ChaptersEventsBlog

All Articles

All Articles
Understanding STAR for AI Level 2: A Practical Step Toward AI Security Compliance

Blog Published: 11/19/2025

The landscape of AI governance continues to evolve rapidly, presenting significant challenges for organizations trying to establish robust compliance frameworks. The Cloud Security Alliance (CSA) has introduced an initial version of the STAR for AI Level 2 designation, which leverages ...

How to Measure SOC Efficiency and Performance (Lessons from the Frontlines)

Blog Published: 11/24/2025

Written by Ben Brigida, Expel. This blog is based on a recent session where Ray and I (Ben) discussed the key aspects to measuring security operations center (SOC) effectiveness. Over the years leading SOCs, I've learned that measuring success is one of the toughest challenges we face. A ...

3 Vulnerabilities in Generative AI Systems and How Penetration Testing Can Help

Blog Published: 11/24/2025

Originally published by Schellman. With proven real-life use cases, it’s a no-brainer that companies are looking for ways to integrate large language models (LLMs) into their existing offerings to generate content. A combination that’s often referred to as Generative AI, LLMs enable chat i...

Cloud Security Alliance Announces Availability of STAR for AI Level 2 and Valid-AI-ted for AI

Press Release Published: 11/20/2025

Microsoft and Zendesk recognized as first organizations to achieve STAR for AI Level 2 certification SEATTLE – November 20, 2025 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud ...

The Internet is a Single Point of Failure

Blog Published: 11/21/2025

Resiliency through multicloud looks great on paper, but the reality is far more complex (and expensive). Thanks to Amazon, Microsoft, and Google, my calendar over the past few weeks spiked with members calling to discuss cloud resiliency. Each of these outages was rare, and none of them sha...

The Ghost in the Machine is a Compulsive Liar

Blog Published: 12/12/2025

We built AI in our own image, but we forgot the blueprint – and now we’re shocked when it lies to us? The fix isn’t in the code, but our philosophy of perception. Forget technical manuals - the best explanation of AI risk I ever heard came from the neuroscientist Andrew Gallimore talking...

MCP Can Be RCE for You and Me

Blog Published: 11/25/2025

Before I get into the meat of this post, I want to emphasize that I am a huge fan of MCP (Model Context Protocol) servers and I believe the technology offers more than enough value to justify its use in the enterprise. But, like everything else on the planet, MCP is a double edged sword. And...

Enhancing the Agentic AI Security Scoping Matrix: A Multi-Dimensional Approach

Blog Published: 12/16/2025

  Introduction AWS recently launched the Agentic AI Security Scoping Matrix, a framework designed to help organizations securely deploy autonomous AI systems. The AWS framework categorizes AI systems into four scopes based on agency and autonomy levels: Scope 1 (No Agency): Human...

How to Build AI Prompt Guardrails: An In-Depth Guide for Securing Enterprise GenAI

Blog Published: 12/10/2025

As generative AI moves from experimentation to widespread enterprise deployment, a subtle but serious issue is becoming clear: AI models cannot inherently protect the sensitive data users provide to them. Organizations enthusiastically adopt LLMs to boost efficiency and accelerate decision-m...

Is Cloud-Native Key Management Right for You?

Blog Published: 12/19/2025

If you’re moving sensitive workloads into the cloud, the question “How will we handle key management in cloud services?” comes up quickly. Most providers make the decision feel easy. Turn on their cloud-native key management service, wire it into storage and databases, and move on. But how f...

Choosing the Right Key Responsibility Model

Blog Published: 01/05/2026

When organizations move sensitive workloads to the cloud, encryption is usually the easy part. The harder question is: who actually controls the keys? Unfortunately, terms like BYOK, HYOK, and CMK do not have an agreed-upon meaning throughout the industry. Our new Key Responsibility Models i...

The CSA Cloud Controls Matrix v4.1: Strengthening the Future of Cloud Security

Blog Published: 12/02/2025

Since its introduction in 2010, the Cloud Controls Matrix (CCM) has become a cornerstone of cloud security and compliance worldwide. Adopted across industries and geographies, it has enabled cloud service providers and cloud customers alike to evaluate their security posture, establish trust...

Killing Standing Privileges: Why Just-in-Time Access is the Future of PAM

Blog Published: 12/04/2025

If you had to pick a single control that changes the game for cloud security, you might want to choose killing standing privileges. Identity is now the easiest way in for attackers. Gartner has warned that mismanagement of identities, access, and privilege will be the top reason for cl...

IaC Security in the Age of AI: New Threats, Smarter Solutions

Blog Published: 01/05/2026

Let’s be real, Infrastructure-as-Code (IaC) is the heartbeat of modern cloud environments. It’s what allows teams to automate complex setups, keep everything consistent, and move from idea to deployment in record time. Instead of manually wiring systems together, engineers can now define thei...

The CSA Triangle Chapter’s Year of Momentum: 2025 Highlights

Blog Published: 12/11/2025

Building on a strong foundation, the CSA Triangle Chapter continued its mission in 2025 to advance education and awareness across Cloud Security, Zero Trust, and AI Safety; forge powerful partnerships; and deepen community engagement across its expanding region, which now extends beyond...

Why Compliance as Code is the Future (And How to Get Started)

Blog Published: 12/04/2025

Originally published by RegScale. If you’ve ever managed enterprise compliance, you know the drill all too well. It’s the night before the audit deadline and you’re drowning in spreadsheets, frantically gathering evidence. It’s 2025 — but you feel like you’re still doing compliance like it’...

AI Explainability Scorecard

Blog Published: 12/08/2025

Contributed by Aiceberg.   Part 1 — Why Transparency Is the True Measure of Trust When a medical AI system once recommended denying a patient treatment, the doctors hesitated—but couldn’t explain why. The algorithm’s reasoning was invisible, locked inside a mathematical “black...

Zero Trust for OT in Manufacturing: A Practical Path to Modern Industrial Security

Blog Published: 12/08/2025

  Introduction Over the past decade, manufacturing has emerged as one of the most heavily targeted industries for cyberattacks. These environments are inherently complex, built on layers of specialized and often non-standard technologies that rarely align with traditional IT lifecycl...

Security for AI Building, Not Security for AI Buildings

Blog Published: 12/09/2025

  AWS re:Invent 2025 Shows What "Shift Left" Can Mean for AI Security Although I wasn’t at AWS re:Invent in person this year (only the second one I’ve missed since 2013), I sat at home closely following the early “pre:Invent” and official conference announcements. While it’s always ri...

Deterministic AI vs. Generative AI: Why Precision Matters for Automated Security Fixes

Blog Published: 12/17/2025

Originally published by Gomboc.ai. In 2024, the dirty little secret was out: over 60% of AI-generated security fixes still had to be torn apart and rebuilt by engineers before they were safe to ship. That’s not “helping,” that’s creating rework. The reason? Guesswork dressed up as intellige...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.