Working Group

Cloud Security Services Management

Cloud Security Services Management

Introduction

Collaboration and coordination among all stakeholders are critical to secure the cloud platform. The current gap is that there is no defined guideline dividing the security roles and responsibilities between the Cloud Service Providers (CSPs) and Cloud customers; on how to secure Cloud services in different Cloud deployment models. This is especially the case for those who have little cloud security knowledge. This WG aims to develop guidelines for CSPs to secure its Cloud platform and provide Cloud security services to Cloud users; for Cloud users to select security qualified CSPs; for security vendors to develop their Cloud-based security products and services. Subsequently, this WG hopes to develop a platform for CSPs to publish their security requirements; for security vendors to share their security products and services, and to provide a platform for interoperability testing.

Artifacts

Mapping of 'The Guidelines' Security Recommendations to CCM
Mapping of 'The Guidelines' Security Recommendations to CCM

This document contains the additional controls that serves to bridge the gap between CCM V3.0.1 and the controls within 'Guideline on Effecti...

Gap Analysis Report on Mapping CSA’s Cloud Controls Matrix to ‘Guideline on Effectively Managing Security Service in the Cloud’
Gap Analysis Report on Mapping CSA’s Cloud Controls Matrix to ‘Guideline on Effectively Managing Security Service in the Cloud’

The report summarizes the mapping of CCM v3.0.1 to 'Guideline on Effectively Managing Security Services in the Cloud' and provides gap analys...

Guideline on Effectively Managing Security Service in the Cloud - Chinese Translation
Guideline on Effectively Managing Security Service in the Cloud - Chinese Translation
Guideline on Effectively Managing Security Service in the Cloud
Guideline on Effectively Managing Security Service in the Cloud

This initiative aims to develop a research whitepaper, focusing on building up a cloud security services management platform. This whitepaper...

Open Peer Reviews

Artifact reviews allow security professionals from around the world to collaborate on CSA research. Provide your feedback on the following documents in progress.

Next Meeting

No Meetings Currently Scheduled

See all Meetings

Leadership

Dr. Kai Chen Headshot

Dr. Kai Chen is now serving as the Cybersecurity Ecosystem Specialist of Huawei Technologies Co.,Ltd., is responding for Huawei cybersecurity ecosystem development including strategy, policy and pa...

 
Dr. Kai Chen