This group is focused on providing industry-accepted ways to provide security control transparency by documenting which security controls exist. This group has been merged with the CCM working group.
Lack of security control transparency is a leading inhibitor to the adoption of cloud services. The CSA Consensus Assessments (CAIQ) working group was launched to perform research, create tools and create industry partnerships to enable cloud computing assessments.
The Consensus Assessments Initiative Questionnaire (CAIQ) v3.1. offers an industry-accepted way to document which security controls exist in IaaS, PaaS, and SaaS services, providing security control transparency. It provides a set of Yes/No questions a cloud consumer and cloud auditor may wish to ask of a cloud provider to ascertain their compliance to the Cloud Controls Matrix (CCM). It helps cloud customers to gauge the security posture of prospective cloud service providers and determine if their cloud services are suitably secure. The CAIQ is used by CSPs to submit to the CSA STAR Registry.
Working Group Leadership
This person does not have a biography listed with CSA.
Sean Cordero brings more than 15 years of information security and IT experience to his current role as director, information security at Optiv. Cordero provides executive level advisement for the company’s Fortune 50 clients. Cordero’s prior leadership roles included: President of Cloud Watchmen, CSO for EdFund, CSO for ECMC West, Director of Security and Compliance for Charlotte Russe.
Cordero is a thought-leader and serves as chair...
Evelyn de Souza
Senior Security Strategist at Cisco
Evelyn is responsible for championing holistic security solutions that address emerging industry trends such as cloud, data center SDN and mobile. She is a strong proponent of building automated, repeatable processes that enable organizations to sustain compliance while optimizing security posture and reducing costs. To this end, Evelyn co-chairs the Cloud Security Alliance Cloud Controls Matrix (CCM) which harmonizes regulations and indust...
|Publications in Review||Open Until|
|HSM-as-a-Service Use Cases, Considerations, and Best Practices||Dec 09, 2023|
|Glossary of Data Security Terms||Dec 28, 2023|
Who can join?
Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.
What is the time commitment?
The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.
Open Peer Reviews
Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.
HSM-as-a-Service Use Cases, Considerations, and Best Practices
Open Until: 12/09/2023
The scope of this document is to provide a general overview of Hardware Security Module (HSM) as a Service as a cloud servi...
Glossary of Data Security Terms
Open Until: 12/28/2023
The Glossary of Data Security Terms identifies terms relevant to data security to understand and comprehend the topic, whic...