Circle
Events
Blog

Research Topic

Continuous Auditing

Latest ResearchWorking Group
The Continuous Audit Metrics Catalog
The Continuous Audit Metrics Catalog

Download

Continuous Auditing
Are traditional infosec assurance tools outdated? Many cloud customers think so. They see that technology changes quickly, and products are frequently evolving with continuous integration and deployment. Therefore, a certification obtained once a year after a third-party audit is not a sufficient source of assurance anymore.
 
It’s time to move from “point-in-time” assurance to continuous assurance, whereby the effectiveness of an organization’s security controls is evaluated on a monthly, weekly, or hourly basis. This change requires moving away from manual audits and spreadsheets and instead focusing on building automated tools that continuously assess the effectiveness of an information system. In other words, it’s time to move to the world of security metrics.
 
While the idea of security metrics is not new, there is no standard reference in the industry that supports security metrics in a way that is comparable to what the CSA CCM or ISO/IEC 27002 does for security controls. To address this gap, CSA launched the Continuous Audit Metrics Working Group in early 2020 to build the first catalog of security metrics for the cloud.
 
We have released the first version of this catalog as a request for comment. It contains an initial set of 33 security metrics, each mapped to the CSA CCMv4. We invite the community to provide feedback by directly providing comments in the document or sending them to [email protected] Please share this work as widely as possible.


Continuous Audit MetricsConsensus AssessmentsCloud Controls MatrixOpen Certification Framework

Discuss this topic in Circle

Have an interesting article or video on this topic that you want to share? Anyone can join the discussion community for this topic to share ideas or ask questions.

View discussion community

Participate in Continuous Auditing Research

The Continuous Audit Metrics working group aims to define a catalogue of security attributes and their corresponding metrics, derived from the CSA Cloud Controls Matrix (CCM), which can be used as a reference for auditors, cloud service providers, cloud customers and security solution vendors that wish to engage in continuous audit-based self-assessments or certifications.

View the working group

Continuous Auditing

CSA Research crowd-sources the knowledge and expertise of security experts and helps address the challenges and needs they’ve experienced, or seen others experience, within the cybersecurity field. Each publication is vendor-neutral and follows the peer review process outlined in the CSA Research Lifecycle. We recommend getting started by reading the following documents.

The Continuous Audit Metrics Catalog

The Continuous Audit Metrics Catalog

Are traditional infosec assurance tools outdated? Many cloud customers think so. They see that technology changes quickly, and products are frequently evolving with continuous integration and deployment. Therefore, a certification obtained once a year after a third-party audit is not asufficient source of assurance anymore. It’s time to move from “point-in-time” assurance to continuous assurance. This change requires moving away from manual audits and instead building automated tools that continuously assess the effectiveness of an information system. In other words, it’s time to move to the world of security metrics.

Webinars

The role of zero trust in improving corporate governance and compliance
The role of zero trust in improving corporate governance and...

September 14 | online

Learn more

How to Prioritize Fixing Your Cloud Security
How to Prioritize Fixing Your Cloud Security

June 14 | online

Learn more

Why Vendor Security Assessments Fall Short for 3rd-Party SaaS App Security
Why Vendor Security Assessments Fall Short for 3rd-Party Saa...

May 17 | online

Learn more

5 Critical Capabilities for Compliance in Public Cloud
5 Critical Capabilities for Compliance in Public Cloud

May 12 | Online

Learn more

Blog Posts

Sealing Security Supply Chain Gaps