Download Publication
Who it's for:
- Cybersecurity architects
- Cloud engineers
- Cloud security professionals
- Compliance professionals
CSA Enterprise Architecture Reference Guide
Release Date: 05/18/2021
Working Group: Enterprise Architecture
- What the CSA Enterprise Architecture is.
- How to use the CSA Enterprise Architecture.
- The full explanation of each EA domain, the specifics of each of their components, how to apply them to your organization, and their relationships to the other domains.
- The EA domains are:
- Business Operation Support Services (BOSS)
- Information Technology Operation and Support (ITOS)
- Technology Solution Services (TSS)
- Security and Risk Management (SRM)
Download this Resource
Acknowledgements
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC
Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 125 projects, as a Lead Author or Author/Contributor and many more as a Reviewer/Editor.
Michael's extensive contributions encompass critical areas including Artificial Intelligence, Zero Trust/Software Defined Perimeter, Internet of Things, Top Threats, Cloud Control Matrix, DevSecOps, and Key Management. His lea...
Shawn Harris
Director of Information Security
With more than 25 years of information security experience, Shawn Harris is currently the Director of Information Security at Starbucks Coffee Company. His background includes engineering, architecture, and executive responsibilities. Shawn is currently co-chair of the CSA Cloud Controls Matrix working group, where he led efforts to develop the Cloud Control Matrix 4.0. Additionally, he has served on CSA’s Consensus Assessments ...
Jon-Michael Brook
Jon-Michael C. Brook is a certified, 25-year practitioner of cybersecurity, cloud, and privacy. He is the principal contributor to certification sites for privacy and cloud security, and has published books on privacy. Jon-Michael received numerous awards and recognition during his time with Raytheon, Northrop Grumman, Symantec, and Starbucks. He holds patents and trade secrets in intrusion detection, GUI design, and semantic data redaction...
Dr. Yale Li
Yale Li was a Microsoft’s Principal Security Architect responsible for data security, applications development security, and emerging market security in SAFE-T (Security Accelerator for Emerging Technologies) team. Yale was Graduate Education Partner at the Center of Information Assurance and Cyber Security at the University of Washington, and CEO’s Advisor of multiple Microsoft partner companies. As a security professional, Yale worked on ...
Ashish Vashishtha
Security Compliance Leader
Analytical, results-oriented IS/IT Audit, Governance, Risk, and Compliance (GRC) leader over 19 years of experience managing enterprise-wide IT/IS security risk approach for large healthcare and IT services organizations. Passionate design thinker with an ability to harness innovation by facilitating collaboration to develop enterprise-wide security risk assessments (onsite as well as remote) for high-risk Third-Parties leveraging NIST 800-...
Rolando Marcelo Vallejos
Suri Venkat
John Yeoh
Global Vice President of Research, CSA
With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...
Jim Reavis
Co-founder and Chief Executive Officer, CSA
For over 30 years, Jim Reavis has worked in cybersecurity industry as an entrepreneur, writer, speaker, technologist and business strategist. Jim’s innovative thinking about emerging trends have been published and presented widely throughout the industry and have influenced many.
Jim launched Cloud Security Alliance (CSA) in 2009 and has led its global growth and position as among the most vital cybersecurity communities worldwide. Under...
Michael Theriault
Sean Heide
Technical Research Director, CSA
Henry Werchan
Sunil Shanthi
Interested in helping develop research with CSA?
Related Certificates & Training
Learn more