An IEEE standard for local and metropolitan area networks–Port-Based Network Access Control. IEEE 802 LANs are deployed in networks that convey or provide access to critical data, that support mission ...
Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best ...
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, ...
Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best ...
This working group aims to develop Zero Trust standards to achieve consistency for cloud, hybrid and mobile endpoint environments. The topic of group discourse include Zero Trust benefits, ...
Written by Troy Leach, Chief Strategy Officer (CSO), CSA. We require a modern approach to accurately assess our use of current technology. This month marks 25 years since I managed my first ...
Written by Erick Tauil, Presales Engineer. Alright, let’s dive into a topic that often feels like a riddle wrapped in an enigma: Zero Trust. Communicating its concepts to non-security stakeholders can ...
CSA EMEA Congress 2019 TBD June 3, 2019 Download presentations CSA Colorado Chapter Forum 2019 TBD June 3, 2019 Download presentations CSA Summit at (ISC)² Security Congress 2019 TBD June 3, 2019 ...
The CSA Cloud Controls Matrix (CCM) is a cybersecurity control framework for cloud computing. It is composed of 197 control objectives that are structured in 17 domains covering all key aspects of ...
CSA Working Groups are the go-to source for best practices, research and tools for providing security assurance and privacy in the cloud. CSA’s diverse membership of industry practitioners and ...
How do privacy and security overlap? In most aspects of the collection, use or processing of personal data, privacy and security functions overlap or coexist to some ...