This working group aims to develop Zero Trust standards to achieve consistency for cloud, hybrid and mobile endpoint environments. The topic of group discourse include Zero Trust benefits, architecture, automation and maturity models, publication reviews, and relevant industry forums and events.
During our meetings, we typically discuss changes in the industry and collaborate on projects the group is currently working on. This group will have the following nine workstreams:
- Zero Trust as a Philosophy & Guiding Principles
- Zero Trust Organizational Strategy & Governance
- Pillar: Identity
- Pillar: Device
- Pillar: Network/Environment
- Pillar: Applications & Workload
- Pillar: Data
- Automation, Orchestration, Visibility & Analytics
- Zero Trust Architecture, Implementation, and Maturity Model
Drafts & Important Docs
Working Group Leadership
Chief Technology Officer, CSA
Daniele Catteddu is an information security and risk management practitioner, technologies expert and privacy evangelist with over 15 of experience. He worked in several senior roles both in the private and public sector. He is member of various national and international security expert groups and committees on cyber-security and privacy, keynote speaker at several conferences and author of numerous studies and papers on risk management, ...
Cloud Security Specialist & Senior Research Analyst
Worked for the Federal Reserve for many years and volunteered with the CSA with a focus on CCM/CAIQ V4, specifically the STA domain, and developing a comprehensive framework and guidance for defining and managing the cloud shared security responsibility model (SSRM).
I recently retired from the Federal Reserve and am now consulting with the CSA as a Senior Research Analyst with a focus on Zero Trust and Financial Services.
Global Vice President of Research, CSA
With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...
Who can join?
Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.
What is the time commitment?
The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.
Attend our next meeting. You can just listen in to decide if this group is a good for you or you can choose to actively participate. During these calls we discuss current projects, and well as share ideas for new projects. This is a good way to meet the other members of the group. You can view all research meetings here.
ZT Maturity Model - AM Working Session (Updated)
CSA Zero Trust Circle Community
Join Zoom Meeting
Meeting ID: 859 6712 2309
One tap mobile
+12532158782,,85967122309# US (Tacoma)
+17207072699,,85967122309# US (Denver)
Dial by your location
+1 253 215 8782 US (Tacoma)
+1 720 707 2699 US (Denver)
+1 346 248 7799 US (Houston)
+1 646 558 8656 US (New York)
+1 301 715 8592 US (Washington DC)
+1 312 626 6799 US (Chicago)
Meeting ID: 859 6712 2309
Find your local number: https://cloudsecurityalliance.zoom.us/u/kdHb072e0m
Join by Skype for Business
Open Peer Reviews
Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.