Cloud 101CircleEventsBlog
CAIQ Lite is now accepted into the STAR Registry! Showcase your cloud security readiness with a simplified assessment. Learn more today!

Download Publication

Guideline on Effectively Managing Security Service in the Cloud - Chinese Translation
Guideline on Effectively Managing Security Service in the Cloud - Chinese Translation

Guideline on Effectively Managing Security Service in the Cloud - Chinese Translation

Release Date: 01/09/2019

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

This initiative aims to develop a research whitepaper, focusing on building up a cloud security services management platform. This whitepaper will serve as a guideline for cloud service providers to secure its cloud platform and provide cloud security services to cloud users, for cloud users to select security qualified cloud service providers, for security vendors to develop their cloud-based security products and services. 
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Roles and Responsibilities of Third Party Security Services
Roles and Responsibilities of Third Party Secur...
Turkey Cloud Adaptation Survey – Turkey vs EU comparison
Turkey Cloud Adaptation Survey – Turkey vs EU c...
Mapping of 'The Guidelines' Security Recommendations to CCM
Mapping of 'The Guidelines' Security Recommenda...
App-Specific Passwords: Origins, Functionality, Security Risks and Mitigation
App-Specific Passwords: Origins, Functionality, Security Risks and ...
Published: 10/11/2024
Top Threat #3 - API-ocalypse: Securing the Insecure Interfaces
Top Threat #3 - API-ocalypse: Securing the Insecure Interfaces
Published: 10/09/2024
Massive NHI Attack: 230 Million Cloud Environments Were Compromised
Massive NHI Attack: 230 Million Cloud Environments Were Compromised
Published: 09/27/2024
What are the Benefits of a Social Engineering Campaign?
What are the Benefits of a Social Engineering Campaign?
Published: 09/25/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training