ChaptersCircleEventsBlog
Join this free webinar on April 24th to explore how to build resilience, stay compliant, protect your brand, and keep critical services online.

Working Group

Consensus Assessments

This group is focused on providing industry-accepted ways to provide security control transparency by documenting which security controls exist. This group has been merged with the CCM working group.
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4

Download

Consensus Assessments
This group has been merged with the CCM Working Group.

Lack of security control transparency is a leading inhibitor to the adoption of cloud services. The CSA Consensus Assessments (CAIQ) working group was launched to perform research, create tools and create industry partnerships to enable cloud computing assessments. 

The CAIQ is used by CSPs to submit to the CSA STAR Registry.

The Consensus Assessments Initiative Questionnaire (CAIQ) v3.1. offers an industry-accepted way to document which security controls exist in IaaS, PaaS, and SaaS services, providing security control transparency. It provides a set of Yes/No questions a cloud consumer and cloud auditor may wish to ask of a cloud provider to ascertain their compliance to the Cloud Controls Matrix (CCM). It helps cloud customers to gauge the security posture of prospective cloud service providers and determine if their cloud services are suitably secure. The CAIQ is used by CSPs to submit to the CSA STAR Registry.


Working Group Leadership

Laura Posey
Laura Posey

Laura Posey

Sean Cordero
Sean Cordero

Sean Cordero

Sean Cordero brings more than 15 years of information security and IT experience to his current role as director, information security at Optiv. Cordero provides executive level advisement for the company’s Fortune 50 clients. Cordero’s prior leadership roles included: President of Cloud Watchmen, CSO for EdFund, CSO for ECMC West, Director of Security and Compliance for Charlotte Russe.

Cordero is a thought-leader and serves as chair...

Read more

Evelyn de Souza
Evelyn de Souza

Evelyn de Souza

Senior Security Strategist at Cisco

Evelyn is responsible for championing holistic security solutions that address emerging industry trends such as cloud, data center SDN and mobile. She is a strong proponent of building automated, repeatable processes that enable organizations to sustain compliance while optimizing security posture and reducing costs. To this end, Evelyn co-chairs the Cloud Security Alliance Cloud Controls Matrix (CCM) which harmonizes regulations and indust...

Read more

Publications in ReviewOpen Until
Agentic AI Red Teaming GuideApr 27, 2025
AI Consensus Assessments Initiative Questionnaire (AI-CAIQ)Apr 28, 2025
Secure Agentic System Design - A Trait-Based ApproachMay 15, 2025
Managing Privileged Access in a Cloud-First WorldMay 23, 2025
View all
Who can join?

Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.

What is the time commitment?

The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.

Open Peer Reviews

Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.

Learn how to participate in a peer review here.

Agentic AI Red Teaming Guide

Open Until: 04/27/2025

Red teaming for Agentic AI requires a specialized approach due to several critical factors. Agentic AI systems demand more ...

AI Consensus Assessments Initiative Questionnaire (AI-CAIQ)

Open Until: 04/28/2025

The AI Consensus Assessment Initiative Questionnaire (AI-CAIQ) is an extension of the Cloud Security Allia...

Secure Agentic System Design - A Trait-Based Approach

Open Until: 05/15/2025

This paper addresses the security challenges unique to agentic AI systems. As AI transitions from passive tools to autonomo...

Managing Privileged Access in a Cloud-First World

Open Until: 05/23/2025

Managing privileged access has become increasingly critical due to the complexity and ubiquity of distributed IT environmen...