CSAIChaptersEventsBlog
On April 2, CSA will offer 50% off online training and certificate exams. Get ready for CSA Day →

Working Group

SaaS Security Capability Framework (SSCF)

The SaaS Security Capability Framework (SSCF) addresses the critical need for an industry standard that defines the minimum technical security capabilities SaaS applications should provide, particularly those that fall within the customer's scope under the Shared Security Responsibility Model (SSRM).
SaaS Security Capability Framework (SSCF)
Currently, the lack of such a standard has led to major inconsistencies in the security features offered by SaaS vendors, resulting in significant operational challenges, increased costs, and heightened security risks. The SSCF focuses on customer-facing controls such as logging, access monitoring, and configuration of security settings that can be directly managed or utilized by customers to meet their security obligations. As many SaaS platforms do not offer sufficient configurability to align with an organization’s risk appetite or requirements, the SSCF aims to bridge this gap by outlining a clear set of technical security capabilities that should be embedded in SaaS offerings.

Working Group Leadership

Jonathan Villa
Jonathan Villa

Jonathan Villa

Romke de Haan
Romke de Haan

Romke de Haan

Guidepoint Security

Boris Sieklik
Boris Sieklik

Boris Sieklik

MongoDB

Publications in ReviewOpen Until
Post-Quantum Cryptography Key ManagementMar 27, 2026
Leveraging the Health Data from IoT WearablesMar 31, 2026
Comparing FHE and Other PETsApr 17, 2026
MLOps Threat ModelApr 17, 2026
View all
Who can join?

Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.

What is the time commitment?

The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.

Open Peer Reviews

Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.

Learn how to participate in a peer review here.

Post-Quantum Cryptography Key Management

Open Until: 03/27/2026

This paper presents an in-depth analysis of Post-Quantum Cryptography (PQC) and its impact on key management practices in c...

Leveraging the Health Data from IoT Wearables

Open Until: 03/31/2026

Healthcare is undergoing a transformation, driven by big data and artificial intelligence (AI). This requires the collectio...

Comparing FHE and Other PETs

Open Until: 04/17/2026

Privacy-enhancing technologies offer a broad spectrum of solutions for challenges related to data confidentiality. However,...

MLOps Threat Model

Open Until: 04/17/2026

This paper sets the foundation for how we can apply the threat modelling practice of DevSecOps to MLOps.Please revi...