Cloud 101CircleEventsBlog
Download Presentations from the CSA AI Summit at RSAC Now

Download Publication

Information Security Management through Reflexive Security
Information Security Management through Reflexive Security

Information Security Management through Reflexive Security

Release Date: 08/01/2019

Working Group: DevSecOps

DevOps, the practice of applying developmental best practices such as collective collaboration to infrastructure operations, has been shown to positively impact efficiencies of development and operations teams today, especially in the cloud environment. Given its strengthening adoption, it is necessary to consider its impact on information security itself and look to apply those practices to the arena of information security management.

This document defines “Reflexive Security” as a new security management approach that is built upon the interrelationships between security, development and operations necessary for protecting the security stance and the deliverables of an organization.

Download this Resource

Bookmark
Share
Related resources
The Six Pillars of DevSecOps - Collaboration and Integration
The Six Pillars of DevSecOps - Collaboration an...
The Six Pillars of DevSecOps - Pragmatic Implementation
The Six Pillars of DevSecOps - Pragmatic Implem...
DevSecOps - Pillar 4 Bridging Compliance and Development
DevSecOps - Pillar 4 Bridging Compliance and De...
How Continuous Controls Monitoring Brings IT Unity & Agility
How Continuous Controls Monitoring Brings IT Unity & Agility
Published: 05/10/2024
A Risk-Based Approach to Vulnerability Management
A Risk-Based Approach to Vulnerability Management
Published: 05/10/2024
Building Resilience Against Recurrence with Cloud Remediation
Building Resilience Against Recurrence with Cloud Remediation
Published: 05/09/2024
Is Managed Kubernetes the Right Choice for My Organization?
Is Managed Kubernetes the Right Choice for My Organization?
Published: 05/07/2024

Acknowledgements

Michael Roza
Michael Roza
Head of Risk, Audit, Control and Compliance

Michael Roza

Head of Risk, Audit, Control and Compliance

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Sean Heide
Sean Heide
Technical Research Director, CSA

Sean Heide

Technical Research Director, CSA

Ronald Tse
Ronald Tse
CEO, Ribose

Ronald Tse

CEO, Ribose

Ronald has served CSA in numerous capacities, including as a member of CSA's APAC Research Advisory and International Standardization Council. Additionally, he co-chairs the Open Certification Framework (OCF), SaaS Governance, and DevSecOps working groups. He is the founder and CEO of Ribose, where under his leadership the company has been consistently awarded the industry's highest cloud security ratings, including being the on...

Read more

David Lewis Headshot Missing
David Lewis

David Lewis

Eric Gauthier Headshot Missing
Eric Gauthier

Eric Gauthier

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training