Cloud 101CircleEventsBlog
CSA's Continuous Audit Metrics Working Group is expanding! Help shape the future of cloud assurance.

Research Topic

Security Guidance

Security Guidance for Critical Areas of Focus in Cloud Computing v4.0
Security Guidance for Critical Areas of Focus in Cloud Computing v4.0

Download

Security Guidance
Cloud Security Alliance’s Security Guidance for Critical Areas of Focus in Cloud Computing establishes a stable, secure baseline for cloud operations. Back when CSA released the first version of the Security Guidance in 2009, it was the first comprehensive set of best practices for securing cloud computing. Since then this working group has periodically updated the Security Guidance, building on previous iterations and incorporating the latest advances in cloud, security, and supporting technologies. 

New to the cloud? Want to understand how cloud security is different from on-premise security?
If you’re interested in a brief explanation and introduction to cloud security read our blog. Otherwise you can find the full list of recommendations and best practices can in the latest version of the Cloud Security Guidance for Cloud Computing.

Interested in certificates and training?
Cloud Security Alliance offers the Certificate of Cloud Security Knowledge (CCSK) which tests individuals on the domains covered in the CSA Security Guidance. There is both a certificate and a training available through CSA. You can learn more about the CCSK here


Security GuidanceCCAKCCSKCloud Controls Matrix

Discuss this topic in Circle

View discussion community
Press MentionSourceDate
7 Steps to Stronger SaaS SecurityDark ReadingJune 24, 2022
Cloud Security Resources and GuidanceCiscoJune 29, 2022
Cloud Security for Healthcare Sector: All You Need to KnowData Science CentralAugust 16, 2022
How to Build Your Cloud Migration Security StrategyKrollSeptember 16, 2022
Risk Impacts of SaaS Cloud ComputingCPA JournalOctober 05, 2022
View all

Best Practices for Cloud Security

CSA Research crowd-sources the knowledge and expertise of security experts and helps address the challenges and needs they’ve experienced, or seen others experience, within the cybersecurity field. Each publication is vendor-neutral and follows the peer review process outlined in the CSA Research Lifecycle. We recommend getting started by reading the following documents.

Security Guidance for Critical Areas of Focus in Cloud Computing v4.0

Security Guidance for Critical Areas of Focus in Cloud Computing v4.0

The fourth version of the Security Guidance for Critical Areas of Focus in Cloud Computing is built on previous iterations of the security guidance, dedicated research, and public participation from the Cloud Security Alliance members, working groups, and the industry experts within our community. This version incorporates advances in cloud, security, and supporting technologies; reflects on real-world cloud security practices; integrates the latest Cloud Security Alliance research projects; and offers guidance for related technologies.

Guía de Seguridad de Áreas Críticas para la Computación en la Nube

Guía de Seguridad de Áreas Críticas para la Computación en la Nube

Con este documento, nuestro objetivo es proporcionar tanto orientación como inspiración para respaldar los objetivos comerciales, mientras se gestionan y mitigan los riesgos asociados con la adopción de la tecnología de computación en la nube.

Security Guidance v4.0 - Chinese Translation

Security Guidance v4.0 - Chinese Translation

欢迎来到云安全联盟关于云计算关键领域安全指南的第四个版本。云计算的兴起是一项不 断发展的技术,它带来了许多机遇和挑战。通过这个文档,我们的目标是提供指导和灵感来支 持业务目标,同时管理和减轻采用云计算技术相关的风险。

Webinars

CCAK Webinar Series: Module 1 - Cloud Governance
CCAK Webinar Series: Module 1 - Cloud Governance

August 4 | Virtual

Learn more

CCAK Webinar Series: Module 2
CCAK Webinar Series: Module 2

August 11 | TBD

Learn more

CCAK Webinar Series: Modules 4 & 9
CCAK Webinar Series: Modules 4 & 9

August 18 | Online

Learn more

CCAK Webinar Series: Modules 3 & 7
CCAK Webinar Series: Modules 3 & 7

August 18 | Online

Learn more

Blog Posts

New Year, New Security Awareness Training—How to Implement a Role-Based Training Program
What is the Shared Responsibility Model in the Cloud?
The Difference Between Securing Custom-Developed vs. Commercial Off-the-Shelf Software