SlideShare a Scribd company logo
2
Most read
3
Most read
8
Most read
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
CSA’s Leading Role in the Development of
Emerging Cloud Security Standards
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
About Us
• Global, not-for-profit, 501(c)6 organization
• Over 29,000 individual members, 120 corporate members, 60 chapters
• Building best practices and a trusted cloud ecosystem
• Agile philosophy, rapid development of applied research
• Balance compliance with risk management
• Reference models: build using existing standards
• Identity: a key foundation of a functioning cloud economy
• Champion interoperability
• Enable innovation
• Advocacy of prudent public policy
• Launching Innovation Initiative at RSA 2012
“To promote the use of best practices for providing security assurance within Cloud
Computing, and provide education on the uses of Cloud Computing to help
secure all other forms of computing.”
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
Tools CSA Provides Today
• Assessment
• User Certifications
• Best Practices
• Provider Assessments
• Procurement
• Standards Creations
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
SAJACC
USG
FedRAMP
• Chapter 1 – Security Requirements (SP 800-53 R3 ++)
• Chapter 2 – Continuous Monitoring
• Chapter 3 – Assessment & Authorization (SP 800-37 R1)
SCAP & XCCDF
Publications:
• SP 800-144 (Security & Privacy Guidelines)
• SP 800-145 (Definition)
• SP 800-146 DRAFT (Synopsis & Recommendations)
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
JTC 1/SC 27  Cloud Security & Privacy Joint WG
• WG 1 – 27017 (Controls)
• WG 4 – NWIP 27036-5 (Supplier Risk Requirements)
• WG 5 – NWIP 27xxxx (Data Protection Guidelines for Public Cloud)
JTC 1/SC 38  Cloud Computing Study Group (SGCC)  WG3
• cloud-o-0079 (Ecosystem)
• cloud-o-0080 (Reference Architecture)
• cloud-o-0081 (Infrastructure)
• cloud-o-0082 (Resource Management)
• cloud-o-0083 (Security)
• cloud-o-0084 (SDO Overview)
• cloud-o-0085 (Benefits)
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
Focus Group on Cloud Computing (FG Cloud)
• WG 1 (Benefits & Requirements)
• WG 2 (SDO Gap Analysis & Roadmap)
SG 13  Cloud
SG 17  Telecom Security
• X.ccsec (Security Guidelines)
• X.srfcts (Security Requirements & Framework)
• X.sfcse (Security Functional Requirements for SaaS)
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
Help Us Secure Cloud Computing
• www.cloudsecurityalliance.org
• info@cloudsecurityalliance.org
• LinkedIn: www.linkedin.com/groups?gid=1864210
• Twitter: @cloudsa
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance

More Related Content

PDF
PDF
Global Mandate to Secure Cloud Computing
PDF
CSA Introduction 2013 David Ross
PDF
Cybersecurity frameworks globally and saudi arabia
PPTX
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
PPTX
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
PPTX
Secure your cloud applications by building solid foundations with enterprise ...
PDF
How to Keep your Atlassian Cloud Secure
Global Mandate to Secure Cloud Computing
CSA Introduction 2013 David Ross
Cybersecurity frameworks globally and saudi arabia
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Secure your cloud applications by building solid foundations with enterprise ...
How to Keep your Atlassian Cloud Secure

What's hot (19)

PDF
CSA Security Guidance Cloud Computing v3.0
PDF
Cloud Security Governance
PDF
Webroot - self-defending IoT devices & gateways
PPT
Securing Servers in Public and Hybrid Clouds
PPTX
NIST Cybersecurity Framework (CSF) on the Public Cloud
PDF
Cloud Security Demystified
PDF
Implementing zero trust architecture in azure hybrid cloud
PDF
IT Security As A Service
PPT
Securing Sensitive Data in Your Hybrid Cloud
PDF
PDF
Workshop on CASB Part 2
PDF
Building a Security Architecture
PDF
Security As A Service
PPTX
4.5.cloud security
PPTX
Service Organizational Control (SOC 2) Compliance - Kloudlearn
PPTX
Cloud security for banks - the central bank of Israel regulations for cloud s...
PDF
Cloud Security Guide - Ref Architecture and Gov. Model
PDF
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
PDF
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
CSA Security Guidance Cloud Computing v3.0
Cloud Security Governance
Webroot - self-defending IoT devices & gateways
Securing Servers in Public and Hybrid Clouds
NIST Cybersecurity Framework (CSF) on the Public Cloud
Cloud Security Demystified
Implementing zero trust architecture in azure hybrid cloud
IT Security As A Service
Securing Sensitive Data in Your Hybrid Cloud
Workshop on CASB Part 2
Building a Security Architecture
Security As A Service
4.5.cloud security
Service Organizational Control (SOC 2) Compliance - Kloudlearn
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud Security Guide - Ref Architecture and Gov. Model
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Ad

Similar to CSA Standards Development Summary (20)

