ChaptersEventsBlog

Working Group

Serverless

The Serverless working group seeks to develop best practices to help organizations that want to run their business with a serverless business model. With the complexity of this business model, it is imperative that industry best practices are established to provide companies with guidelines to achieve compliance and security.
How to Design a Secure Serverless Architecture
How to Design a Secure Serverless Architecture

Download

Working Group Overview
The goal of this group is to develop best practices to help organizations that want to run their business with a serverless business model. With the complexity of this business model, it is imperative that industry best practices are established to provide companies with guidelines to achieve compliance and security. 


What do we discuss during our meetings? 
During these meetings we typically discuss changes in the industry and collaborate on projects the group is currently working on. We welcome anyone who would like to join, even if you would like to just listen-in on your first call.


Drafts & Important Docs
  • We are creating a FaaS Serverless Control Framework (Set) based on NIST 800-53 R5 controls.

Working Group Leadership

Aradhna Chetal
Aradhna Chetal

Aradhna Chetal

Senior Director Executive- Cloud Security

Aradhna serves as a Senior Director Executive- Cloud Security at TIAA, a financial services company. She is responsible for the cloud security vision, strategy, standards, security patterns for a multi-cloud hybrid enterprise and engineer security solutions, to support the vision. Aradhna has worked in various Cybersecurity leadership roles at JP Morgan Chase, Boeing Company, Microsoft & T-Mobile.

Aradhna is an active member in the cy...

Read more

Vishwas Manral
Vishwas Manral

Vishwas Manral

Founder at Precize Inc & Fellow at Cloud Security Alliance

Vishwas is the Founder at Precize Inc, a stealth Cloud and AI security startup. Vishwas is also the co-chair of CSA’s Serverless Working Group and the Chair of Cloud Security Alliance in Silicon Valley. He was the head of Cloud Native security and Chief Technologist at McAfee Enterprise + FireEye. Vishwas joined McAfee Enterprise when his com...

Read more

Publications in ReviewOpen Until
AICM to AIUC-1 MappingDec 28, 2025
CCMv4.1 to DORA Reverse MappingJan 06, 2026
SSCFv1.0 to CCMv4.1 MappingJan 12, 2026
View all
Who can join?

Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.

What is the time commitment?

The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.

Virtual Meetings

Attend our next meeting. You can just listen in to decide if this group is a good for you or you can choose to actively participate. During these calls we discuss current projects, and well as share ideas for new projects. This is a good way to meet the other members of the group. You can view all research meetings here.

Open Peer Reviews

Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.

Learn how to participate in a peer review here.

AICM to AIUC-1 Mapping

Open Until: 12/28/2025

This document is an addendum to the 'AICM' that contains controls mapping between the CSA's AI Controls Matrix v1.0 and 'AI...

CCMv4.1 to DORA Reverse Mapping

Open Until: 01/06/2026

This document is an addendum to the CCMv4.1 and presents a comprehensive mapping between the Cloud Controls Matrix (CCM) v4...

SSCFv1.0 to CCMv4.1 Mapping

Open Until: 01/12/2026

This document presents a comprehensive mapping between the Cloud Controls Matrix (CCMv4.1) and SSCFv1.0, applying the Cloud...