Cloud 101CircleEventsBlog

Research Topic

Cloud Security Services Management

Latest ResearchWorking Group
Roles and Responsibilities of Third Party Security Services
Roles and Responsibilities of Third Party Security Services

Download

Cloud Security Services Management
Collaboration and coordination among all stakeholders are critical to secure the cloud platform. The current gap is that there is no defined guideline dividing the security roles and responsibilities between the Cloud Service Providers (CSPs) and cloud customers; or explaining how to secure cloud services in different cloud deployment models. This is especially the case for those who have little cloud security knowledge. 

No standard understanding of how to implement the shared responsibility model.
While the shared security responsibility model is well recognized, the reality is that, given the same concept of shared responsibility, there are different interpretations and different implementations among different CSPs. There are many cloud security standards and/or specifications developed for CSPs in fulfilling their security responsibilities, but for the cloud customer it is still difficult to design, deploy, and operate a secure cloud service. 

CSA created guidelines for using cloud services securely that are based on the shared responsibility model.
These guidelines provide easy-to-understand guidance for cloud customers and cloud service providers. For cloud customers it explains how to design, deploy, and operate a secure cloud service with respect to different cloud service models. It explains the shared responsibility model and covers common security responsibilities of CSPs versus cloud customers. It then goes on to explain how to fulfill cloud controls (based on the Cloud Controls Matrix) by using third-party security products and services.


Cloud Security Services ManagementEnterprise ArchitectureCloud Component SpecificationsHybrid Cloud Security

CSA Research crowd-sources the knowledge and expertise of security experts and helps address the challenges and needs they’ve experienced, or seen others experience, within the cybersecurity field. Each publication is vendor-neutral and follows the peer review process outlined in the CSA Research Lifecycle. We recommend getting started by reading the following documents.

Guideline on Effectively Managing Security Service in the Cloud

Guideline on Effectively Managing Security Service in the Cloud

This initiative aims to develop a research whitepaper, focusing on building up a cloud security services management platform. This whitepaper will serve as a guideline for cloud service providers to secure its cloud platform and provide cloud security services to cloud users, for cloud users to select security qualified cloud service providers, for security vendors to develop their cloud-based security products and services.

Webinars

Cloud Attacks Are Here: Threat Actors Like Containers Too
Cloud Attacks Are Here: Threat Actors Like Containers Too

December 1 | Online

Learn more

Cloud Attacks Are Here: Threat Actors Like Containers Too
Cloud Attacks Are Here: Threat Actors Like Containers Too

December 1 | Online

Learn more

Responsible Compliance for Cloud Security
Responsible Compliance for Cloud Security

November 30 | Online

Learn more

CISO Panel: Understanding Cloud Data Security Priorities & Challenges in 2022
CISO Panel: Understanding Cloud Data Security Priorities & C...

October 31 | Online

Learn more

Blog Posts

A Tale for the Ages & How DSPM Saved the Day
Know Your Cloud Security Acronyms: CWPP, CSPM, CIEM and CNAPP
The Pros and Cons of Using SaaS Security Services