Circle
Events
Blog

Research Topic

Cloud Security Services Management

Latest ResearchWorking Group
Roles and Responsibilities of Third Party Security Services
Roles and Responsibilities of Third Party Security Services

Download

Cloud Security Services Management
Collaboration and coordination among all stakeholders are critical to secure the cloud platform. The current gap is that there is no defined guideline dividing the security roles and responsibilities between the Cloud Service Providers (CSPs) and cloud customers; or explaining how to secure cloud services in different cloud deployment models. This is especially the case for those who have little cloud security knowledge. 

No standard understanding of how to implement the shared responsibility model.
While the shared security responsibility model is well recognized, the reality is that, given the same concept of shared responsibility, there are different interpretations and different implementations among different CSPs. There are many cloud security standards and/or specifications developed for CSPs in fulfilling their security responsibilities, but for the cloud customer it is still difficult to design, deploy, and operate a secure cloud service. 

CSA created guidelines for using cloud services securely that are based on the shared responsibility model.
These guidelines provide easy-to-understand guidance for cloud customers and cloud service providers. For cloud customers it explains how to design, deploy, and operate a secure cloud service with respect to different cloud service models. It explains the shared responsibility model and covers common security responsibilities of CSPs versus cloud customers. It then goes on to explain how to fulfill cloud controls (based on the Cloud Controls Matrix) by using third-party security products and services.


Cloud Security Services ManagementEnterprise ArchitectureCloud Component SpecificationsHybrid Cloud Security

Discuss this topic in Circle

Have an interesting article or video on this topic that you want to share? Anyone can join the discussion community for this topic to share ideas or ask questions.

View discussion community

Participate in Cloud Security Services Management Research

This working group hopes to develop a platform for CSPs to publish their security requirements; for security vendors to share their security products and services, and to provide a platform for interoperability testing.

View the working group

View all

CSA Research crowd-sources the knowledge and expertise of security experts and helps address the challenges and needs they’ve experienced, or seen others experience, within the cybersecurity field. Each publication is vendor-neutral and follows the peer review process outlined in the CSA Research Lifecycle. We recommend getting started by reading the following documents.

Guideline on Effectively Managing Security Service in the Cloud

Guideline on Effectively Managing Security Service in the Cloud

This initiative aims to develop a research whitepaper, focusing on building up a cloud security services management platform. This whitepaper will serve as a guideline for cloud service providers to secure its cloud platform and provide cloud security services to cloud users, for cloud users to select security qualified cloud service providers, for security vendors to develop their cloud-based security products and services.

Webinars

CISO Panel: Understanding Cloud Data Security Priorities & Challenges in 2022
CISO Panel: Understanding Cloud Data Security Priorities & C...

October 31 | Online

Learn more

Cloud Data Security 101: How to Reduce Your Data Attack Surface
Cloud Data Security 101: How to Reduce Your Data Attack Surface

October 24 | Online

Learn more

SaaS Security Best Practices
SaaS Security Best Practices

October 6 | Online

Learn more

Sponsored CSA Research Survey - Trends in Securing Sensitive Data with Privacy Enhancing Technologies
Sponsored CSA Research Survey - Trends in Securing Sensitive...

October 5 | Online

Learn more

Blog Posts

Know Your Cloud Security Acronyms: CWPP, CSPM, CIEM and CNAPP
The Pros and Cons of Using SaaS Security Services
Cloud Workload Security: Part 4 - Explaining the Security Features of GCP