Research Artifacts

Cloud Controls Matrix v3.0.1 (July 2014)

Cloud Controls Matrix v3.0.1 (July 2014)

New and updated mappings, consolidation of redundant controls, rewritten controls for clarity of intent, STAR enablement, and SDO alignment.

Release Date: 07/11/2014
Big Data, Big Concerns, and What the White House Wants to Do about It

Big Data, Big Concerns, and What the White House Wants to Do about It

Big data tools offer astonishing and powerful opportunities to unlock previously inaccessible insights from new and existing data sets. Large amounts of data are being processed through new techniques and technologies, dissecting the digital footprints individuals leave behind, and revealing a surprising number of personal details.

Release Date: 05/29/2014
STAR Certification Guidance Document: Auditing the Cloud Controls Matrix (CCM)

STAR Certification Guidance Document: Auditing the Cloud Controls Matrix (CCM)

There are a number of control areas on the CCM that will each be awarded a management capability score on a scale of 1-15. This 2nd version release includes alignment with the CCM v1.4 and v3.X.

Release Date: 05/16/2014
Guidelines for CPAs Providing CSA STAR Attestation

Guidelines for CPAs Providing CSA STAR Attestation

This document provides guidance for CPAs in conducting a STAR Attestation.

Release Date: 05/15/2014
SDP Specification v1.0

SDP Specification v1.0

This document outlines a Cloud Security Alliance (CSA) initiated protocol for the Software Defined Perimeter specification, and requests discussion and suggestions for improvements.

Release Date: 04/30/2014
SDP Hackathon Whitepaper

SDP Hackathon Whitepaper

The CSA SDP Hackathon challenged hackers to attack a server defended by a software defined perimeter. Of the billions of packets fired at the server, not one attacker penetrated even the first layer of security. The whitepaper outlines how this is possible.

Release Date: 04/17/2014
Comment on Big Data and the Future of Privacy

Comment on Big Data and the Future of Privacy

Responses to questions on the relationship between big data and public policy, government, technology trends, and policy frameworks.

Release Date: 04/09/2014
Research Lifecycle

Research Lifecycle

A step-by-step guide to producing and distributing research artifacts. From inspiration and conception to publication and distribution, it covers the the process for research projects and their typical timeframes. The Research Lifecycle is a tool to provide a framework for the life of a research artifact.

Release Date: 03/19/2014
The Future of Security

The Future of Security

Disruption defines the business of information security. New technologies change how businesses work, as well as what risks people take. Attackers shift their strategies. But the better security professionals predict and prepare for these disruptions, the more effective we can be.

Release Date: 02/25/2014
The Future of Security: Executive Summary

The Future of Security: Executive Summary

Disruption defines the business of information security. New technologies change how businesses work, as well as what risks people take. Attackers shift their strategies. But the better security professionals predict and prepare for these disruptions, the more effective we can be.

Release Date: 02/25/2014
SAFEcode/CSA: Practices for Secure Development of Cloud Applications

SAFEcode/CSA: Practices for Secure Development of Cloud Applications

SAFECode and CSA partnered to determine whether additional software security guidance was needed to address unique threats to the cloud computing, and if so, to identify specific security practices in the context of identified threats.

Release Date: 12/04/2013
Software Defined Perimeter

Software Defined Perimeter

This document explains the software defined perimeter (SDP) security framework and how it can be deployed to protect application infrastructure from network-based attacks. The SDP incorporates security standards from organizations such as the National Institute of Standards and Technology (NIST) as well as security concepts from organizations such as the U.S. Department of Defense (DoD) into an integrated framework.

Release Date: 12/01/2013
Net+ Initiative CCM v.3 Candidate Mappings

Net+ Initiative CCM v.3 Candidate Mappings

A team of 30 CIOs, CISOs, and other executives from Internet2’s membership (both higher education institutions and industry service providers) developed this extended version of the CCM. This version includes candidate mappings to address higher education security and compliance requirements.

Release Date: 12/01/2013
Cloud Controls Matrix v3.0

Cloud Controls Matrix v3.0

Cloud Controls Matrix (CCM) Version 3.0, is a comprehensive update to the industry’s gold standard for assessing cloud centric information security risks.

Release Date: 09/26/2013
Publicizing Your STAR Certification

Publicizing Your STAR Certification

The following guidelines will help you to apply good practice in publicizing, communicating and promoting your certification to stakeholders, including staff, customers and business partners, and to the general public.

Release Date: 09/03/2013
Requirements for Bodies Providing STAR Certification

Requirements for Bodies Providing STAR Certification

This document outlines how to conduct a STAR certification assessments to the Cloud Controls Matrix (CCM) as part of an ISO 27001 assessment.

Release Date: 09/03/2013
Government Access to Information

Government Access to Information

The survey received almost 500 responses from CSA members around the world. It found that 56% of non-US residents were now less likely to use US-based cloud providers, in light of recent revelations about government access to customer information.

Release Date: 07/23/2013
Mapping the Forensic Standard ISO/IEC 27037 to Cloud Computing

Mapping the Forensic Standard ISO/IEC 27037 to Cloud Computing

The purpose of this document is to survey the issues related to forensic investigation in cloud environments, to describe the international standards for cloud forensics, and to summarize the current integration of cloud forensic requirements into service level agreements (SLAs).

Release Date: 06/26/2013
Expanded Top Ten Big Data Security and Privacy Challenges

Expanded Top Ten Big Data Security and Privacy Challenges

Big Data remains one of the most talked about technology trends in 2013. But lost among all the excitement about the potential of Big Data are the very real security and privacy challenges that threaten to slow this momentum.

Release Date: 06/16/2013