Cloud 101CircleEventsBlog
The CCSK v5 and Security Guidance v5 are now available!

Working Group

Cloud Security Services Management

This working group hopes to develop a platform for CSPs to publish their security requirements; for security vendors to share their security products and services, and to provide a platform for interoperability testing.
Roles and Responsibilities of Third Party Security Services
Roles and Responsibilities of Third Party Security Services

Download

Cloud Security Services Management
Working Group Overview

This working group hopes to develop a platform for CSPs to publish their security requirements; for security vendors to share their security products and services, and to provide a platform for interoperability testing.


Drafts & Important Docs

Working Group Leadership

Dr. Kai Chen
Dr. Kai Chen

Dr. Kai Chen

Dr. Kai Chen is now serving as the Cybersecurity Ecosystem Specialist of Huawei Technologies Co.,Ltd., is responding for Huawei cybersecurity ecosystem development including strategy, policy and partner engagement, etc. He has over 15 years work experience in applied cryptography, information and network security technical research, standard development, policy and regulation fields; published over 20 research papers and delivered speeches ...

Read more

Dr. Liu Wenmao
Dr. Liu Wenmao

Dr. Liu Wenmao

Director of Innovation Center

Dr. Liu is the Director of Innovation Center, and also the leader of XingYun Lab (Cloud Security) of NSFOCUS Inc. He received his Ph.D. in Information Security from the Harbin Institute of Technology in 2013. After completion of his degree, Dr. Liu served as a researcher at NSFOCUS Inc. During the first two years in NSFOCUS, he was also working at Tsinghua University as a postdoc. He works closely with academia, is a member of the China Com...

Read more

Publications in ReviewOpen Until
Guidelines for Auditing AIJul 31, 2024
Data Privacy Engineering Working Group Charter 2024Aug 08, 2024
Using Asymmetric Cryptography to Help Achieve Zero Trust ObjectivesAug 12, 2024
Don’t Panic! Getting Real About AI GovernanceAug 25, 2024
View all
Who can join?

Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.

What is the time commitment?

The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.

Open Peer Reviews

Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.

Learn how to participate in a peer review here.

Guidelines for Auditing AI

Open Until: 07/31/2024

Guidelines for Auditing AI presents a comprehensive framework for auditing AI systems, emphasizing the need for tr...

Data Privacy Engineering Working Group Charter 2024

Open Until: 08/08/2024

The Data Privacy Engineering Working Group (DPE WG) is chartered with the mission to integrate privacy-centric methodologie...

Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives

Open Until: 08/12/2024

This paper investigates the convergence of asymmetric cryptography and Zero Trust architecture, exploring the utilization o...

Don’t Panic! Getting Real About AI Governance

Open Until: 08/25/2024

Amidst the rampant hype about AI (especially Generative AI), there is a real story about how AI systems can be used to buil...