Download Publication
.png)
CCM Video Series: HRS - Human Resources Security
Release Date: 11/04/2024
In this presentation we focus on the Human Resources (HRS) security domain, which comprises thirteen control specifications designed to help cloud organizations manage risks associated with insider threats. These controls ensure that personnel handling sensitive data are trustworthy, properly trained, and equipped to maintain the security posture of the organization, reducing risks like unauthorized access and data breaches caused by human factors.
Under the Shared Security Responsibility Model (SSRM), both Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs) independently implement HRS security controls. This includes conducting background checks, providing continuous security training, and ensuring employees are aware of cloud security risks and best practices.
By implementing HRS controls, cloud organizations can enhance the security of their services through the employment of well-trained, vetted staff, mitigating the risks of security incidents due to human error or malicious actions.
Under the Shared Security Responsibility Model (SSRM), both Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs) independently implement HRS security controls. This includes conducting background checks, providing continuous security training, and ensuring employees are aware of cloud security risks and best practices.
By implementing HRS controls, cloud organizations can enhance the security of their services through the employment of well-trained, vetted staff, mitigating the risks of security incidents due to human error or malicious actions.
Download this Resource
Are you a research volunteer? Request to have your profile displayed on the website here.
Related Certificates & Training

Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more
Learn more