PDF
CSA Argentina - Jornada CXO Cloud
PPT
3245224.ppt
PPTX
Global Efforts to Secure Cloud Computing
PPTX
Shawn Harris - CCSP SAH v2
PPTX
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
PPTX
Csa summit argentina-reavis
PPTX
Scott Hogg - Gtri cloud security knowledge and certs
PPT
2011 Digital Summit - Not So Cloudy - Agcaoili
PDF
Nils Puhlmann Ncoic Slides
PPTX
Charting the Course Through Disruption with CSA Research
PDF
Hogan Kusnadi - Cloud Computing Secutity
PDF
Best Practices in Cloud Security Standards.pptx.pdf
PDF
Latest Developments in Cloud Security Standards and Privacy
PDF
CCSK, cloud security framework, Indonesia
PDF
Cloud Security Standards: What to Expect and What to Negotiate V2.0
PDF
Cloud Security vs. Traditional IT Security
PDF
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
PPTX
Cloud security Presentation
PDF
The Latest in Cloud Computing Standards
PDF
Cloud services and it security
CSA Argentina - Jornada CXO Cloud
3245224.ppt
Global Efforts to Secure Cloud Computing
Shawn Harris - CCSP SAH v2
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Csa summit argentina-reavis
Scott Hogg - Gtri cloud security knowledge and certs
2011 Digital Summit - Not So Cloudy - Agcaoili
Nils Puhlmann Ncoic Slides
Charting the Course Through Disruption with CSA Research
Hogan Kusnadi - Cloud Computing Secutity
Best Practices in Cloud Security Standards.pptx.pdf
Latest Developments in Cloud Security Standards and Privacy
CCSK, cloud security framework, Indonesia
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security vs. Traditional IT Security
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Cloud security Presentation
The Latest in Cloud Computing Standards
Cloud services and it security
Ad

Recently uploaded (20)

PDF
project resource management chapter-09.pdf
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
A Presentation on Artificial Intelligence
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Mushroom cultivation and it's methods.pdf
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
August Patch Tuesday
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
project resource management chapter-09.pdf
Web App vs Mobile App What Should You Build First.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Group 1 Presentation -Planning and Decision Making .pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
DP Operators-handbook-extract for the Mautical Institute
Accuracy of neural networks in brain wave diagnosis of schizophrenia
MIND Revenue Release Quarter 2 2025 Press Release
Digital-Transformation-Roadmap-for-Companies.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Chapter 5: Probability Theory and Statistics
A Presentation on Artificial Intelligence
Enhancing emotion recognition model for a student engagement use case through...
Programs and apps: productivity, graphics, security and other tools
A comparative study of natural language inference in Swahili using monolingua...
Mushroom cultivation and it's methods.pdf
Heart disease approach using modified random forest and particle swarm optimi...
August Patch Tuesday
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Univ-Connecticut-ChatGPT-Presentaion.pdf

CSA Standards Development Summary

  • 1. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance CSA’s Leading Role in the Development of Emerging Cloud Security Standards
  • 2. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance About Us • Global, not-for-profit, 501(c)6 organization • Over 29,000 individual members, 120 corporate members, 60 chapters • Building best practices and a trusted cloud ecosystem • Agile philosophy, rapid development of applied research • Balance compliance with risk management • Reference models: build using existing standards • Identity: a key foundation of a functioning cloud economy • Champion interoperability • Enable innovation • Advocacy of prudent public policy • Launching Innovation Initiative at RSA 2012 “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.”
  • 3. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Tools CSA Provides Today • Assessment • User Certifications • Best Practices • Provider Assessments • Procurement • Standards Creations
  • 4. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
  • 5. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance SAJACC USG FedRAMP • Chapter 1 – Security Requirements (SP 800-53 R3 ++) • Chapter 2 – Continuous Monitoring • Chapter 3 – Assessment & Authorization (SP 800-37 R1) SCAP & XCCDF Publications: • SP 800-144 (Security & Privacy Guidelines) • SP 800-145 (Definition) • SP 800-146 DRAFT (Synopsis & Recommendations)
  • 6. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance JTC 1/SC 27  Cloud Security & Privacy Joint WG • WG 1 – 27017 (Controls) • WG 4 – NWIP 27036-5 (Supplier Risk Requirements) • WG 5 – NWIP 27xxxx (Data Protection Guidelines for Public Cloud) JTC 1/SC 38  Cloud Computing Study Group (SGCC)  WG3 • cloud-o-0079 (Ecosystem) • cloud-o-0080 (Reference Architecture) • cloud-o-0081 (Infrastructure) • cloud-o-0082 (Resource Management) • cloud-o-0083 (Security) • cloud-o-0084 (SDO Overview) • cloud-o-0085 (Benefits)
  • 7. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Focus Group on Cloud Computing (FG Cloud) • WG 1 (Benefits & Requirements) • WG 2 (SDO Gap Analysis & Roadmap) SG 13  Cloud SG 17  Telecom Security • X.ccsec (Security Guidelines) • X.srfcts (Security Requirements & Framework) • X.sfcse (Security Functional Requirements for SaaS)
  • 8. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Help Us Secure Cloud Computing • www.cloudsecurityalliance.org • [email protected] • LinkedIn: www.linkedin.com/groups?gid=1864210 • Twitter: @cloudsa
  • 9. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance