Keep your Data and Applications Safe from CSA Top Threats

The cloud presents all kinds of opportunities for today’s enterprise, from anywhere access to anything-as-a-service. Cloud computing imposes significant security risks on the corporation, network, IT and the day to day activities of the business. How do they maintain compliance, control and ownership of sensitive data as they move from the physical environment to a cloud world? The distribution of data onto devices may not be completely controlled by the data owner, and there is liability confusion as cloud service providers take on a larger role. As a result CIOs are looking at technologies and strategies to assure security while delivering the required services.

Fortunately, this model of enterprise computing doesn’t have to be the high-risk proposition. By thinking of security as an enabler, instead of an obstacle for cloud adoption, you can easily protect and maintain control of data across multi-cloud environments while maximizing the business potential of the cloud. During this webcast we will discuss ways to address the key security challenges you’re facing as you move to the cloud.

See the webinar

 [Cloud Security Alliance News]

CSA Guidance V.4: Domain 1 now available for review and comments

The Cloud Security Alliance’s Security Guidance for Critical Areas of Focus in Cloud Computing seeks to establish a stable, secure baseline for cloud operations. It acts as a practical, actionable roadmap to individuals looking to safely and securely adopt the cloud paradigm.

Since it’s last revision in 2011, the cloud landscape, tools and technologies have changed and so we want to reflect that in an updated version of the CSA Guidance (which would be version 4). A draft of Domain 1 is now available for review. Domain 1 covers Cloud Computing Concepts and Architecture and it provides the conceptual framework for the rest of CSA’s guidance. The domain describes and defines cloud computing, sets our baseline terminology and details the overall logical and architectural frameworks used in the rest of the document.

Experts are needed that can invest their time in providing feedback. Although we have a dedicated writing team, this is still a community project. All feedback and edits will be managed via GitHub so that all parts of the process are open and public.

Contribute now

 [Cloud Security Alliance News]
English
Exit mobile version