CSA Monthly Newsletter (November 18, 2015) - As the weather turns colder and the days shorter, the CSA Research Team is working on various projects, initiatives, and events. We look forward to seeing you at the various Summit and Congress events across the globe and your contribution to CSA Guidance V.4.
As the weather turns colder and the days shorter, the CSA Research Team is working on various projects, initiatives, and events. We look forward to seeing you at the various Summit and Congress events across the globe and your contribution to CSA Guidance V.4.
Stay up to date with our latest research projects.
The Cloud Security Alliance’s Security Guidance for Critical Areas of Focus in Cloud Computing seeks to establish a stable, secure baseline for cloud operations. It acts as a practical, actionable roadmap to individuals looking to safely and securely adopt the cloud paradigm. A draft of Domain 1 is now available for review.
The Cloud Security Alliance Top Threats Working Group is conducting a survey of global security concerns in cloud computing. This short survey asks you to rate the relevance of 13 shortlisted security concerns in cloud computing. In addition, you will be given an opportunity to comment on and provide anecdotes for these security concerns.
The cloud presents all kinds of opportunities for today’s enterprise, from anywhere access to anything-as-a-service. Cloud computing imposes significant security risks on the corporation, network, IT and the day to day activities of the business. How do they maintain compliance, control and ownership of sensitive data as they move from the physical environment to a cloud world? The distribution of data onto devices may not be completely controlled by the data owner, and there is liability confusion as cloud service providers take on a larger role.
With the rise of cloud computing and innovation from the Asia Pacific (APAC) region, we are witnessing a boom in technology businesses in APAC. With this growth, the Cloud Security Alliance Asia Pacific (CSA APAC) is delighted to announce the 2015 CSA APAC Congress held in Guangzhou, China
The EU-US Safe Harbor agreement for data transfers has been declared invalid. Hear what this means for you, your organization and your data on EU citizens. Can you save data in US cloud services, and if so, what do you need to know to ensure you don’t break privacy laws.
Cloud Access Security Brokers (CASBs) are the hottest security technologies on the market. They provide organizations with much needed visibility and control over corporate data as it moves beyond the firewall via the public cloud.
Cargill has been at the forefront of this movement, and in this webinar we will share the findings of his research into Microsoft Office 365 controls and how they’re leveraging a Cloud Access Security Broker (CASB) to achieve comprehensive data protection.
Thanks to the support of our peer reviewers and contributors (including the EU projects SPECS, A4Cloud and CUMULUS), we are pleased to announce the release of the CSA Cloud Trust Protocol (CTP) data model and API specification. The Cloud Trust Protocol (CTP) is designed to be a mechanism by which cloud service customers can ask for and receive information related to the security of the services they use in the cloud, promoting transparency and trust.
The Incident Management and Forensics Working Group released its “Cloud Forensics Capability Maturity Model”, a new research report that describes a Capability Maturity Model (CMM) that can be used by both cloud consumers and Cloud Service Providers (CSPs) in assessing their process maturity for conducting digital forensic investigations in the cloud environment.
The Internet of Things (IoT) has been experiencing massive growth in both consumer and business environments. In response to this emerging market and the particular security requirements of these connected devices, The CSA established the IoT Working Group to focus on providing relevant guidance to its stakeholders who are implementing IoT solutions.