Cloud 101CircleEventsBlog
Save the date for CSA's 2024 Cyber Monday Sale: Get 50% off the exam token bundle!

Working Group

Cloud Security Services Management

This working group hopes to develop a platform for CSPs to publish their security requirements; for security vendors to share their security products and services, and to provide a platform for interoperability testing.
Roles and Responsibilities of Third Party Security Services
Roles and Responsibilities of Third Party Security Services

Download

Cloud Security Services Management
Working Group Overview

This working group hopes to develop a platform for CSPs to publish their security requirements; for security vendors to share their security products and services, and to provide a platform for interoperability testing.


Drafts & Important Docs

Working Group Leadership

Dr. Kai Chen
Dr. Kai Chen

Dr. Kai Chen

Dr. Kai Chen is now serving as the Cybersecurity Ecosystem Specialist of Huawei Technologies Co.,Ltd., is responding for Huawei cybersecurity ecosystem development including strategy, policy and partner engagement, etc. He has over 15 years work experience in applied cryptography, information and network security technical research, standard development, policy and regulation fields; published over 20 research papers and delivered speeches ...

Read more

Dr. Liu Wenmao
Dr. Liu Wenmao

Dr. Liu Wenmao

Director of Innovation Center

Dr. Liu is the Director of Innovation Center, and also the leader of XingYun Lab (Cloud Security) of NSFOCUS Inc. He received his Ph.D. in Information Security from the Harbin Institute of Technology in 2013. After completion of his degree, Dr. Liu served as a researcher at NSFOCUS Inc. During the first two years in NSFOCUS, he was also working at Tsinghua University as a postdoc. He works closely with academia, is a member of the China Com...

Read more

Publications in ReviewOpen Until
Enterprise Authority To Operate (EATO) Auditing GuidelinesNov 18, 2024
Context-Based Access Control for Zero TrustNov 27, 2024
Fully Homomorphic Encryption: A Comprehensive Guide for Cybersecurity ProfessionalsDec 06, 2024
AI Organizational Responsibilities: AI Tools and ApplicationsDec 08, 2024
View all
Who can join?

Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.

What is the time commitment?

The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.

Open Peer Reviews

Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.

Learn how to participate in a peer review here.

Enterprise Authority To Operate (EATO) Auditing Guidelines

Open Until: 11/18/2024

The CSA Enterprise Authority to Operate (EATO) Working Group has identified gaps within the understanding and implementa...

Context-Based Access Control for Zero Trust

Open Until: 11/27/2024

The document "Context-Based Access Control for Zero Trust" provides guidance on implementing context-based access control (...

Fully Homomorphic Encryption: A Comprehensive Guide for Cybersecurity Professionals

Open Until: 12/06/2024

The document Fully Homomorphic Encryption: A Comprehensive Guide for Cybersecurity Professionals serves as an in-d...

AI Organizational Responsibilities: AI Tools and Applications

Open Until: 12/08/2024

The integration of LLMs and Generative AI introduces vital security considerations across development and deployment proces...