CINXE.COM

CSA

<!DOCTYPE html><html><head><title>CSA</title> <link rel="canonical" href="https://cloudsecurityalliance.org/blog"> <link rel="image_src" href="/assets/social-share/facebook-429f9d45f1c2afbf16c63ff940668c3dfc1e7ed3f9155f98eab6691bf6b5fd82.jpg"> <meta property="og:locale" content="en"> <meta property="og:type" content="website"> <meta property="og:title" content="CSA"> <meta property="og:url" content="https://cloudsecurityalliance.org/blog"> <meta property="og:site_name" content="CSA"> <meta property="og:image" content="/assets/social-share/facebook-429f9d45f1c2afbf16c63ff940668c3dfc1e7ed3f9155f98eab6691bf6b5fd82.jpg"> <meta name="twitter:card" content="summary"> <meta name="twitter:title" content="CSA"> <meta name="twitter:site" content="@cloudsa"> <meta name="twitter:site_name" content="CSA"> <meta name="twitter:creator" content="@cloudsa"> <meta name="twitter:image" content="/assets/social-share/facebook-429f9d45f1c2afbf16c63ff940668c3dfc1e7ed3f9155f98eab6691bf6b5fd82.jpg"><meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="b1kJGgykQZ1fdD69HXPCIqpwPO4ZXkguAFJ6bPO3gi_KSZkPTEZTa_qv5OGlSaz0GPR7WoDnD07QofiZOdu0Wg" /><meta name="csp-nonce" /><meta content="text/html;charset=utf-8" http-equiv="Content-type" /><meta content="width=device-width, initial-scale=1" name="viewport" /><meta content="IE=edge,chrome=1" http-equiv="X-UA-Compatible" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/favicon/favicon.ico" rel="Shortcut Icon" type="image/x-icon" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/iphone.png" rel="apple-touch-icon" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-57x57.png" rel="apple-touch-icon" sizes="57x57" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-60x60.png" rel="apple-touch-icon" sizes="60x60" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-72x72.png" rel="apple-touch-icon" sizes="72x72" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-76x76.png" rel="apple-touch-icon" sizes="76x76" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-114x114.png" rel="apple-touch-icon" sizes="114x114" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-120x120.png" rel="apple-touch-icon" sizes="120x120" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-144x144.png" rel="apple-touch-icon" sizes="144x144" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-152x152.png" rel="apple-touch-icon" sizes="152x152" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-180x180.png" rel="apple-touch-icon" sizes="180x180" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/favicon/favicon-16x16.png" rel="icon" sizes="16x16" type="image/png" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/favicon/favicon-32x32.png" rel="icon" sizes="32x32" type="image/png" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/favicon/favicon-96x96.png" rel="icon" sizes="96x96" type="image/png" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/android-chrome-icons/android-chrome-192x192.png" rel="icon" sizes="192x192" type="image/png" /><link rel="stylesheet" href="/assets/application-7bc8ac2ae47645318b63c9fe2922e80badf0eb23bdda73b329d3e4fb8b96424e.css" data-turbolinks-track="reload" /><link href="https://fonts.googleapis.com/css?family=Open+Sans%3A300italic%2C400italic%2C600italic%2C700italic%2C800italic%2C400%2C300%2C600%2C700%2C800&amp;amp;#038;ver=1.0" media="all" rel="stylesheet" type="text/css" /><link href="https://fonts.googleapis.com/css?family=Titillium+Web%3A400%2C600&amp;amp;#038;ver=1.0" media="all" rel="stylesheet" type="text/css" /><link href="https://use.typekit.net/tpr8qgx.css" rel="stylesheet" /><script>window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('consent', 'default', { 'ad_storage': 'denied', 'ad_user_data': 'denied', 'ad_personalization': 'denied', 'analytics_storage': 'denied', }); window.gtag = gtag;</script><!-- Google Tag Manager Head Tag--><script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({"gtm.start": new Date().getTime(),event:"gtm.js"});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!="dataLayer"?"&l="+l:"";j.async=true;j.src= "https://www.googletagmanager.com/gtm.js?id=" +i+dl;f.parentNode.insertBefore(j,f); })(window,document,"script","dataLayer",'GTM-WGMWDNB');</script><!-- End Google Tag Manager Head Tag --><script src="/assets/application-ba4225ec596eebba3745394b97bb2fd7e5bcbe822dfa1440400acee76232d3fd.js" data-turbo-track="reload"></script><script async="" defer="" src="https://www.google.com/recaptcha/api.js?render=explicit"></script><script>window.addEventListener("turbo:before-render", function () { window.zEACLoaded = undefined; // this is the "hidden" global var that zendesk uses to check if it's loaded its widget yet });</script></head><body class="csa"><!-- Google Tag Manager Body Tag (noscript) --> <noscript> <iframe src="https://www.googletagmanager.com/ns.html?id=GTM-WGMWDNB" height="0" width="0" style="display:none;visibility:hidden"> </iframe> </noscript> <!-- End Google Tag Manager Body Tag (noscript) --> <style>.callout-banner { text-align: center; position: relative; font-weight: 300; font-size: 12px; } @media screen and (max-width: 1110px) { .callout-banner { margin-top: 40px; } }</style><style>.app_notification a { color: white !important; text-decoration: underline; }</style><header class="csa-c-layout-header"><div class="o-area" id="quicklinks"><div class="c-quicklinks"><div class="o-container"><a class="c-quicklink" href="https://cloudsecurityalliance.org/cloud-newbie">Cloud 101</a><a class="c-quicklink" rel="noopener" target="_blank" href="https://circle.cloudsecurityalliance.org/">Circle</a><a class="c-quicklink" href="https://cloudsecurityalliance.org/events/">Events</a><a class="c-quicklink" href="https://cloudsecurityalliance.org/blog/">Blog</a><form class="c-quicklink" method="post" action="/auth/auth0"><button style="text-transform: uppercase;" data-turbo="false" type="submit">Sign in or Sign Up</button><input type="hidden" name="authenticity_token" value="hUtzatoStCk2-4Sz_yen7tANA5JI5gpPvpU0Cn-JWwD1agkUwJo3qRVYbMYcptB_cwrEC0A54wByyHhqpd5Vag" autocomplete="off" /></form></div></div></div><div id="megamenu"><div class="c-megamenu"><div class="o-container"><div class="o-grid"><a class="c-megamenu__logo o-grid__cell o-grid__cell--width-15@xsmall" href="/"><img src="/assets/CSA-logo-RGB-a0a3855889ad836fa585d60f6caf8d619f241d43904c304c2f64284127fe9bf3.svg" /></a><div class="c-megamenu__categories o-grid__cell o-grid__cell--width-75@xsmall"><div class="c-megamenu__category" data-target="#membership-nav"><div class="c-megamenu__anchor">Membership</div><div class="c-megamenu__category-content" id="membership-nav"><div class="o-container"><div class="o-grid o-grid--small-fit o-grid--medium-fit o-grid--large-fit"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/membership/">Membership