News

SOC 1 reports verify internal controls for financial data, which is essential for trust, sales, and SOX compliance. Here's ...
This comprehensive glossary combines all the glossaries created by CSA Working Groups and research contributors into one place. If you have a question or need other assistance please reach out to ...
Every major compliance framework, including PCI DSS, GDPR, and ISO 27001, requires strong access controls. Yet Non-Human ...
As telecom networks embrace cloud-native to power 5G, the importance of Zero Trust has never been greater. A recent ...
Join a Worldwide Professional Network with CSA Chapters Build connections, grow your expertise, and shape the future of cloud security—locally and globally.
When it comes to executing identity processes, 96% of organizations still rely on manual workflows. Automation is the ...
Understand the critical next steps to secure and manage your non-human identities (NHIs) effectively. Refine your strategy, ...
When AI fails, it often fails fast and loud. Apply CSA’s AI Resilience Benchmarking Model to 4 real incidents to get a better understanding of AI failures.
Case studies articulate cloud computing’s most significant and pressing issues SAN FRANCISCO (RSA Conference) and SEATTLE - April 29, 2025 - The Cloud Security Alliance (CSA), the world’s leading ...
This initiative aims to address inconsistencies in security capabilities across SaaS vendors by defining key configurable technical security features that should be supported. The peer review will ...
Security maturity measures an organization's ability to manage risks. This guide explains data security maturity and provides assessment best practices.
This mapping makes it clear that the Responses API itself sits primarily at Layer 3 (Agent Frameworks), but it directly interacts with Layers 1, 2, 5, and 6. Layer 4 is always relevant, even if ...