Cloud 101CircleEventsBlog
Participate in the CSA Top Threats to Cloud Computing 2025 peer review to help shape industry insights!

Working Group

Cloud Security Services Management

This working group hopes to develop a platform for CSPs to publish their security requirements; for security vendors to share their security products and services, and to provide a platform for interoperability testing.
Roles and Responsibilities of Third Party Security Services
Roles and Responsibilities of Third Party Security Services

Download

Cloud Security Services Management
Working Group Overview

This working group hopes to develop a platform for CSPs to publish their security requirements; for security vendors to share their security products and services, and to provide a platform for interoperability testing.


Drafts & Important Docs

Working Group Leadership

Dr. Kai Chen
Dr. Kai Chen

Dr. Kai Chen

Dr. Kai Chen is now serving as the Cybersecurity Ecosystem Specialist of Huawei Technologies Co.,Ltd., is responding for Huawei cybersecurity ecosystem development including strategy, policy and partner engagement, etc. He has over 15 years work experience in applied cryptography, information and network security technical research, standard development, policy and regulation fields; published over 20 research papers and delivered speeches ...

Read more

Dr. Liu Wenmao
Dr. Liu Wenmao

Dr. Liu Wenmao

Director of Innovation Center

Dr. Liu is the Director of Innovation Center, and also the leader of XingYun Lab (Cloud Security) of NSFOCUS Inc. He received his Ph.D. in Information Security from the Harbin Institute of Technology in 2013. After completion of his degree, Dr. Liu served as a researcher at NSFOCUS Inc. During the first two years in NSFOCUS, he was also working at Tsinghua University as a postdoc. He works closely with academia, is a member of the China Com...

Read more

Publications in ReviewOpen Until
AICM mapping to BSI AI C4 CatalogMar 24, 2025
CCMv4.0 Mapping to HITRUST CSF v11.3Mar 25, 2025
SaaS Technical Controls Final DraftApr 03, 2025
The State of Data Privacy EngineeringApr 12, 2025
View all
Who can join?

Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.

What is the time commitment?

The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.

Open Peer Reviews

Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.

Learn how to participate in a peer review here.

AICM mapping to BSI AI C4 Catalog

Open Until: 03/24/2025

The AICM to BSI AI C4 Mapping initiative aims to ensure a comprehensive alignment between the CSA AI Controls Matrix (AICM)...

CCMv4.0 Mapping to HITRUST CSF v11.3

Open Until: 03/25/2025

The Cloud Security Alliance (CSA), would like to announce an additional ma...

SaaS Technical Controls Final Draft

Open Until: 04/03/2025

The Cloud Security Alliance (CSA), in collaboration with MongoDB, GuidePoint Security, and the SaaS Working Group, is invit...

The State of Data Privacy Engineering

Open Until: 04/12/2025

This paper provides a comprehensive overview of Data Privacy Engineering (DPE), its importance, and its application in toda...