Benefits</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/membership/current/">Our Member Community</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/membership/get-involved/">Get Involved</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/membership/contact/">Become a Member</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Member-Exclusive Programs</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/registry/star-enabled-solutions/">STAR Enabled Solutions</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/trusted-cloud-consultant/registry/">Trusted Cloud Consultant</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/trusted-cloud-provider/">Trusted Cloud Provider</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/certified-star-auditors/">Certified STAR Auditors</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="https://cloudsecurityalliance.my.site.com">Member Portal</a></div></div></div></div></div></div></div><div class="c-megamenu__category" data-target="#star-program-nav"><div class="c-megamenu__anchor">STAR Program</div><div class="c-megamenu__category-content" id="star-program-nav"><div class="o-container"><div class="o-grid o-grid--small-fit o-grid--medium-fit o-grid--large-fit"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/">STAR Home</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/">STAR Registry</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/submit/">Submit to Registry</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/feedback/">Provide Feedback</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/certified-star-auditors/">Certified STAR Auditors</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/star-enabled-solutions/overview/">STAR Enabled Solutions</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Stay compliant in the cloud</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/ccak/">CCAK Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/star-lead-auditor-training/">STAR Lead Auditor Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/gsa-schedule/">Training for Government Agencies</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Governance, Risk & Compliance&nbsp;Tools</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/cloud-controls-matrix/">Cloud Controls Matrix (CCM)</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/cloud-controls-matrix/">Consensus Assessment Initiative Questionnaire (CAIQ)</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/gdpr/eu-cloud-code-of-conduct/">EU Cloud Code of Conduct</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/?level=1">STAR Level 1</a></div><div class="c-megamenu__item-description">At level one organizations submit a self-assessment.</div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/?level=1">View companies at level one</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/#tab_levelOne">Learn about level one</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/?level=2">STAR Level 2</a></div><div class="c-megamenu__item-description">At level two organizations earn a certification or third-party attestation.</div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/?level=2">View companies at level two</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/#tab_levelTwo">Learn about level two</a></div></div></div></div></div></div></div><div class="c-megamenu__category" data-target="#certificates-training-nav"><div class="c-megamenu__anchor">Certificates &amp; Training</div><div class="c-megamenu__category-content" id="certificates-training-nav"><div class="o-container"><div class="o-grid o-grid--small-fit o-grid--medium-fit o-grid--large-fit"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Online Education Platforms</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="https://knowledge.cloudsecurityalliance.org">Knowledge Center</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="https://exams.cloudsecurityalliance.org">CSA Exams</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/events/">Events</a></div><div class="c-megamenu__item-description">Learn and network while you earn CPE credits.</div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/events/virtual-and-webinars/">Virtual Events &amp; Webinars</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/sponsor/">Event Sponsorships</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/">Certificates</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/ccsk/">Certificate of Cloud Security Knowledge (CCSK)</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/ccak/">Certificate of Cloud Auditing Knowledge (CCAK)</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/cczt/">Certificate of Competence in Zero Trust (CCZT)</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/digital-badges/">Digital Badges</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/">Trainings</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/cloud-infrastructure-security-training">Cloud Infrastructure Security Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/star-lead-auditor-training/">STAR Lead Auditor Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/advanced-cloud-security-practitioner-training">Advanced Cloud Security Practitioner (ACSP) Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/train-the-trainer/">CCSK Train the Trainer</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/partner#become_partner">Training Network</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/instructors/">Become an Instructor</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/training-partners/">Become a Training Partner</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Specialized Training Options</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/business/">Train my entire team</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/gsa-schedule/">Training for Government Agencies</a></div></div></div></div></div></div></div><div class="c-megamenu__category" data-target="#research-nav"><div class="c-megamenu__anchor">Research</div><div class="c-megamenu__category-content" id="research-nav"><div class="o-container"><div class="o-grid o-grid--small-fit o-grid--medium-fit o-grid--large-fit"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/">CSA Research</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/publications">Latest Research</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/">Working Groups</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/chapters/">Chapters</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/contribute#peer-reviews">Open Peer Reviews</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/topics">Research Topics</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Strategic Initiatives</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/artificial-intelligence/">AI Safety