cloud Security Alliance would like to invite you to review and comment on the following Guidance V.3 Domains: * Domain 4: Compliance and Audit * Domain 8: Data Center Operations * Domain 9: Incident Response, Notification, and Remediation * Domain 11: Encryption and Key Management Y...

Open Review Period for Guidance V.3: Domains 2, 3, 5 and 12 (Has Begun)

Press Release Published: 09/20/2011

The Cloud Security Alliance would like to invite you to review and comment on the following Guidance V.3 Domains: * Domain 2: Governance and Enterprise Risk Management * Domain 3: Legal and Electronic Discovery * Domain 5: Information Lifecycle Management * Domain 12: Identity and Access...

Open Review Period for Guidance V.3: Domains 1,6, 10 and 13 (Has Begun)

Press Release Published: 09/15/2011

The Cloud Security Alliance would like to invite you to review and comment on the following Guidance V.3 Domains: Domain 1: Cloud Computing Architectural Framework Domain 6: Portability and Interoperability Domain 10: Application Security Domain 13: Virtualization Your expertise will en...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.