Research Topic
Cloud Security Services Management
Roles and Responsibilities of Third Party Security Services
Cloud Security Services ManagementEnterprise ArchitectureCloud Component SpecificationsHybrid Cloud Security
![](/assets/logos/circle-logo-icon-0363c38a37c65fa263a15e331b843b19d99db7de683947de1fee8f5d1ca9965c.png)
Discuss this topic in Circle
View discussion community![](/assets/research/topics/working-group-blue-circle-ec5fa32d3f4da2c65e251b426f82221fd5d948f4e817f90ba5651d7528fc6653.png)
Participate
Press Mention | Source | Date |
---|---|---|
Organizations not confident they can protect sensitive data in the public cloud | SC Media | July 13, 2022 |
Achieving cloud excellence and efficiency with cloud maturity models | IBM Blog | May 17, 2024 |
CSA Research crowd-sources the knowledge and expertise of security experts and helps address the challenges and needs they’ve experienced, or seen others experience, within the cybersecurity field. Each publication is vendor-neutral and follows the peer review process outlined in the CSA Research Lifecycle. We recommend getting started by reading the following documents.
Guideline on Effectively Managing Security Service in the Cloud
This initiative aims to develop a research whitepaper, focusing on building up a cloud security services management platform. This whitepaper will serve as a guideline for cloud service providers to secure its cloud platform and provide cloud security services to cloud users, for cloud users to select security qualified cloud service providers, for security vendors to develop their cloud-based security products and services.
Webinars
![Impact of Digital Transformation on Security Strategy](/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTI1OCwicHVyIjoiYmxvYl9pZCJ9fQ==--dd6b80f41d66e4370619c718a0dea3800b2bcad0/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMjMweDE4NF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ae668ec85fc8c9fcfec4a6acf011dcde1375ca3a/10.png)
![Key Considerations to Get Buy-in for a SaaS Data Security Program](/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTI4MywicHVyIjoiYmxvYl9pZCJ9fQ==--dc03f888217e55f745106165234abb34e05998f2/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMjMweDE4NF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ae668ec85fc8c9fcfec4a6acf011dcde1375ca3a/16.png)
![Standardize Identity Security: From On-Prem to Multi-Cloud](/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTM2OCwicHVyIjoiYmxvYl9pZCJ9fQ==--6cbfe5201499e3690b1d50cff08373188b31c05a/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMjMweDE4NF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ae668ec85fc8c9fcfec4a6acf011dcde1375ca3a/CyberArk-Web-Thumbnail.png)
![Transforming Enterprise Cloud Security to Supercharge Developer Velocity](/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTM2OSwicHVyIjoiYmxvYl9pZCJ9fQ==--882d88fdfa147dbed697b40711b66c48bf28f001/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJhdXRvX29yaWVudCI6dHJ1ZSwicm90YXRlIjowLCJncmF2aXR5IjoiY2VudGVyIiwicmVzaXplIjoiMjMweDE4NF4iLCJiYWNrZ3JvdW5kIjoibm9uZSJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--ae668ec85fc8c9fcfec4a6acf011dcde1375ca3a/Fugue-Web-Thumbnail.png)