Initiative</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/zt/">Zero Trust Advancement Center</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/cxo-trust/">CxO Trust</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/trusted-cloud-consultant/">Trusted Cloud Consultant</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/fincloud-security">FinCloud Security</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Thought Leadership</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/events/virtual-and-webinars/?event_kind=Webinar">CloudBytes Webinars</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/blog/">Blog</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Getting Started with CSA Research</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/guidance/">Cloud security best practices</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/cloud-controls-matrix/">Assess your cloud compliance</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/artifacts/star-level-1-security-questionnaire-caiq-v4/">Security questionnaire for vendors</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/top-threats/">Top threats to cloud computing</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/cloud-security-glossary">Cloud Security Glossary</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Awards & Recognition</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/juanita-koilpillai/service-award/">Juanita Koilpillai Awards</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/fellowship#fellows">Research Fellows</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Critical Topics</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/artificial-intelligence">AI Safety Initiative</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/ai-technology-and-risk">AI Technology and Risk</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/ai-governance-compliance">AI Governance &amp; Compliance</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/ai-controls">AI Controls</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/ai-organizational-responsibilities">AI Organizational Responsibilities</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/enterprise-architecture">Enterprise Architecture</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/blockchain">Blockchain</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/zero-trust">Zero Trust</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/devsecops">DevSecOps</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/top-threats">Top Threats</a></div></div></div></div></div></div></div></div><div class="o-grid__cell c-megamenu__search"><form action="/search" class="input-pair u-mb0" data-turbo="false" method="get" role="search"><label><span class="u-screen-reader">Search for:</span></label><input autocomplete="off" class="c-megamenu__search-input" name="s" placeholder="Search CSA resources, tools, research publications and more…" title="Search for:" type="text" value="" /><button class="c-button c-button--secondary"><i class="fas fa-search"></i></button><div class="c-button c-button--expand"><i class="fas fa-search"></i></div><div class="c-button c-button--close"><div class="i fas fa-times"></div></div></form></div></div></div></div></div><div id="megamenu_mobile"><div class="c-mobile-menu"><div class="c-mobile-menu__head"><a class="c-megamenu__logo" href="/"><img src="/assets/CSA-logo-RGB-a0a3855889ad836fa585d60f6caf8d619f241d43904c304c2f64284127fe9bf3.svg" /></a><span class="c-mobile-menu__search"><a style="color: black" href="/search"><i class="fas fa-search"></i></a></span><span class="c-mobile-menu__hamburger"><i class="fas fa-bars"></i></span></div><div class="o-container c-mobile-menu__body"><div class="c-megamenu__categories"><div class="c-megamenu__category" data-target="#mobile-membership-nav"><div class="c-megamenu__anchor">Membership</div><div class="c-megamenu__category-content" id="mobile-membership-nav"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/membership/">Membership Benefits</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/membership/current/">Our Member Community</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/membership/get-involved/">Get Involved</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/membership/contact/">Become a Member</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Member-Exclusive Programs</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/registry/star-enabled-solutions/">STAR Enabled Solutions</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/trusted-cloud-consultant/registry/">Trusted Cloud Consultant</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/trusted-cloud-provider/">Trusted Cloud Provider</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/certified-star-auditors/">Certified STAR Auditors</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="https://cloudsecurityalliance.my.site.com">Member Portal</a></div></div></div></div></div><hr /><div class="c-megamenu__category" data-target="#mobile-star-program-nav"><div class="c-megamenu__anchor">STAR Program</div><div class="c-megamenu__category-content" id="mobile-star-program-nav"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/">STAR Home</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/">STAR Registry</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/submit/">Submit to Registry</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/feedback/">Provide Feedback</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/certified-star-auditors/">Certified STAR Auditors</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/star-enabled-solutions/overview/">STAR Enabled Solutions</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Stay compliant in the cloud</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/ccak/">CCAK Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/star-lead-auditor-training/">STAR Lead Auditor Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/gsa-schedule/">Training for Government Agencies</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Governance, Risk & Compliance&nbsp;Tools</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/cloud-controls-matrix/">Cloud Controls Matrix (CCM)</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/cloud-controls-matrix/">Consensus Assessment Initiative Questionnaire (CAIQ)</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/gdpr/eu-cloud-code-of-conduct/">EU Cloud Code of Conduct</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/?level=1">STAR Level 1</a></div><div class="c-megamenu__item-description">At level one organizations submit a self-assessment.