CSA Standards Development Summary

www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
CSA’s Leading Role in the Development of
Emerging Cloud Security Standards
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
About Us
• Global, not-for-profit, 501(c)6 organization
• Over 29,000 individual members, 120 corporate members, 60 chapters
• Building best practices and a trusted cloud ecosystem
• Agile philosophy, rapid development of applied research
• Balance compliance with risk management
• Reference models: build using existing standards
• Identity: a key foundation of a functioning cloud economy
• Champion interoperability
• Enable innovation
• Advocacy of prudent public policy
• Launching Innovation Initiative at RSA 2012
“To promote the use of best practices for providing security assurance within Cloud
Computing, and provide education on the uses of Cloud Computing to help
secure all other forms of computing.”
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
Tools CSA Provides Today
• Assessment
• User Certifications
• Best Practices
• Provider Assessments
• Procurement
• Standards Creations
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
SAJACC
USG
FedRAMP
• Chapter 1 – Security Requirements (SP 800-53 R3 ++)
• Chapter 2 – Continuous Monitoring
• Chapter 3 – Assessment & Authorization (SP 800-37 R1)
SCAP & XCCDF
Publications:
• SP 800-144 (Security & Privacy Guidelines)
• SP 800-145 (Definition)
• SP 800-146 DRAFT (Synopsis & Recommendations)
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
JTC 1/SC 27  Cloud Security & Privacy Joint WG
• WG 1 – 27017 (Controls)
• WG 4 – NWIP 27036-5 (Supplier Risk Requirements)
• WG 5 – NWIP 27xxxx (Data Protection Guidelines for Public Cloud)
JTC 1/SC 38  Cloud Computing Study Group (SGCC)  WG3
• cloud-o-0079 (Ecosystem)
• cloud-o-0080 (Reference Architecture)
• cloud-o-0081 (Infrastructure)
• cloud-o-0082 (Resource Management)
• cloud-o-0083 (Security)
• cloud-o-0084 (SDO Overview)
• cloud-o-0085 (Benefits)
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
Focus Group on Cloud Computing (FG Cloud)
• WG 1 (Benefits & Requirements)
• WG 2 (SDO Gap Analysis & Roadmap)
SG 13  Cloud
SG 17  Telecom Security
• X.ccsec (Security Guidelines)
• X.srfcts (Security Requirements & Framework)
• X.sfcse (Security Functional Requirements for SaaS)
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
Help Us Secure Cloud Computing
• www.cloudsecurityalliance.org
• info@cloudsecurityalliance.org
• LinkedIn: www.linkedin.com/groups?gid=1864210
• Twitter: @cloudsa
www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
1 sur 9

Recommandé

Why CSA Australia par
Why CSA AustraliaWhy CSA Australia
Why CSA AustraliaCloudSecurityAllianceAustralia
363 vues23 diapositives
Global Mandate to Secure Cloud Computing par
Global Mandate to Secure Cloud ComputingGlobal Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud ComputingCloudSecurityAllianceAustralia
933 vues32 diapositives
CSA Introduction 2013 David Ross par
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David RossGraeme Wood
802 vues36 diapositives
Cybersecurity frameworks globally and saudi arabia par
Cybersecurity frameworks globally and saudi arabiaCybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabiaFaysal Ghauri
112 vues13 diapositives
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and... par
Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...Rohan Singh
49 vues58 diapositives
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK par
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
596 vues142 diapositives

Contenu connexe

Tendances

CSA Security Guidance Cloud Computing v3.0 par
CSA Security Guidance Cloud Computing v3.0CSA Security Guidance Cloud Computing v3.0
CSA Security Guidance Cloud Computing v3.0CloudSecurityAllianceAustralia
2.9K vues177 diapositives
Cloud Security Governance par
Cloud Security GovernanceCloud Security Governance
Cloud Security GovernanceShankar Subramaniyan
4.4K vues16 diapositives
Webroot - self-defending IoT devices & gateways par
Webroot - self-defending IoT devices & gateways Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways IISPEastMids
813 vues12 diapositives
Securing Servers in Public and Hybrid Clouds par
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsRightScale
940 vues44 diapositives
NIST Cybersecurity Framework (CSF) on the Public Cloud par
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudCloudHesive
192 vues52 diapositives
Cloud Security Demystified par
Cloud Security DemystifiedCloud Security Demystified
Cloud Security DemystifiedMichael Torres
970 vues40 diapositives

Tendances(20)

