Quantcast
Channel: CCSK Guide » CSA
Browsing all 11 articles
Browse latest View live

Identity & Access Management in the Cloud

Identity and access management is covered in Domain 12 of the Cloud Security Alliance (CSA) Guide to the CCSK examination. An organization's identity and access management (IAM) strategy may be a key...

View Article


Cloud Identity as a Service (IDaaS)

Defining Identity as a Service According to the CSA (Cloud Security Alliance), Identity as a Service (IDaaS) refers to the management of identities in the cloud, apart from the applications and...

View Article


CloudAudit/A6 & the CSA

CloudAudit, initially launched in January 2010, is a working group made up of volunteers with cloud, networking, security, audit, assurance and architecture backgrounds. Addressing Challenges in the...

View Article

Understanding Application Security in the Cloud

Whether in or out of the cloud, application security is a crucial part of any IT strategy. There are, however, a number of new concerns to be aware of when deploying applications in the cloud....

View Article

CSA Governance, Risk Management & Compliance Stack

In November, 2010, the CSA (Cloud Security Alliance) announced the release of its Governance, Risk Management and Compliance (GRC) Stack. The CSA recognized the challenges involved in meeting the...

View Article


Cloud Security Standards

Whether an organization is considering SaaS (software as a service) applications, PaaS (platform as a service) models or IaaS (infrastructure as a service) options, it’s pretty much a given that...

View Article

CSA’s STAR

Over the summer of 2011, the Cloud Security Alliance (CSA) announced a new initiative, which urged cloud service providers to voluntarily disclose their compliance with CSA-recommended best practices...

View Article

Confidence in the Cloud

The Cloud Security Alliance (CSA) and ISACA have recently released their Cloud Market Maturity report, which outlines the top ten issues regarding enterprise cloud adoption. According to the report,...

View Article


2012 Cloud Market Maturity Report

When cloud computing broke into the market, it captured the attention of business and technology leaders alike. It came with the expectation of change for many aspects of how technology would be...

View Article


Fears of Government Snooping Prevent Cloud Adoption

Cloud security garners even more attention as a recent report from Lieberman Research revealed that almost half of IT professionals were reticent to keep sensitive data in the cloud because of the...

View Article

Introduction to the Legal Issues around Cloud Computing

Cloud computing services face a wide variety of legal issues and concerns, many of which represent obstacles for customers. The problem is that many customers of cloud services hesitate to commit...

View Article
Browsing all 11 articles
Browse latest View live