</div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/?level=1">View companies at level one</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/#tab_levelOne">Learn about level one</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/?level=2">STAR Level 2</a></div><div class="c-megamenu__item-description">At level two organizations earn a certification or third-party attestation.</div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/?level=2">View companies at level two</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/#tab_levelTwo">Learn about level two</a></div></div></div></div></div><hr /><div class="c-megamenu__category" data-target="#mobile-certificates-training-nav"><div class="c-megamenu__anchor">Certificates &amp; Training</div><div class="c-megamenu__category-content" id="mobile-certificates-training-nav"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Online Education Platforms</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="https://knowledge.cloudsecurityalliance.org">Knowledge Center</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="https://exams.cloudsecurityalliance.org">CSA Exams</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/events/">Events</a></div><div class="c-megamenu__item-description">Learn and network while you earn CPE credits.</div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/events/virtual-and-webinars/">Virtual Events &amp; Webinars</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/sponsor/">Event Sponsorships</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/">Certificates</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/ccsk/">Certificate of Cloud Security Knowledge (CCSK)</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/ccak/">Certificate of Cloud Auditing Knowledge (CCAK)</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/cczt/">Certificate of Competence in Zero Trust (CCZT)</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/digital-badges/">Digital Badges</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/">Trainings</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/cloud-infrastructure-security-training">Cloud Infrastructure Security Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/star-lead-auditor-training/">STAR Lead Auditor Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/advanced-cloud-security-practitioner-training">Advanced Cloud Security Practitioner (ACSP) Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/train-the-trainer/">CCSK Train the Trainer</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/partner#become_partner">Training Network</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/instructors/">Become an Instructor</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/training-partners/">Become a Training Partner</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Specialized Training Options</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/business/">Train my entire team</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/gsa-schedule/">Training for Government Agencies</a></div></div></div></div></div><hr /><div class="c-megamenu__category" data-target="#mobile-research-nav"><div class="c-megamenu__anchor">Research</div><div class="c-megamenu__category-content" id="mobile-research-nav"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/">CSA Research</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/publications">Latest Research</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/">Working Groups</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/chapters/">Chapters</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/contribute#peer-reviews">Open Peer Reviews</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/topics">Research Topics</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Strategic Initiatives</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/artificial-intelligence/">AI Safety Initiative</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/zt/">Zero Trust Advancement Center</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/cxo-trust/">CxO Trust</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/trusted-cloud-consultant/">Trusted Cloud Consultant</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/fincloud-security">FinCloud Security</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Thought Leadership</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/events/virtual-and-webinars/?event_kind=Webinar">CloudBytes Webinars</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/blog/">Blog</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Getting Started with CSA Research</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/guidance/">Cloud security best practices</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/cloud-controls-matrix/">Assess your cloud compliance</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/artifacts/star-level-1-security-questionnaire-caiq-v4/">Security questionnaire for vendors</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/top-threats/">Top threats to cloud computing</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/cloud-security-glossary">Cloud Security Glossary</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Awards & Recognition</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/juanita-koilpillai/service-award/">Juanita Koilpillai Awards</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/fellowship#fellows">Research Fellows</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Critical Topics</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/artificial-intelligence">AI Safety Initiative</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/ai-technology-and-risk">AI Technology and Risk</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/ai-governance-compliance">AI Governance &amp; Compliance</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/ai-controls">AI Controls</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/ai-organizational-responsibilities">AI Organizational Responsibilities</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/enterprise-architecture">Enterprise Architecture</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/blockchain">Blockchain</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/zero-trust">Zero Trust</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/devsecops">DevSecOps</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/top-threats">Top Threats</a></div></div></div></div></div><hr /><a class="c-megamenu__anchor" href="https://cloudsecurityalliance.org/cloud-newbie">Cloud 101</a><a class="c-megamenu__anchor" rel="noopener" target="_blank" href="https://circle.cloudsecurityalliance.org/">Circle</a><a class="c-megamenu__anchor" href="https://cloudsecurityalliance.org/events/">Events</a><a class="c-megamenu__anchor" href="https://cloudsecurityalliance.org/blog/">Blog</a><div class="u-pb16"><form class="c-megamenu__anchor" method="post" action="/auth/auth0"><button data-turbo="false" type="submit">Sign In</button><input type="hidden" name="authenticity_token" value="WD1yUE4_E1SebnjoEu3US679M_EG6q-1rVuTJcF-HoAoHAguVLeQ1L3NkJ3xbKPaDfr0aA41RvphBt9FGykQ6g" autocomplete="off" /></form></div></div></div></div></div><div class="app_notification o-area o-area--inverse u-centered u-inverse u-pt8 u-pb8 u-bg-color-blue-300" data-controller="record-link-interaction" data-record-link-interaction-action-value="click" data-record-link-interaction-interactable-id-value="308" data-record-link-interaction-interactable-type-value="AppNotification"><small class="u-text-color-white"><div class="trix-content"> <div>As a CSA Member, get access to professionally produced product demo videos through our partnership with Demo Forum. <a href="https://www.cybersymposiums.com/page/csa-program/">Learn more</a>!