Download Publication

Security Guidance for Critical Areas of Focus in Cloud Computing v5
Release Date: 07/15/2024
Working Group: Security Guidance
Note that Security Guidance is no longer the primary study material for the Certificate of Cloud Security Knowledge (CCSK). Access the CCSK v5 Study Guide here. Security Guidance v5 provides a more comprehensive understanding of the 12 domains, but is not required to pass the CCSK v5 exam.
Cloud Security Domains Covered:
- Cloud Computing Concepts and Architectures
- Cloud Governance
- Risk, Audit, and Compliance
- Organization Management
- Identity and Access Management
- Security Monitoring
- Infrastructure and Networking
- Cloud Workload Security
- Data Security
- Application Security
- Incident Response and Resilience
- Related Technologies and Strategies
Download this Resource
Related Resources
Acknowledgements

Daniele Catteddu
Chief Technology Officer, CSA
Daniele Catteddu is an information security and risk management practitioner, technologies expert and privacy evangelist with over 15 of experience. He worked in several senior roles both in the private and public sector. He is member of various national and international security expert groups and committees on cyber-security and privacy, keynote speaker at several conferences and author of numerous studies and papers on risk management, ...

Rich Mogull
CEO at Securosis
Rich is the VP of Product for DisruptOPS and Analyst and CEO of Securosis. With twenty years of experience in information security, physical security, and risk management, Rich is one of the foremost experts on cloud security, having driven development of the Cloud Security Alliance’s V4 Guidance and the associated CCSK training curriculum. He is a prolific writer and fe...

Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

John Yeoh
Global Vice President of Research, CSA
With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...
Interested in helping develop research with CSA?
Related Certificates & Training

Learn more