Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

Press Releases

Press Releases
Call for Volunteers: Security Guidance for Critical Areas of Focus in Cloud Computing

Published: 06/08/2015

The Cloud Security Alliance’s (CSA) Security Guidance for Critical Areas of Focus leverages the CSA Cloud Control Matrix and seeks to establish a stable, secure baseline for cloud operations. It acts as a practical, actionable road map to individuals looking to safely and securely adopt the cloud...

CSA Establishes Cloud Data Governance Working Group and Releases Governance Framework

Published: 06/04/2015

The Cloud Data Governance working group has been created to design a universal set of principles and map to emerging technologies and techniques for ensuring the privacy, confidentiality, availability, integrity and security of data across private and public clouds. Read blog post

Cloud Security Alliance Releases New Privacy Level Agreement Guidelines to Address Personal Data Protection Compliance

Published: 06/03/2015

Powerful Self-regulatory Tool to Help Cloud Customers Better Understand and Evaluate Cloud Service Providers European Union Wide LONDON - Infosecurity Europe – June 3, 2015 - The Cloud Security Alliance (CSA) Privacy Level Agreement (PLA) Working Group today released the Privacy Level Agreement (...

What is Quantum-Safe Security?

Published: 05/28/2015

The Quantum-Safe Security working group released a position paper titled ‘What is Quantum-Safe Security?’ The document examines the need for a proactive defense against a multi-purpose quantum computer. Read blog post

Who’s backing up BYOD data? One more reason for cloud disaster recovery

Published: 05/28/2015

If you’re among the 60% of organizations that don’t have a disaster recovery plan, or among the 59% that only back up data in one location, here are 5 good reasons to shore up your plan and include the cloud as one of your endpoint backup solutions... Read blog post

Healthcare Duped By “Spellcheck” Phishing Attack Again?

Published: 05/25/2015

The “Spellcheck” phishing attack may very well be the most advanced spear phishing attack the world has ever seen. Playing off of human error makes preventing breaches/limiting the damage a people problem, just as much as it is a security technology gap. Read blog post

Cloud Security Alliance Launches New Asia-Pacific Education Council

Published: 05/25/2015

Group Holds Kick-Off Meeting to Finalize Charter and Outline Upcoming Initiatives SINGAPORE – May 25, 2015 – The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, toda...

CSA Releases New Whitepaper on Virtualization Security Best Practices

Published: 05/07/2015

The CSA's Virtualization working group released a whitepaper entitled: “Best Practices for Mitigating Risks in Virtualized Environments” which provides guidance on the identification and management of security risks specific to compute virtualization technologies that run on server hardware. Rea...

CSA Launches Best Practices for Mitigating Risks in Virtualized Environments

Published: 05/06/2015

At this year’s RSA Conference, the Cloud Security Alliance released a new whitepaper entitled: “Best Practices for Mitigating Risks in Virtualized Environments” which provides guidance on the identification and management of security risks specific to compute virtualization technologies that run ...

CSA CloudBytes: May Webcast

Published: 05/06/2015

The Cloud Security Alliance CloudBytes webinar series is dedicated to educate the industry on the latest trends and topics in cloud computing. From regulation and risk in the cloud to the latest topics in IoT and data protection and privacy, we've reached thousands with our messages from top indu...

Cloud Security Alliance Releases Candidate Mapping of FedRAMP Security Controls

Published: 05/05/2015

At the Cloud Security Alliance Federal Summit, the CSA announced the release of the Candidate Mapping V4 of the FedRAMP security controls to version 3.0.1 of the CSA Cloud Controls Matrix (CCM). The FedRAMP controls are based on the National Institute of Standards and Technology (NIST) Special Pu...

OPEN PEER REVIEW: Privacy Level Agreement 4 Europe V2

Published: 04/28/2015

The Cloud Security Alliance would like to invite you to review and comment on the Privacy Level Agreement 4 Europe V2. The Cloud Security Alliance published in February 2013 the “Privacy Level Agreement Outline for CSPs Providing Services in the European Union” (PLA4EU V.1). The PLA4EU V.1 should...

(ISC)²® and Cloud Security Alliance Introduce New Cloud Security Certification

Published: 04/21/2015

Rapid growth and adoption of cloud services increase demand for cloud security expertise RSA Conference, San Francisco, CA, April 21, 2015 — (ISC)²® (“ISC-squared”) and the Cloud Security Alliance® (CSA) today announced the new Certified Cloud Security Professional (CCSP) certification. The CCSP...

Qualys CEO Philippe Courtot Receives the 2015 Industry Leadership Award from the Cloud Security Alliance

Published: 04/20/2015

Courtot Honored for His Industry Innovations and Support as a Founding Member of the Cloud Security Alliance SAN FRANCISCO, Calif. – RSA Conference USA 2015, Booth #N3421 - April 20, 2015 – The Cloud Security Alliance (CSA) has named Philippe Courtot, CEO of cloud security firm Qualys, Inc. (NAS...

CSA STAR Registry Surpasses 100 Entries; New CSA STAR Watch Tool Now in Open Beta

Published: 04/20/2015

Cloud Providers Globally Seek to Meet Security Baselines Established by CSA San Francisco, CA – April 20, 2015 – The Cloud Security Alliance (CSA) today announced significant momentum for the CSA Security, Trust and Assurance Registry (STAR) program. CSA STAR is the industry’s comprehensive clou...

CSA Launches New Security Guidance for Early Adopters of the IoT

Published: 04/20/2015

Cross-Industry Guidance Highlights Key Challenges and Recommended IoT Security Controls. These controls have been tailored to IoT-specific characteristics to allow early adopters to mitigate many of the risks associated with this new technology. San Francisco, CA – April 20, 2015 – The Cloud Sec...

Hot Legal Issues in the Cloud to Take Center Stage at Cloud Security Alliance Legal Information Seminar at RSA Conference 2015

Published: 04/09/2015

Representatives from California Department of Justice, Federal Trade Commission, IT Law Group, and MUFG Union Bank to Emphasize "An Ounce of Preparation is Better than a Pound of Damage Control" San Francisco, CA (RSA Conference 2015) – April 8, 2015 – The Cloud Security Alliance (CSA) today an...

OPEN PEER REVIEW: Cloud Forensics Capability Maturity Model

Published: 04/09/2015

The Cloud Security Alliance would like to invite you to review and comment on the Cloud Forensics Capability Maturity Model. This document describes a process maturity model that can be used by both cloud consumers and cloud service provider’s (CSP’s) in assessing their process maturity in conduc...

Cloud Security Alliance to Host Third Software Defined Perimeter (SDP) Hackathon– Top Prize of $10,000 Available

Published: 04/07/2015

Participants Invited to Gain Access to Password Provided Account at RSA Conference; To Date No One Has Broken Alliance’s SDP Security Specification San Francisco, Calif. (RSA Conference Booth 2621) – April 7, 2015 - The Cloud Security Alliance (CSA), a not-for-profit organization which promotes ...

CSA Working Group Sessions at RSA

Published: 04/01/2015

CSA would like to invite members and other security professionals in San Francisco for RSA to working group sessions from CSA’s Research Portfolio. On Tuesday 4/21 from 9am-5pm, CSA will host and share updates to the following working groups: Cloud Data Governance Internet of Things Cloud I...

Looking for the CCM?

Start using the Cloud Controls Matrix to simplify compliance with multiple standards & regulations.