Webroot - self-defending IoT devices & gateways par IISPEastMids
Webroot - self-defending IoT devices & gateways Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways
IISPEastMids813 vues
Securing Servers in Public and Hybrid Clouds par RightScale
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
RightScale940 vues
NIST Cybersecurity Framework (CSF) on the Public Cloud par CloudHesive
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public Cloud
CloudHesive192 vues
Implementing zero trust architecture in azure hybrid cloud par Ajit Bhingarkar
Implementing zero trust architecture in azure hybrid cloudImplementing zero trust architecture in azure hybrid cloud
Implementing zero trust architecture in azure hybrid cloud
Ajit Bhingarkar95 vues
Securing Sensitive Data in Your Hybrid Cloud par RightScale
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
RightScale1.2K vues
Building a Security Architecture par Cisco Canada
Building a Security ArchitectureBuilding a Security Architecture
Building a Security Architecture
Cisco Canada4.8K vues
Security As A Service par Olav Tvedt
Security As A ServiceSecurity As A Service
Security As A Service
Olav Tvedt603 vues
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ... par Amazon Web Services
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
AWS Security Best Practices in a Zero Trust Security Model - DEM08 - Toronto ...
Service Organizational Control (SOC 2) Compliance - Kloudlearn par KloudLearn
Service Organizational Control  (SOC 2) Compliance - KloudlearnService Organizational Control  (SOC 2) Compliance - Kloudlearn
Service Organizational Control (SOC 2) Compliance - Kloudlearn
KloudLearn101 vues
Cloud security for banks - the central bank of Israel regulations for cloud s... par Moshe Ferber
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...
Moshe Ferber1.1K vues
Cloud Security Guide - Ref Architecture and Gov. Model par Vishal Sharma
Cloud Security Guide -  Ref Architecture and Gov. ModelCloud Security Guide -  Ref Architecture and Gov. Model
Cloud Security Guide - Ref Architecture and Gov. Model
Vishal Sharma3.7K vues
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed! par Netskope
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Netskope1.2K vues
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf... par Symantec
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec394 vues

Similaire à CSA Standards Development Summary

3245224.ppt par
3245224.ppt3245224.ppt
3245224.pptahmad21315
11 vues40 diapositives
Hogan Kusnadi - Cloud Computing Secutity par
Hogan Kusnadi - Cloud Computing SecutityHogan Kusnadi - Cloud Computing Secutity
Hogan Kusnadi - Cloud Computing SecutityIndonesia Honeynet Chapter
817 vues42 diapositives
Shawn Harris - CCSP SAH v2 par
Shawn Harris - CCSP SAH v2Shawn Harris - CCSP SAH v2
Shawn Harris - CCSP SAH v2Trish McGinity, CCSK
226 vues13 diapositives
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements par
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsPhil Agcaoili
622 vues45 diapositives
Introduction to the CSA Cloud Controls Matrix par
Introduction to the CSA Cloud Controls MatrixIntroduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls MatrixJohn Yeoh
2.2K vues18 diapositives
Presd1 10 par
Presd1 10Presd1 10
Presd1 10Niels Groeneveld
657 vues20 diapositives

Similaire à CSA Standards Development Summary(20)

CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements par Phil Agcaoili
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA AnnouncementsCSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
CSA Atlanta Chapter Meeting Q1'2013 and RSA Conference 2013 CSA Announcements
Phil Agcaoili622 vues
Introduction to the CSA Cloud Controls Matrix par John Yeoh
Introduction to the CSA Cloud Controls MatrixIntroduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls Matrix
John Yeoh2.2K vues
Itmgen 4317 security par Cisco
Itmgen 4317 securityItmgen 4317 security
Itmgen 4317 security
Cisco75 vues
Keys-to-Success-and-Security-in-the-Cloud par patmisasi
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
patmisasi213 vues
Keys to success and security in the cloud par Scalar Decisions
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
Scalar Decisions909 vues
Creating a Widely Distributed Production Federated Cloud System to Support Mu... par David Wallom
Creating a Widely Distributed Production Federated Cloud System to Support Mu...Creating a Widely Distributed Production Federated Cloud System to Support Mu...
Creating a Widely Distributed Production Federated Cloud System to Support Mu...
David Wallom466 vues
CSA Atlanta Q1'2016 Chapter Meeting par Phil Agcaoili
CSA Atlanta Q1'2016 Chapter MeetingCSA Atlanta Q1'2016 Chapter Meeting
CSA Atlanta Q1'2016 Chapter Meeting
Phil Agcaoili1.3K vues
Cisco integrated system for microsoft azure stack par Aymen Mami
Cisco integrated system for microsoft azure stackCisco integrated system for microsoft azure stack
Cisco integrated system for microsoft azure stack
Aymen Mami1K vues
Migrating Critical Applications to the Cloud - isaca seattle - sanitized par UnifyCloud
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
UnifyCloud351 vues
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized par Norm Barber
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber385 vues
Cloud Computing Roadmap par Akelios
Cloud Computing RoadmapCloud Computing Roadmap
Cloud Computing Roadmap
Akelios3.2K vues

