Cloud 101CircleEventsBlog

All Articles

All Articles
How to Adhere to the AWS Well Architected Framework

Blog Published: 12/10/2021

Originally Published on Fugue’s Website on November 24, 2021 By Becki Lee, Senior Technical Writer The Amazon Web Services Well-Architected Framework is a set of recommendations AWS provides for designing infrastructure for cloud applications and workloads. By following the guidance in the ...

Compliance: Cybersecurity Assurance OR How to Gain the Trust of Your Business Partners

Blog Published: 12/09/2021

By Mustapha Berrabaa – CTO at Fortica Information security is a concern for all organizations, including those that outsource key business operations to third-party vendors (examples: SaaS, cloud service providers).  Poorly managed data can expose companies to attacks such as data theft, exto...

DNS-Layer Security: The Ultimate Guide to What It Is and Why You Need It

Blog Published: 12/09/2021

Originally Published by Cisco on March 10, 2020. Written by Lorraine Bellon, Cisco. If you’re like most people, you probably don’t pay much attention to the domain name system (DNS) or worry about investing in cloud-based DNS-layer security. After all, the hallmark of well-functioning DNS servers...

Cloud Security Alliance Releases New Cloud Controls Matrix Auditing Guidelines

Press Release Published: 12/08/2021

Document provides auditors a baseline understanding of the CCM audit areas, allowing them to better perform a CCM-related audit and assessmentSEATTLE – Dec. 8, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best prac...

Managing Partial Offboarding Risks and Other Bad Breakups

Blog Published: 12/08/2021

This blog was originally published by Authomize here. Written by Michael Sheinkman, Authomize. They say that breaking up is hard to do. You grow together, share secrets, and open up to each other. Maybe you even give them a key to your place. But then the relationship ends and all you want is a c...

Overview of the CxO Trust Initiative

Blog Published: 12/08/2021

Through the CxO Trust Initiative, CSA is looking to elevate the knowledge of cloud computing and cybersecurity best practices amongst executive teams by enabling Chief Information Security Officers (CISOs) with tools to communicate cloud computing, risk, governance, and compliance issues to their...

5 Elements of a Strong Cloud Security Strategy

Blog Published: 12/07/2021

This blog was originally published by Alert Logic here. Written by Antonio Sanchez, Alert Logic. Cloud security continues to be one of the top concerns for IT leaders. Over the last 18 months, cloud adoption has increased as organizations have aggressively pursued digital initiatives in respo...

Registration Opens for the Cloud Security Alliance Research Summit at RSA Conference 2022

Press Release Published: 12/07/2021

This year’s event will provide the latest updates in new and existing research projects, providing critical tools and guidance for the cloud-adopting communitySEATTLE – Dec. 7, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certificatio...

Does Your Supply Chain Have a Nasty Surprise for You?

Blog Published: 12/07/2021

This blog was originally published by Avanade here. Written by Rajiv Sagar, Avanade. Only 14% of Japanese business and IT executives know how well their partners and suppliers are enhancing their own cybersecurity—and that’s less than half the global average of 29%, according to research from Acc...

3 Steps for Continuous Improvement in Cloud Security

Blog Published: 12/06/2021

This blog was originally published by JupiterOne here. Written by Ashleigh Lee, JupiterOne. Relationships make life rich. Together, we can do so much more than a single person alone – inspire change on micro and macro levels, recover and restore hope from storms, practice empathy and compassion ...

Best Practices for Standardizing Identity Security at Scale

Blog Published: 12/06/2021

Written by Sam Flaster, CyberArk Dynamic identities. Dynamic environments. The sheer complexity of enterprise-scale cloud migrations can rapidly introduce new security challenges as organizations struggle to adapt their existing security programs to shifting IT paradigms. Unlocking the technol...

SECtember 2021 Recap: Keynotes by Industry Experts

Blog Published: 12/05/2021

Amidst the backdrop of the pandemic, cybersecurity professionals and teams are challenged to manage cloud computing risks at an unprecedented scale. In this moment, collaboration towards a cloud-centric view of cybersecurity is more important than ever. This past September, CSA hosted SECtember 2...

What’s Your Risk Appetite?

Blog Published: 12/04/2021

Let’s get some dinnerIn European history, the first restaurant was opened in Paris in 1765 with a single dish (sheep’s feet simmered in a white sauce). In eastern history, the first restaurants opened in around 1100 A.D. in China in a number of different cities. Either way, we can all agree that ...

Instant Messaging Could Take Down Your Network

Blog Published: 12/03/2021

This blog was originally published by Ericom here. By Mendy Newman, Ericom. Individuals who value both convenience and privacy – which means almost all users – depend on instant messaging (IM) apps to communicate across all aspects of their personal lives. Every time we open a new chat, Whats...

Cloud Security Alliance Issues Guidance to Help Organizations Optimize Business Outcomes When Using Cloud-native Key Management Services with External Key Origin

Press Release Published: 12/02/2021

Paper offers recommendations for choosing, planning, and deploying cloud-native key management systems when organizations want to or must import key materialSEATTLE – Dec. 2, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications...

How to Better Protect Cloud Workloads and Your Crown Jewels

Blog Published: 12/02/2021

This blog was originally published by Virsec here. Written by Matt Ambroziak, Virsec. Previously, I discussed how the attack surface is expanding in the cloud and the cloud-native security tools and best practices available to help mitigate risk. Now, let’s dig a little deeper into how attack...

The Complete Guide of Kubernetes Role-Based Access Control (RBAC)

Blog Published: 12/02/2021

This blog was originally published by ARMO here. Written by Amir Kaushansky, ARMO. What Is Kubernetes RBAC? First, let’s recap quickly what RBAC is in the context of a Kubernetes cluster. RBAC determines whether a certain entity (whether a user or a pod already running inside the cluster) is allo...

Vulnerability Trends for Q3

Blog Published: 12/01/2021

This blog was originally published by Vulcan Cyber here. Written by Orani Amroussi, Vulcan Cyber. Over the past few months, we’ve seen new vulnerability trends emerge, and with new and old vulnerabilities posing threats to the security of major organizations. Left unresolved, these can quickly re...

A North Star for the Industry: CSA Research Summit at RSA 2022

Blog Published: 12/01/2021

The RSA Conference will always have a special place in the history of the Cloud Security Alliance, as it does with many cybersecurity ventures. CSA was launched at the RSA Conference in 2009 with the first version of our best practices document. We followed that up with our first CSA Summit at RS...

New Guidance From Cloud Security Alliance Aims to Help Cloud Service Customers Better Evaluate Service Level Agreements

Press Release Published: 11/30/2021

Document defines the roles and responsibilities of well-recognized, currently available security services across eight categoriesSEATTLE – Nov. 30, 2021 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to hel...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.