</div> </div> </small></div></header><main class="c-layout-main"><div class="c-container"><div class="o-container"></div></div><div class="o-area o-area--layered o-area--separated o-area--inverse"><div class="o-area__layer u-bg-color-gray-50"></div><div class="o-area__top-layer"><div class="o-container"><div class="o-grid o-grid--small-full o-grid--medium-full o-grid--large-fit"><div class="o-grid__cell o-grid__cell--width-55@medium"><h1 class="c-heading u-text-color-black">Blog</h1><h5 class="c-heading u-text-color-gray-300">Read the latest cloud security news, trends, and thought leadership from subject matter experts.</h5></div><div class="o-grid__cell"><img src="/assets/blog/blog-hero-e63b7e60455a73004d8d2ed76a22b1c22d6842342e1a00e7d9e5ec7f50f3edb0.png" /></div></div></div></div></div><div class="o-area"><div class="o-container"><div class="c-breadcrumbs"><div class="c-breadcrumbs__item"><a href="/">Home</a></div><div class="c-breadcrumbs__item">Industry Insights</div></div></div></div><div class="o-area"><div class="b-append-blog-top"></div></div><div class="o-area o-area--separated"><div class="o-container"><div class="o-grid o-grid--small-full o-grid--medium-full o-grid--large-fit o-grid--no-gutter"><div class="o-grid__cell o-grid__cell--width-65@medium"><div class="o-grid o-grid--small-full o-grid--medium-full o-grid--large-fit o-grid--no-gutter"><div class="o-grid__cell u-mb20"><form class="c-form" role="search" action="/blog" accept-charset="UTF-8" method="get"><span class="u-screen-reader">Search for:</span><div class="c-form__item-group c-form__item-group--duo c-form__item-group--actionable-right"><div class="c-form__item"><input type="text" name="search" id="search" placeholder="Search articles..." class="form-control" /></div><div class="c-form__item c-form__item--label u-centered"><button class="c-button c-button--blue"><i class="fas fa-search"></i></button></div></div></form></div></div><div class="u-separate"><div class="o-true-grid o-true-grid--two-columns"><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTEwMDgsInB1ciI6ImJsb2JfaWQifX0=--7ec0efe67281a10a4069ab717ce302ada2b4d76c/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Gatekeepers-to-Gateopeners.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--orange">Cloud Assurance</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4589_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="BWWpfVl48Eyg5bMVd6d-b-bXcuX6ArcYBP1qn9TDgpN1RNMDQ_BzzINGW2CUJgn-RdC1fPLdXlfIoCb_DpSM-Q" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">Love Letters to Compliance: Tips for Long Term Commitments</h5><div class="u-pb12"><small><strong>Published:</strong> 02/21/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/love-letters-to-compliance-tips-for-long-term-commitments"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6OTc4NSwicHVyIjoiYmxvYl9pZCJ9fQ==--b9c010f7cd3dc9aa3d67d6ad2d1b2df7862f3968/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Threat-Detection-Software-A-Deep-Dive.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--orange">Cloud Assurance</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4580_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="4xdbYZWJWZ58BNXfJTngoI7taxEUYIWJnaL7OaQRdsiTNiEfjwHaHl-nParGuJcxLeqsiBy_bMZR_7dZfkZ4og" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">How to Prepare for ISO 42001 Certification</h5><div class="u-pb12"><small><strong>Published:</strong> 02/21/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/how-to-prepare-for-iso-42001-certification"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTA4MjUsInB1ciI6ImJsb2JfaWQifX0=--bc5b6331da8d1984c11c8b27a2fb36cf13e51740/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Securing-your-cloud-transformation-journey-with-smart-cybersecurity-investments.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--teal">Future Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4586_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="ZYwVGsf4fOhTA2bBTF-b1r2c3ukqS8qqgzsLYgJndFAVrW9k3XD_aHCgjrSv3uxHHpsZcCKUI-VPZkcC2DB6Og" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">Transforming SOCs with AI: From Reactive to Proactive Security</h5><div class="u-pb12"><small><strong>Published:</strong> 02/21/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/transforming-socs-with-ai-from-reactive-to-proactive-security"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTAxODQsInB1ciI6ImJsb2JfaWQifX0=--1e295796f639bdda06bbad48a7b0f87cdefbea56/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Should-You-Monitor-Your-Cloud-Assets-Internally-or-Outsource-the-Job.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--teal">Future Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4579_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="ptwPNKF-8nVgOy2WTZj4RK2G3ikF8TuiDD13sKj0KXDW_XVKu_Zx9UOYxeOuGY_VDoEZsA0u0u3AYDvQcqMnGg" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">Simplicity is Complexity Resolved</h5><div class="u-pb12"><small><strong>Published:</strong> 02/20/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/simplicity-is-complexity-resolved"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NDc3MiwicHVyIjoiYmxvYl9pZCJ9fQ==--3b70a53bfc24ec1faddf385173eea15b7c21ee87/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Exploiting-and-detecting-CVE-2021-25735-Kubernetes-validating-admission-webhook-bypass.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--orange">Cloud Assurance</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4584_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="aem77hqlxgfpHIqrzI5G0N_KyqttahBvSsCxtfpDb7wZyMGQAC1Fh8q_Yt4vDzFBfM0NMmW1-SCGnf3VIBRh1g" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">The Explosive Growth of Generative AI: Security and Compliance Considerations</h5><div class="u-pb12"><small><strong>Published:</strong> 02/20/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/the-explosive-growth-of-generative-ai-security-and-compliance-considerations"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6OTM5NiwicHVyIjoiYmxvYl9pZCJ9fQ==--d75fe1be57a1a04ce2dd4d8a5c6c6e59b5b5a534/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Four-ways-to-use-the-Cloud-Security-Maturity-Model.