Cloud 101CircleEventsBlog

Download Publication

Information Security Management through Reflexive Security
Information Security Management through Reflexive Security

Information Security Management through Reflexive Security

Release Date: 08/01/2019

Working Group: DevSecOps

DevOps, the practice of applying developmental best practices such as collective collaboration to infrastructure operations, has been shown to positively impact efficiencies of development and operations teams today, especially in the cloud environment. Given its strengthening adoption, it is necessary to consider its impact on information security itself and look to apply those practices to the arena of information security management.

This document defines “Reflexive Security” as a new security management approach that is built upon the interrelationships between security, development and operations necessary for protecting the security stance and the deliverables of an organization.

Download this Resource

Bookmark
Share
Related resources
The Six Pillars of DevSecOps - Pragmatic Implementation
The Six Pillars of DevSecOps - Pragmatic Implem...
DevSecOps - Pillar 4 Bridging Compliance and Development
DevSecOps - Pillar 4 Bridging Compliance and De...
The Six Pillars of DevSecOps: Automation
The Six Pillars of DevSecOps: Automation
You’ve Tackled Shadow IT - Now It’s Time to Tackle Shadow DevOps
You’ve Tackled Shadow IT - Now It’s Time to Tackle Shadow DevOps
Published: 11/21/2023
Embracing a Cloud-Native Mindset
Embracing a Cloud-Native Mindset
Published: 11/06/2023
Shift Left is Only Part of Secure Software Delivery in Financial Services
Shift Left is Only Part of Secure Software Delivery in Financial Se...
Published: 11/01/2023
Three Cloud Security Remediation Mistakes Companies Keep Making (And What to Do About Them)
Three Cloud Security Remediation Mistakes Companies Keep Making (An...
Published: 10/26/2023

Acknowledgements

Michael Roza
Michael Roza
Head of Risk, Audit, Control and Compliance

Michael Roza

Head of Risk, Audit, Control and Compliance

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Sean Heide
Sean Heide
Technical Research Director, CSA

Sean Heide

Technical Research Director, CSA

This person does not have a biography listed with CSA.

Ronald Tse
Ronald Tse
CEO, Ribose

Ronald Tse

CEO, Ribose

Ronald has served CSA in numerous capacities, including as a member of CSA's APAC Research Advisory and International Standardization Council. Additionally, he co-chairs the Open Certification Framework (OCF), SaaS Governance, and DevSecOps working groups. He is the founder and CEO of Ribose, where under his leadership the company has been consistently awarded the industry's highest cloud security ratings, including being the on...

Read more

David Lewis Headshot Missing
David Lewis

David Lewis

This person does not have a biography listed with CSA.

Eric Gauthier Headshot Missing
Eric Gauthier

Eric Gauthier

This person does not have a biography listed with CSA.

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training