Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

Working Group

Cloud Key Management

The Cloud Key Management working group aims to facilitate the standards for seamless integration between CSPs and key broker services.
View Current Projects
Recommendations for Adopting a Cloud-Native Key Management Service
Recommendations for Adopting a Cloud-Native Key Management Service

Download

Cloud Key Management
Working Group Overview

The working group will author guidelines and best practices, and promote standards that enhance the lives of technology professionals tasked with adopting and optimizing key management systems for use with cloud services.


What do we discuss during our meetings? 

During these meetings we typically discuss changes in the industry that relate to cloud key management, and collaborate on projects the group is working on.


Drafts & Important Docs

Working Group Leadership

Parthasarathi Chakraborty
Parthasarathi Chakraborty

Parthasarathi Chakraborty

Associate VP, Cloud Security, Cyber Innovation and R&D

Partha has over 20 years of cyber security leadership experience in the financial services and healthcare industry. An active speaker and panelist in major cyber security conferences around the world, and frequently called in for views and interviews in electronic media like The Economist, UK. Very much passionate about learning new technologies and writing on recent groundbreaking cyber trends. He is also the founder of Cloud Security Pra...

Read more

Sam Pfanstiel Ph.D.
Sam Pfanstiel Ph.D.

Sam Pfanstiel Ph.D.

Principal, Technical Compliance, PCI

As Principal Analyst at Toast, Sam is responsible for heading the Payment Card Industry (PCI) compliance programs for this cloud-based fintech company. Over the past 27 years, Sam has held key roles in security, technology, and management, and developed expertise in multiple disciplines, including payments, PCI compliance, fraud, cloud service delivery, application development, mobile technology, infrastructure, and cryptography. This dive...

Read more

Publications in ReviewOpen Until
Context-Based Access Control for Zero TrustNov 27, 2024
Fully Homomorphic Encryption: A Comprehensive Guide for Cybersecurity ProfessionalsDec 06, 2024
AI Organizational Responsibilities: AI Tools and ApplicationsDec 08, 2024
Zero Trust Guidance for Small and Medium Size Businesses (SMBs)Dec 15, 2024
View all
Who can join?

Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.

What is the time commitment?

The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.

Virtual Meetings

Attend our next meeting. You can just listen in to decide if this group is a good for you or you can choose to actively participate. During these calls we discuss current projects, and well as share ideas for new projects. This is a good way to meet the other members of the group. You can view all research meetings here.

Nov

27

Wed, November 27, 7:00pm - 8:00pm
Cloud key Management Working Group Call
See details
Agenda:

  • TBD

To connect on the  call:


click: https://zoom.us/j/93617880747
Meeting ID: 936 1788 0747
Passcode: 536522




One tap mobile
+13462487799,,93617880747# US (Houston)
+16465588656,,93617880747# US (New York)

Dial by your location
        +1 346 248 7799 US (Houston)
        +1 646 558 8656 US (New York)
        +1 669 900 9128 US (San Jose)
        +1 253 215 8782 US (Tacoma)
        +1 301 715 8592 US (Germantown)
        +1 312 626 6799 US (Chicago)
Meeting ID: 936 1788 0747

Find your local number: https://zoom.us/u/acCuTiO902

Dec

11

Wed, December 11, 7:00pm - 8:00pm
Cloud key Management Working Group Call
See details
Agenda:

  • TBD

To connect on the  call:


click: https://zoom.us/j/93617880747
Meeting ID: 936 1788 0747
Passcode: 536522




One tap mobile
+13462487799,,93617880747# US (Houston)
+16465588656,,93617880747# US (New York)

Dial by your location
        +1 346 248 7799 US (Houston)
        +1 646 558 8656 US (New York)
        +1 669 900 9128 US (San Jose)
        +1 253 215 8782 US (Tacoma)
        +1 301 715 8592 US (Germantown)
        +1 312 626 6799 US (Chicago)
Meeting ID: 936 1788 0747

Find your local number: https://zoom.us/u/acCuTiO902

Dec

25

Wed, December 25, 7:00pm - 8:00pm
Cloud key Management Working Group Call
See details
Agenda:

  • TBD

To connect on the  call:


click: https://zoom.us/j/93617880747
Meeting ID: 936 1788 0747
Passcode: 536522




One tap mobile
+13462487799,,93617880747# US (Houston)
+16465588656,,93617880747# US (New York)

Dial by your location
        +1 346 248 7799 US (Houston)
        +1 646 558 8656 US (New York)
        +1 669 900 9128 US (San Jose)
        +1 253 215 8782 US (Tacoma)
        +1 301 715 8592 US (Germantown)
        +1 312 626 6799 US (Chicago)
Meeting ID: 936 1788 0747

Find your local number: https://zoom.us/u/acCuTiO902

Jan

8

Wed, January 8, 7:00pm - 8:00pm
Cloud key Management Working Group Call
See details
Agenda:

  • TBD

To connect on the  call:


click: https://zoom.us/j/93617880747
Meeting ID: 936 1788 0747
Passcode: 536522




One tap mobile
+13462487799,,93617880747# US (Houston)
+16465588656,,93617880747# US (New York)

Dial by your location
        +1 346 248 7799 US (Houston)
        +1 646 558 8656 US (New York)
        +1 669 900 9128 US (San Jose)
        +1 253 215 8782 US (Tacoma)
        +1 301 715 8592 US (Germantown)
        +1 312 626 6799 US (Chicago)
Meeting ID: 936 1788 0747

Find your local number: https://zoom.us/u/acCuTiO902

Open Peer Reviews

Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.

Learn how to participate in a peer review here.

Context-Based Access Control for Zero Trust

Open Until: 11/27/2024

The document "Context-Based Access Control for Zero Trust" provides guidance on implementing context-based access control (...

Fully Homomorphic Encryption: A Comprehensive Guide for Cybersecurity Professionals

Open Until: 12/06/2024

The document Fully Homomorphic Encryption: A Comprehensive Guide for Cybersecurity Professionals serves as an in-d...

AI Organizational Responsibilities: AI Tools and Applications

Open Until: 12/08/2024

The integration of LLMs and Generative AI introduces vital security considerations across development and deployment proces...

Zero Trust Guidance for Small and Medium Size Businesses (SMBs)

Open Until: 12/15/2024

In an increasingly digital world, small and medium-sized businesses (SMBs) are facing heightened security challenges, makin...