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--teal">Future Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4587_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="4SULD06O6li40CMu3zSUM1IvmTkaaAdgNS2a-fbx3DmRBHFxVAZp2Jtzy1s8teOi8SheoBK37i_5cNaZLKbSUw" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">DeepSeek-R1 AI Model 11x More Likely to Generate Harmful Content, Security Research Finds</h5><div class="u-pb12"><small><strong>Published:</strong> 02/19/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/deepseek-r1-ai-model-11x-more-likely-to-generate-harmful-content-security-research-finds"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTA1NjMsInB1ciI6ImJsb2JfaWQifX0=--339c9ef5bd43306313a5364da9426518717bb71b/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Why-Every-Cybersecurity-Leader-Should-Assume-Breach.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--orange">Cloud Assurance</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4578_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="7Lj_u3hIOUX0ktelubYoNfh0jVadYTj6diIROu6cRUacmYXFYsC6xdcxP9BaN1-kW3NKz5W-0bW6f11aNMtLLA" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">Dark Patterns: Understanding Their Impact, Harm, and How the CPPA is Cracking Down</h5><div class="u-pb12"><small><strong>Published:</strong> 02/19/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/dark-patterns-understanding-their-impact-harm-and-how-the-cppa-is-cracking-down"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTA3MzgsInB1ciI6ImJsb2JfaWQifX0=--b12991a5ff3d4d52720864dca3ccdb22b7c3411b/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Best-Practices-for-Effective-Cloud-Data-Security.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--teal">Future Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4577_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="1sp-UBspDDEUZqV-MTD9Ye11UR247s_f8cU0EZAeVbWm6wQuAaGPsTfFTQvSsYrwTnKWhLAxJpA9mHhxSklb3w" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">How AI Will Change the Role of the SOC Team</h5><div class="u-pb12"><small><strong>Published:</strong> 02/19/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/how-ai-will-change-the-role-of-the-soc-team"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTAxMDcsInB1ciI6ImJsb2JfaWQifX0=--1f45a06d69bc9135cd1e5ce3d5a2be987e3208db/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Understanding-the-Updates-to-Risk-Management-in-PCI-DSS-v4_0.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--blue">Core Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4583_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="DptGU-5rxjprUTNmkuyCa8zVk4pntqsRcdZwf8AwKqV-ujwt9ONFukjy2xNxbfX6b9JUE29pQl69izwfGmckzw" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">Top Threat #10 - Who Goes There? Tackling Unauthenticated Resource Sharing</h5><div class="u-pb12"><small><strong>Published:</strong> 02/18/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/top-threat-10-who-goes-there-tackling-unauthenticated-resource-sharing"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NzYzNiwicHVyIjoiYmxvYl9pZCJ9fQ==--c920fdb30aa30c651db5f5c5dbcebe7ae01d56f2/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Your-Enterprise-Cloud-Risk-Management-Cheat-Sheet.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--orange">Cloud Assurance</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4582_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="rmhyVALPxJ_dFCiXMohS0MLT9_qvEkDwEnWYol8KBz_eSQgqGEdHH_63wOLRCSVBYdQwY6fNqb_eKNTChV0JVQ" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">What is a Virtual CISO (vCISO) and Should You Have One on Your Team?</h5><div class="u-pb12"><small><strong>Published:</strong> 02/18/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/what-is-a-virtual-ciso-vciso-and-should-you-have-one-on-your-team"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTA5MzYsInB1ciI6ImJsb2JfaWQifX0=--103419a52229c722de322e54237dc087ed7efbd3/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--73071e35a46562ab540859a1ef3adc0e9470c62a/CCM-v4_0-Implementation-Guidelines-Blog.png" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--orange">Cloud Assurance</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4585_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="ptGeoWv8HNTau2CA89JbIpx19TDg7x-vZL9F-aIC37LW8OTfcXSfVPkYiPUQUyyzP3Iyqegw9uCo4gmZeFXR2A" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">Implementing CCM: Put Together a Business Continuity Management Plan</h5><div class="u-pb12"><small><strong>Published:</strong> 02/14/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/implementing-ccm-put-together-a-business-continuity-management-plan"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6OTk3NCwicHVyIjoiYmxvYl9pZCJ9fQ==--0d4b49840d1e4a7a86a68e7d3777b1ad27237a53/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/101-Guide-on-Cloud-Security-Architecture-for-Enterprises.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--blue">Core Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4581_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="XWKbJRFqSL6NIo5J3D0saLGyeSa9wJCO_8ly_wLL5WAtQ-FbC-LLPq6BZjw_vFv5ErW-v7UfecEzlD6f2JzrCg" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">7 Steps to Get Started with Security and Privacy Engineering</h5><div class="u-pb12"><small><strong>Published:</strong> 02/14/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/7-steps-to-get-started-with-security-and-privacy-engineering"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NDUwOCwicHVyIjoiYmxvYl9pZCJ9fQ==--c67e52eb2062694c31f5f17dbd21f0d6a52d3a65/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Cloud-Native-Security-101.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--teal">Future Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4569_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="h8kmm6KeqrozlptQkekDK8xOmx8JbCyYCuWl32kC3xj36FzluBYpOhA1cyVyaHS6b0lchgGzxdfGuOm_s1XRcg" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">How Repsol’s DLP Strategy Enables a Fearless Embrace of GenAI</h5><div class="u-pb12"><small><strong>Published:</strong> 02/13/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/how-repsol-s-dlp-strategy-enables-a-fearless-embrace-of-genai"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTEwNjMsInB1ciI6ImJsb2JfaWQifX0=--6ec34805758b8137c6d9d6f9d5895824b2f63fe5/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/An-Easy-Misconfiguration-to-Make-Hidden-Dangers-in-the-Cloud-Control-Plane.