Dernier

Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... par
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...ShapeBlue
158 vues20 diapositives
Uni Systems for Power Platform.pptx par
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptxUni Systems S.M.S.A.
61 vues21 diapositives
NTGapps NTG LowCode Platform par
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform Mustafa Kuğu
365 vues30 diapositives
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates par
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesShapeBlue
210 vues15 diapositives
Ransomware is Knocking your Door_Final.pdf par
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdfSecurity Bootcamp
90 vues46 diapositives
Data Integrity for Banking and Financial Services par
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial ServicesPrecisely
78 vues26 diapositives

Dernier(20)

Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... par ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue158 vues
NTGapps NTG LowCode Platform par Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu365 vues
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates par ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue210 vues
Data Integrity for Banking and Financial Services par Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely78 vues
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue par ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue93 vues
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... par ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue88 vues
State of the Union - Rohit Yadav - Apache CloudStack par ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue253 vues
Future of AR - Facebook Presentation par Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty62 vues
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue par ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue163 vues
The Power of Heat Decarbonisation Plans in the Built Environment par IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE69 vues
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P... par ShapeBlue
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
ShapeBlue154 vues
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive par Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... par James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson156 vues
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... par ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue101 vues
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue par ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue103 vues
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool par ShapeBlue
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool
ShapeBlue84 vues
Igniting Next Level Productivity with AI-Infused Data Integration Workflows par Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software385 vues
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... par ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue123 vues

CSA Standards Development Summary

  • 1. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance CSA’s Leading Role in the Development of Emerging Cloud Security Standards
  • 2. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance About Us • Global, not-for-profit, 501(c)6 organization • Over 29,000 individual members, 120 corporate members, 60 chapters • Building best practices and a trusted cloud ecosystem • Agile philosophy, rapid development of applied research • Balance compliance with risk management • Reference models: build using existing standards • Identity: a key foundation of a functioning cloud economy • Champion interoperability • Enable innovation • Advocacy of prudent public policy • Launching Innovation Initiative at RSA 2012 “To promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing.”
  • 3. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Tools CSA Provides Today • Assessment • User Certifications • Best Practices • Provider Assessments • Procurement • Standards Creations
  • 4. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance
  • 5. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance SAJACC USG FedRAMP • Chapter 1 – Security Requirements (SP 800-53 R3 ++) • Chapter 2 – Continuous Monitoring • Chapter 3 – Assessment & Authorization (SP 800-37 R1) SCAP & XCCDF Publications: • SP 800-144 (Security & Privacy Guidelines) • SP 800-145 (Definition) • SP 800-146 DRAFT (Synopsis & Recommendations)
  • 6. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance JTC 1/SC 27  Cloud Security & Privacy Joint WG • WG 1 – 27017 (Controls) • WG 4 – NWIP 27036-5 (Supplier Risk Requirements) • WG 5 – NWIP 27xxxx (Data Protection Guidelines for Public Cloud) JTC 1/SC 38  Cloud Computing Study Group (SGCC)  WG3 • cloud-o-0079 (Ecosystem) • cloud-o-0080 (Reference Architecture) • cloud-o-0081 (Infrastructure) • cloud-o-0082 (Resource Management) • cloud-o-0083 (Security) • cloud-o-0084 (SDO Overview) • cloud-o-0085 (Benefits)
  • 7. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Focus Group on Cloud Computing (FG Cloud) • WG 1 (Benefits & Requirements) • WG 2 (SDO Gap Analysis & Roadmap) SG 13  Cloud SG 17  Telecom Security • X.ccsec (Security Guidelines) • X.srfcts (Security Requirements & Framework) • X.sfcse (Security Functional Requirements for SaaS)
  • 8. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance Help Us Secure Cloud Computing • www.cloudsecurityalliance.org • info@cloudsecurityalliance.org • LinkedIn: www.linkedin.com/groups?gid=1864210 • Twitter: @cloudsa
  • 9. www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance