Identity & Access Management in the Cloud
Identity and access management is covered in Domain 12 of the Cloud Security Alliance (CSA) Guide to the CCSK examination. An organization's identity and access management (IAM) strategy may be a key...
View ArticleCloud Identity as a Service (IDaaS)
Defining Identity as a Service According to the CSA (Cloud Security Alliance), Identity as a Service (IDaaS) refers to the management of identities in the cloud, apart from the applications and...
View ArticleCloudAudit/A6 & the CSA
CloudAudit, initially launched in January 2010, is a working group made up of volunteers with cloud, networking, security, audit, assurance and architecture backgrounds. Addressing Challenges in the...
View ArticleUnderstanding Application Security in the Cloud
Whether in or out of the cloud, application security is a crucial part of any IT strategy. There are, however, a number of new concerns to be aware of when deploying applications in the cloud....
View ArticleCSA Governance, Risk Management & Compliance Stack
In November, 2010, the CSA (Cloud Security Alliance) announced the release of its Governance, Risk Management and Compliance (GRC) Stack. The CSA recognized the challenges involved in meeting the...
View ArticleCloud Security Standards
Whether an organization is considering SaaS (software as a service) applications, PaaS (platform as a service) models or IaaS (infrastructure as a service) options, it’s pretty much a given that...
View ArticleCSA’s STAR
Over the summer of 2011, the Cloud Security Alliance (CSA) announced a new initiative, which urged cloud service providers to voluntarily disclose their compliance with CSA-recommended best practices...
View ArticleConfidence in the Cloud
The Cloud Security Alliance (CSA) and ISACA have recently released their Cloud Market Maturity report, which outlines the top ten issues regarding enterprise cloud adoption. According to the report,...
View Article2012 Cloud Market Maturity Report
When cloud computing broke into the market, it captured the attention of business and technology leaders alike. It came with the expectation of change for many aspects of how technology would be...
View ArticleFears of Government Snooping Prevent Cloud Adoption
Cloud security garners even more attention as a recent report from Lieberman Research revealed that almost half of IT professionals were reticent to keep sensitive data in the cloud because of the...
View ArticleIntroduction to the Legal Issues around Cloud Computing
Cloud computing services face a wide variety of legal issues and concerns, many of which represent obstacles for customers. The problem is that many customers of cloud services hesitate to commit...
View Article