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--blue">Core Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4576_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="JmLq-Jno-55v2vyd8Rab6iLXQkMYOHd3me01rb92KCVWQ5CGg2B4Hkx5FOgSl-x7gdCF2hDnnjhVsHnNZSEmTw" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">From Y2K to 2025: Evolution of the Cybersecurity and Information Security Landscape over the Past 25 Years</h5><div class="u-pb12"><small><strong>Published:</strong> 02/12/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/from-y2k-to-2025-evolution-of-the-cybersecurity-and-information-security-landscape-over-the-past-25-years"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTc3NiwicHVyIjoiYmxvYl9pZCJ9fQ==--eeabfaf0371e53d818f709ad0a1f47bbf0f64c16/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Not-All-Visibility-Is-Created-Equal-What-Are-You-Looking-For-.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--orange">Cloud Assurance</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4575_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="gnUTy-PZEvH5SmnAIhVPtSGXFA5cbjSUj0aabIZqCpLyVGm1-VGRcdrpgbXBlDgkgpDTl1Sx3dtDG9YMXD0E-A" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">5 Ways Non-Human Identity Ownership Impacts Your Security Program</h5><div class="u-pb12"><small><strong>Published:</strong> 02/12/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/5-ways-non-human-identity-ownership-impacts-your-security-program"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTE2NTgsInB1ciI6ImJsb2JfaWQifX0=--d1d540e32a0a152d79a82c408cc9d48d09846a9a/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/How-to-Secure-and-Protect-Your-Kubernetes-Cluster.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--blue">Core Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4568_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="dqMDZ_jt9bD5EJAT2dzauS8c9rCeCdSpSI8K8qhSiykGgnkZ4mV2MNqzeGY6Xa0ojBsxKZbWPeaE0kaScgWFQw" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">What's the Baseline for Cyber Resilience?</h5><div class="u-pb12"><small><strong>Published:</strong> 02/11/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/what-s-the-baseline-for-cyber-resilience"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTA4NTMsInB1ciI6ImJsb2JfaWQifX0=--95d94a14f9dc97352c8d92e4621d9bfa912bacd7/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Enabling-Pervasive-Zero-Trust.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--blue">Core Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4574_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="d9LC46XNKu3GISSsBPPcM_fsuS3qHHUwB-34GxpUtcQH87idv0WpbeWCzNnncquiVOt-tOLDnH_LsLR7wAO7rg" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">How I Used Free Tools to Resource Jack API Keys</h5><div class="u-pb12"><small><strong>Published:</strong> 02/11/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/how-i-used-free-tools-to-resource-jack-api-keys"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTA2NjUsInB1ciI6ImJsb2JfaWQifX0=--2e4a2bb4cfd96142eb921e0e6a1705df1928e275/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Threat-Activity-Cluster-3-Strawberry.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--teal">Future Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4567_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="k5Vi1j2nFwE93g0NGLWINlWYLBIgSCmaBaY0d7nqeMfjtBioJy-UgR595Xj7NP-n9p_riyiXwNXJ-3gXY712rQ" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">AI in Agriculture: Smarter Crops, Healthier Livestock, Better Yields</h5><div class="u-pb12"><small><strong>Published:</strong> 02/10/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/ai-in-agriculture-smarter-crops-healthier-livestock-better-yields"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NDkxOCwicHVyIjoiYmxvYl9pZCJ9fQ==--7870adc6a63110591799572434cbe30e9d3ef68a/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Blue-Team-Diaries-Becoming-data-smart.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--orange">Cloud Assurance</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4573_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="PNSGZXWDLnqmjGySI19dkhE1lRr9_cCzrwSd5otF4oRM9fwbbwut-oUvhOfA3ioDsjJSg_UiKfxjWdGGURLs7g" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">Master Your Disaster</h5><div class="u-pb12"><small><strong>Published:</strong> 02/10/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/master-your-disaster"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTA0MDcsInB1ciI6ImJsb2JfaWQifX0=--58a742ac9ed2a717d9dd0ae305340e59bc0d8224/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Critical-AppSec-Capabilities-that-accelerate-Cloud-Transformation.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--blue">Core Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4572_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="RMDHf7IVwWOdt-WRpFh_KlBbinyk8D6w1btwbcWibFk04b0BqJ1C474UDeRH2Qi781xN5awv1_8Z5jwNH_ViMw" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">Five Steps to Zero Trust</h5><div class="u-pb12"><small><strong>Published:</strong> 02/07/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/five-steps-to-zero-trust"></a></div></div></div></div><div class="o-grid__cell o-grid__cell--offset-5@medium"><div class="c-card c-card--exhibit"><div class="c-card__item u-bg-color-gray-25" style="position: static;"><h5 class="c-heading">Filter by Theme</h5><div class="u-pb12"><a class="c-tag c-tag--large c-tag--blue c-tag--outlined" href="https://cloudsecurityalliance.org/blog/themes/core_cloud">Core Cloud</a><span data-obscurable="true" data-obscurable-width="500" style="display: inline"><span class="c-tag c-tag--large c-tag--blue c-tag--ghost"><i class="fas fa-info-circle"></i></span><div class="b-obscured u-align-left"><div class="u-centered u-pt24 u-pl24 u-pr24"><img src="/assets/blog/core_cloud-0af9e56f31928fe8d35b4354ad4dc22fcfb074aae5528b94641d31d26af56de1.png" /><h3 class="u-pt12">Core Cloud</h3><p style="font-size: 130%;">Whether you have an established cloud security program or are starting your cloud migration, these blogs will help you <strong>enhance your cloud security strategy</strong> . Learn about cybersecurity threats, certification, and more.</p></div></div></span></div><div class="u-pb12"><a class="c-tag c-tag--large c-tag--orange c-tag--outlined" href="https://cloudsecurityalliance.org/blog/themes/cloud_assurance">Cloud Assurance</a><span data-obscurable="true" data-obscurable-width="500" style="display: inline"><span class="c-tag c-tag--large c-tag--orange c-tag--ghost"><i class="fas fa-info-circle"></i></span><div class="b-obscured u-align-left"><div class="u-centered u-pt24 u-pl24 u-pr24"><img src="/assets/blog/cloud_assurance-0e2ec5c7e9c553677900f4c5c7c963959220b4618f8d4e57147871d61a5ebe65.png" /><h3 class="u-pt12">Cloud Assurance</h3><p style="font-size: 130%;"><strong>Improve the security and compliance posture</strong> of your organization and leverage the controls inside of cloud assurance. Gain the guidance and tools to build your own cloud assurance ecosystem.