Surveys

Procurement of Cloud services

The goal of this survey is to collect information useful to identify challenges that exist in cloud procurement and produce a report on cloud procurement barriers.

The survey is available at: https://www.surveymonkey.com/r/PICSE

All answers are anonymous and will be used for collection of input and statistical conclusions only, that will serve the goal of this survey.

Please help us identify those barriers and get access to the ‘Procurement Barriers Report’ that will help you address obstacles of procuring cloud services.”

Note: answering the questions may take from 10 to 20 minutes according to each respondent. Please have the patience to go through all the answers.

Take the Survey


2 short surveys on Procurement of IaaS and PaaS/SaaS services

After the initial analysis of challenges and barriers that exist in cloud procurement (survey on Procurement of Cloud services: https://www.surveymonkey.com/r/PICSE) we would like to understand specific barriers on procurement of IaaS and PaaS/SaaS services.

Scope of the IaaS survey is to identify procurement barriers related to commercial public cloud services (pay per use). The survey is available at: https://www.surveymonkey.com/r/PICSEonIaaS.

Scope of the PaaS/SaaS survey is to identify procurement barriers related to commercial public cloud services such as Platform as a Service (PaaS) and Software as a Service (SaaS). The survey is available at: https://www.surveymonkey.com/r/PICSEonPaaS-SaaS

All answers are anonymous and will be used for collection of input and statistical conclusions only, that will serve the goal of this survey.

Please help us identify those barriers and help you address obstacles in procuring cloud services.

Note: Both new surveys and the original survey on Procurement of Cloud services will remain open until the 13th of February 2015

Take the Survey on IaaS

Take the Survey on PaaS/SaaS


Financial Services

Participants in this survey will be entered to win one of 10 CCSK tokens or a $100 Amazon Gift Card by CipherCloud.

Due to its particular nature, financial institutions have adopted Information and Communication Technologies (ICT) throughout its entire business value chain. Advanced and convenient technologies, along with the trust of customers on established institutions have induced a great adoption of very popular services such as online banking by end users. Nowadays, this virtual relationship becomes very familiar for all of us and we currently cannot imagine without it. The success of the introduction of cloud-based solutions in the financial sector is subject to the usual concern for security issues, and the uneven adoption of cloud-based services in the business environment.

The CSA Financial Services Working Group will look to evaluate cloud adoption and analyze concerns in the financial and banking market with this survey. In collaboration with CipherCloud, the results of this survey aim to accelerate the adoption of secure cloud services best practices in the financial industry and identify the industry’s main concerns regarding the delivery and management of cloud services in the financial sector. )

Take the Survey


Internet of Things (IoT) Security

Participants in this survey will be entered to win one of 10 CCSK tokens provided by Leidos.

As a component of our research into the secure IoT, CSA has established a survey to understand the anticipated use cases for IoT across industries as well as the perceived security challenges associated with IoT deployment. Please take a moment to review and respond to the questions below. Your responses will help the CSA to focus on research that is most useful to our stakeholder organizations.

For more information on our IoT research with the CSA Mobile Working group, visit:
https://cloudsecurityalliance.org/research/mobile/

Take the Survey


Security as a Service Categories

Participants in this survey will be entered to win one of 2 CCSK tokens.

The Security as a Service (SecaaS) working group within the Cloud Security Alliance (CSA) has been created to provide leadership and direction on how the cloud can be used to deliver security services to cloud, on premises and hybrid environments.

Security as a Service (ISO/IEC DIS 17788) – The capabilities provided to the cloud service customer are the integration of a suite of security services with the existing operating environment by the cloud service provider. This may include authentication, anti-virus, anti-malware/spyware, intrusion detection, and security event management, among others.

In our framework for defining a Security as a Service category, a category must consistently abide by the following elements: (These elements will be further developed for each selected category in our upcoming research)

Take the Survey


CloudWATCH Cloud Certifications guidelines

Share your experience and help us recommend security and privacy certifications to cloud customers, service providers & policy – https://www.surveymonkey.com/r/CloudWatch

This survey has been designed to collect information to be used in the drafting of the V2 of the CloudWatch report: “Cloud certification: guidelines and recommendations”.
The survey has a threefold objective will collect data for analyzing changes in the cloud certification landscape 12 month since the issuing of the version 1 of the CloudWATCH Cloud Certifications guidelines and recommendations report. Results will help us validate the initial recommendations and collect input to define a final set of recommendations.

The survey will remain open up until the 15th of December.

CloudWATCH aims to provide guidance to cloud service customers, cloud service providers and policy makers in their evaluation of suitable security and privacy certification schemes for cloud services. A core activity within CloudWATCH is looking into the topics of standards and certification in order to understand if and how certification can increase the level of trust in the cloud computing business model. Specifically, CloudWATCH is leading activities on certification and testing standard compliance with the aim of providing sound recommendations based on real-life cases and clear explanations on protection from risks.

Thanks for your participation on behalf of the CloudWatch consortium.

Take the Survey