Circle
Events
Blog

Research Topic

Cloud Security Services Management

Latest ResearchWorking Group
Roles and Responsibilities of Third Party Security Services
Roles and Responsibilities of Third Party Security Services

Download

Cloud Security Services Management
Collaboration and coordination among all stakeholders are critical to secure the cloud platform. The current gap is that there is no defined guideline dividing the security roles and responsibilities between the Cloud Service Providers (CSPs) and cloud customers; or explaining how to secure cloud services in different cloud deployment models. This is especially the case for those who have little cloud security knowledge. 

No standard understanding of how to implement the shared responsibility model.
While the shared security responsibility model is well recognized, the reality is that, given the same concept of shared responsibility, there are different interpretations and different implementations among different CSPs. There are many cloud security standards and/or specifications developed for CSPs in fulfilling their security responsibilities, but for the cloud customer it is still difficult to design, deploy, and operate a secure cloud service. 

CSA created guidelines for using cloud services securely that are based on the shared responsibility model.
These guidelines provide easy-to-understand guidance for cloud customers and cloud service providers. For cloud customers it explains how to design, deploy, and operate a secure cloud service with respect to different cloud service models. It explains the shared responsibility model and covers common security responsibilities of CSPs versus cloud customers. It then goes on to explain how to fulfill cloud controls (based on the Cloud Controls Matrix) by using third-party security products and services.


Cloud Security Services ManagementEnterprise ArchitectureCloud Component SpecificationsHybrid Cloud Security

Discuss this topic in Circle

Have an interesting article or video on this topic that you want to share? Anyone can join the discussion community for this topic to share ideas or ask questions.

View discussion community

Participate in Cloud Security Services Management Research

This working group hopes to develop a platform for CSPs to publish their security requirements; for security vendors to share their security products and services, and to provide a platform for interoperability testing.

View the working group

CSA Research crowd-sources the knowledge and expertise of security experts and helps address the challenges and needs they’ve experienced, or seen others experience, within the cybersecurity field. Each publication is vendor-neutral and follows the peer review process outlined in the CSA Research Lifecycle. We recommend getting started by reading the following documents.

Guideline on Effectively Managing Security Service in the Cloud

Guideline on Effectively Managing Security Service in the Cloud

This initiative aims to develop a research whitepaper, focusing on building up a cloud security services management platform. This whitepaper will serve as a guideline for cloud service providers to secure its cloud platform and provide cloud security services to cloud users, for cloud users to select security qualified cloud service providers, for security vendors to develop their cloud-based security products and services.

Webinars

Combating Ransomware 2.0: Beyond Backups
Combating Ransomware 2.0: Beyond Backups

June 28 | online

Learn more

Hunting Suspicious Events with AWS CloudTrail: Fundamentals and Best Practices
Hunting Suspicious Events with AWS CloudTrail: Fundamentals ...

June 22 | online

Learn more

Hunting Suspicious Events with AWS CloudTrail: Fundamentals and Best Practices
Hunting Suspicious Events with AWS CloudTrail: Fundamentals ...

June 22 | online

Learn more

The real way to secure from code to runtime (without breaking development)
The real way to secure from code to runtime (without breakin...

June 16 | online

Learn more

Blog Posts

Know Your Cloud Security Acronyms: CWPP, CSPM, CIEM and CNAPP
The Pros and Cons of Using SaaS Security Services
Cloud Workload Security: Part 4 - Explaining the Security Features of GCP