Suche senden
Hochladen
CSA Standards Development Summary
•
1 gefällt mir
•
591 views
CloudSecurityAllianceAustralia
Folgen
Cloud Security Alliance
Weniger lesen
Mehr lesen
Technologie
Business
Melden
Teilen
Melden
Teilen
1 von 9
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
Why CSA Australia
Why CSA Australia
CloudSecurityAllianceAustralia
Global Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud Computing
CloudSecurityAllianceAustralia
CSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
Graeme Wood
Cybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabia
Faysal Ghauri
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan Singh
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Maganathin Veeraragaloo
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
Vladimir Jirasek
How to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud Secure
Cprime
Empfohlen
Why CSA Australia
Why CSA Australia
CloudSecurityAllianceAustralia
Global Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud Computing
CloudSecurityAllianceAustralia
CSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
Graeme Wood
Cybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabia
Faysal Ghauri
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan Singh
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Maganathin Veeraragaloo
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
Vladimir Jirasek
How to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud Secure
Cprime
CSA Security Guidance Cloud Computing v3.0
CSA Security Guidance Cloud Computing v3.0
CloudSecurityAllianceAustralia
Cloud Security Governance
Cloud Security Governance
Shankar Subramaniyan
Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways
IISPEastMids
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
RightScale
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public Cloud
CloudHesive
Cloud Security Demystified
Cloud Security Demystified
Michael Torres
Implementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloud
Ajit Bhingarkar
IT Security As A Service
IT Security As A Service
Michael Davis
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
RightScale
CSA & GRC Stack
CSA & GRC Stack
CloudSecurityAllianceAustralia
Workshop on CASB Part 2
Workshop on CASB Part 2
Priyanka Aash
Building a Security Architecture
Building a Security Architecture
Cisco Canada
Security As A Service
Security As A Service
Olav Tvedt
4.5.cloud security
4.5.cloud security
DrRajapraveenkN
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
Amazon Web Services
Service Organizational Control (SOC 2) Compliance - Kloudlearn
Service Organizational Control (SOC 2) Compliance - Kloudlearn
KloudLearn
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...
Moshe Ferber
Cloud Security Guide - Ref Architecture and Gov. Model
Cloud Security Guide - Ref Architecture and Gov. Model
Vishal Sharma
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Netskope
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec
3245224.ppt
3245224.ppt
ahmad21315
Hogan Kusnadi - Cloud Computing Secutity
Hogan Kusnadi - Cloud Computing Secutity
Indonesia Honeynet Chapter
Weitere ähnliche Inhalte
Was ist angesagt?
CSA Security Guidance Cloud Computing v3.0
CSA Security Guidance Cloud Computing v3.0
CloudSecurityAllianceAustralia
Cloud Security Governance
Cloud Security Governance
Shankar Subramaniyan
Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways
IISPEastMids
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
RightScale
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public Cloud
CloudHesive
Cloud Security Demystified
Cloud Security Demystified
Michael Torres
Implementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloud
Ajit Bhingarkar
IT Security As A Service
IT Security As A Service
Michael Davis
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
RightScale
CSA & GRC Stack
CSA & GRC Stack
CloudSecurityAllianceAustralia
Workshop on CASB Part 2
Workshop on CASB Part 2
Priyanka Aash
Building a Security Architecture
Building a Security Architecture
Cisco Canada
Security As A Service
Security As A Service
Olav Tvedt
4.5.cloud security
4.5.cloud security
DrRajapraveenkN
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
Amazon Web Services
Service Organizational Control (SOC 2) Compliance - Kloudlearn
Service Organizational Control (SOC 2) Compliance - Kloudlearn
KloudLearn
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...
Moshe Ferber
Cloud Security Guide - Ref Architecture and Gov. Model
Cloud Security Guide - Ref Architecture and Gov. Model
Vishal Sharma
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Netskope
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec
Was ist angesagt?
(20)
CSA Security Guidance Cloud Computing v3.0
CSA Security Guidance Cloud Computing v3.0
Cloud Security Governance
Cloud Security Governance
Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public Cloud
Cloud Security Demystified
Cloud Security Demystified
Implementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloud
IT Security As A Service
IT Security As A Service
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
CSA & GRC Stack
CSA & GRC Stack
Workshop on CASB Part 2
Workshop on CASB Part 2
Building a Security Architecture
Building a Security Architecture
Security As A Service
Security As A Service
4.5.cloud security
4.5.cloud security
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
Service Organizational Control (SOC 2) Compliance - Kloudlearn
Service Organizational Control (SOC 2) Compliance - Kloudlearn
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud Security Guide - Ref Architecture and Gov. Model
Cloud Security Guide - Ref Architecture and Gov. Model
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Ähnlich wie CSA Standards Development Summary
3245224.ppt
3245224.ppt
ahmad21315
Hogan Kusnadi - Cloud Computing Secutity
Hogan Kusnadi - Cloud Computing Secutity
Indonesia Honeynet Chapter
Shawn Harris - CCSP SAH v2
Shawn Harris - CCSP SAH v2
Trish McGinity, CCSK
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Phil Agcaoili
Introduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls Matrix
John Yeoh
Presd1 10
Presd1 10
Niels Groeneveld
Cloud security ppt
Cloud security ppt
Venkatesh Chary
Itmgen 4317 security
Itmgen 4317 security
Cisco
Keys to success and security in the cloud
Keys to success and security in the cloud
Scalar Decisions
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
patmisasi
Creating a Widely Distributed Production Federated Cloud System to Support Mu...
