ChaptersEventsBlog
Register now for NHIcon 2026, a half-day online event, to learn what the future of AI security requires.

Working Group

Data Security

Data security is the process of protecting digital information from unauthorized access, corruption, or theft throughout its entire lifecycle.
Data Security Working Group Charter 2023
Data Security Working Group Charter 2023

Download

Data security is the process of protecting digital information from unauthorized access, corruption, or theft throughout its entire lifecycle. It’s a concept that encompasses every aspect of information security from the physical security of hardware and storage devices, administrative and access controls, logical security of software applications, and organizational policies and procedures. When properly implemented, data security strategies will protect an organization’s information assets against cyberattacks, as well as guard against insider threats and human error, which remains among the leading causes of data breaches.

Current projects:
Who can join?

Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.

What is the time commitment?

The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.

Open Peer Reviews

Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.

Learn how to participate in a peer review here.

SSCF Implementation Guidelines

Open Until: 12/25/2025

The Cloud Security Alliance (CSA), in collaboration with the SaaS Security Capability Framework (SSCF) Working Group, is pl...

SSCF-CAIQ

Open Until: 12/25/2025

The Cloud Security Alliance (CSA), in collaboration with the SaaS Security Capability Framework (SSCF) Working Group, is pl...

DLP and DSPM inHealthcare: AI-EnhancedSecurity and Privacy

Open Until: 12/26/2025

Healthcare organizations face growing risks of data exposure as they adopt cloud platforms, AI tools, and connected technol...

AICM to AIUC-1 Mapping

Open Until: 12/28/2025

This document is an addendum to the 'AICM' that contains controls mapping between the CSA's AI Controls Matrix v1.0 and 'AI...