Creating a Widely Distributed Production Federated Cloud System to Support Mu...
David Wallom
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
Phil Agcaoili
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Standards Customer Council
Cloud Computing Enables Consumer-Centered Healthcare
Cloud Computing Enables Consumer-Centered Healthcare
Eiji Sasahara, Ph.D., MBA 笹原英司
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
Cloud Standards Customer Council
Cisco integrated system for microsoft azure stack
Cisco integrated system for microsoft azure stack
Aymen Mami
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
UnifyCloud
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
Cloud Computing Roadmap
Cloud Computing Roadmap
Akelios
OpenStack & MySQL
OpenStack & MySQL
MySQL Brasil
Ähnlich wie CSA Standards Development Summary
(20)
3245224.ppt
3245224.ppt
Hogan Kusnadi - Cloud Computing Secutity
Hogan Kusnadi - Cloud Computing Secutity
Shawn Harris - CCSP SAH v2
Shawn Harris - CCSP SAH v2
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Introduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls Matrix
Presd1 10
Presd1 10
Cloud security ppt
Cloud security ppt
Itmgen 4317 security
Itmgen 4317 security
Keys to success and security in the cloud
Keys to success and security in the cloud
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
Creating a Widely Distributed Production Federated Cloud System to Support Mu...
Creating a Widely Distributed Production Federated Cloud System to Support Mu...
CSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Computing Enables Consumer-Centered Healthcare
Cloud Computing Enables Consumer-Centered Healthcare
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
Cisco integrated system for microsoft azure stack
Cisco integrated system for microsoft azure stack
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Cloud Computing Roadmap
Cloud Computing Roadmap
OpenStack & MySQL
OpenStack & MySQL
Kürzlich hochgeladen
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Softradix Technologies
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
OnBoard
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Neo4j
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Padma Pradeep
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
LBM Solutions
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Sinan KOZAK
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Allon Mureinik
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Pixlogix Infotech
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
2toLead Limited
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Safe Software
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
soniya singh
Kürzlich hochgeladen
(20)
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
CSA Standards Development Summary
1.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance CSA’s Leading Role in the Development of Emerging Cloud Security Standards
2.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance About Us • Global, not-for-profit, 501(c)6 organization • Over 29,000 individual members, 120 corporate members, 60 chapters • Building best practices and a trusted cloud ecosystem • Agile philosophy, rapid development of applied research • Balance compliance with risk management • Reference models: build using existing standards • Identity: a key foundation of a functioning cloud economy • Champion interoperability • Enable innovation • Advocacy of prudent public policy • Launching Innovation Initiative at RSA 2012 “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.”
3.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Tools CSA Provides Today • Assessment • User Certifications • Best Practices • Provider Assessments • Procurement • Standards Creations
4.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
5.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance SAJACC USG FedRAMP • Chapter 1 – Security Requirements (SP 800-53 R3 ++) • Chapter 2 – Continuous Monitoring • Chapter 3 – Assessment & Authorization (SP 800-37 R1) SCAP & XCCDF Publications: • SP 800-144 (Security & Privacy Guidelines) • SP 800-145 (Definition) • SP 800-146 DRAFT (Synopsis & Recommendations)
6.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance JTC 1/SC 27 Cloud Security & Privacy Joint WG • WG 1 – 27017 (Controls) • WG 4 – NWIP 27036-5 (Supplier Risk Requirements) • WG 5 – NWIP 27xxxx (Data Protection Guidelines for Public Cloud) JTC 1/SC 38 Cloud Computing Study Group (SGCC) WG3 • cloud-o-0079 (Ecosystem) • cloud-o-0080 (Reference Architecture) • cloud-o-0081 (Infrastructure) • cloud-o-0082 (Resource Management) • cloud-o-0083 (Security) • cloud-o-0084 (SDO Overview) • cloud-o-0085 (Benefits)
7.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Focus Group on Cloud Computing (FG Cloud) • WG 1 (Benefits & Requirements) • WG 2 (SDO Gap Analysis & Roadmap) SG 13 Cloud SG 17 Telecom Security • X.ccsec (Security Guidelines) • X.srfcts (Security Requirements & Framework) • X.sfcse (Security Functional Requirements for SaaS)
8.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Help Us Secure Cloud Computing • www.cloudsecurityalliance.org • info@cloudsecurityalliance.org • LinkedIn: www.linkedin.com/groups?gid=1864210 • Twitter: @cloudsa
9.
www.cloudsecurityalliance.orgCopyright © 2011
Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
Jetzt herunterladen