</p></div></div></span></div><div class="u-pb12"><a class="c-tag c-tag--large c-tag--teal c-tag--outlined" href="https://cloudsecurityalliance.org/blog/themes/future_cloud">Future Cloud</a><span data-obscurable="true" data-obscurable-width="500" style="display: inline"><span class="c-tag c-tag--large c-tag--teal c-tag--ghost"><i class="fas fa-info-circle"></i></span><div class="b-obscured u-align-left"><div class="u-centered u-pt24 u-pl24 u-pr24"><img src="/assets/blog/future_cloud-4aec67fc25f70b98664a1999c96a352426cc0a0b1c74c0c4fff0b1c73c723ae8.png" /><h3 class="u-pt12">Future Cloud</h3><p style="font-size: 130%;">Leverage CSA to help your organization <strong>solve tomorrow's problems today</strong>. Explore innovative technologies and strategies through the topics of Zero Trust, Quantum, and more.</p></div></div></span></div><div class="u-pb8"><small><a href="/blog">Reset all filters</a></small></div></div><div class="c-card__item u-bg-color-gray-25"><h5 class="c-heading u-pt8" style="border-top: solid 1px #DEE6F0;">Browse by Topic</h5><div class="c-form"><div class="c-form__item-group c-form__item-group--duo"><div class="c-form__item"><select name="terms" id="terms"><option value=""> - Select Topic - </option><option value="/blog/terms/ai-top-news/">AI Top News</option> <option value="/blog/terms/application-containers-and-microservices/">Application Containers and Microservices</option> <option value="/blog/terms/artificial-intelligence/">Artificial Intelligence</option> <option value="/blog/terms/aws/">AWS</option> <option value="/blog/terms/azure/">Azure</option> <option value="/blog/terms/big-data/">Big Data</option> <option value="/blog/terms/blockchain-distributed-ledger/">Blockchain/Distributed Ledger</option> <option value="/blog/terms/caiq/">CAIQ</option> <option value="/blog/terms/casb/">CASB </option> <option value="/blog/terms/ccak/">CCAK</option> <option value="/blog/terms/ccsk/">CCSK</option> <option value="/blog/terms/cczt/">CCZT</option> <option value="/blog/terms/c-level/">C-Level</option> <option value="/blog/terms/cloud-component-specification/">Cloud Component Specifications</option> <option value="/blog/terms/cloud-controls-matrix/">Cloud Controls Matrix</option> <option value="/blog/terms/cloud-experience/">Cloud Experience</option> <option value="/blog/terms/cloud-incident-response/">Cloud Incident Response</option> <option value="/blog/terms/cloud-key-management/">Cloud Key Management</option> <option value="/blog/terms/cloud-security-services-management/">Cloud Security Services Management</option> <option value="/blog/terms/cve/">Common Vulnerability and Exposures </option> <option value="/blog/terms/compliance/">Compliance</option> <option value="/blog/terms/confidential-computing/">Confidential Computing</option> <option value="/blog/terms/consensus-assessments/">Consensus Assessments</option> <option value="/blog/terms/continuous-assurance-metrics/">Continuous Assurance Metrics</option> <option value="/blog/terms/cxo/">CxO</option> <option value="/blog/terms/cyber-incident-sharing/">Cyber Incident Sharing</option> <option value="/blog/terms/data-security/">Data Security</option> <option value="/blog/terms/devsecops/">DevSecOps</option> <option value="/blog/terms/enhancing-cloud-security-strategy/">Enhancing cloud security strategy</option> <option value="/blog/terms/enterprise-architecture/">Enterprise Architecture</option> <option value="/blog/terms/enterprise-resource-planning/">Enterprise Resource Planning</option> <option value="/blog/terms/events/">Events</option> <option value="/blog/terms/fedramp/">FedRAMP</option> <option value="/blog/terms/financial-services/">Financial Services</option> <option value="/blog/terms/gdpr/">GDPR</option> <option value="/blog/terms/health-information-management/">Health Information Management</option> <option value="/blog/terms/high-performance-computing/">High Performance Computing</option> <option value="/blog/terms/hybrid-cloud-security/">Hybrid Cloud Security</option> <option value="/blog/terms/identity-and-access-management/">Identity and Access Management</option> <option value="/blog/terms/industrial-control-systems/">Industrial Control Systems</option> <option value="/blog/terms/industry/">Industry</option> <option value="/blog/terms/innovating-from-the-cloud/">Innovating from the cloud </option> <option value="/blog/terms/internet-of-things/">Internet of Things</option> <option value="/blog/terms/legal/">Legal</option> <option value="/blog/terms/misconfiguration/">Misconfiguration</option> <option value="/blog/terms/mobile-application-security-testing/">Mobile Application Security Testing</option> <option value="/blog/terms/open-api/">Open API</option> <option value="/blog/terms/open-certification-framework/">Open Certification Framework</option> <option value="/blog/terms/operational/">Operational</option> <option value="/blog/terms/oracle-cloud-infrastructure/">Oracle Cloud Infrastructure</option> <option value="/blog/terms/penetration-testing/">Penetration Testing</option> <option value="/blog/terms/privacy/">Privacy</option> <option value="/blog/terms/privacy-level-agreement/">Privacy Level Agreement</option> <option value="/blog/terms/quantum-safe-security/">Quantum-Safe Security</option> <option value="/blog/terms/ransomware/">Ransomware</option> <option value="/blog/terms/remote-workforce-security/">Remote Workforce Security</option> <option value="/blog/terms/risk-management/">Risk Management</option> <option value="/blog/terms/saas-governance/">SaaS Governance</option> <option value="/blog/terms/sectember/">SECtember</option> <option value="/blog/terms/security-as-a-service/">Security as a Service</option> <option value="/blog/terms/security-guidance/">Security Guidance</option> <option value="/blog/terms/serverless/">Serverless</option> <option value="/blog/terms/shared-responsibility-model/">Shared Responsibility Model</option> <option value="/blog/terms/software-defined-perimeter/">Software Defined Perimeter</option> <option value="/blog/terms/standards/">Standards</option> <option value="/blog/terms/star/">STAR</option> <option value="/blog/terms/startups/">Startups</option> <option value="/blog/terms/strategic/">Strategic</option> <option value="/blog/terms/surveys/">Surveys</option> <option value="/blog/terms/tactical/">Tactical</option> <option value="/blog/terms/threat-intelligence/">Threat Intelligence</option> <option value="/blog/terms/top-threats/">Top Threats</option> <option value="/blog/terms/training/">Training</option> <option value="/blog/terms/transitioning-to-the-cloud/">Transitioning to the cloud</option> <option value="/blog/terms/virtualization/">Virtualization</option> <option value="/blog/terms/vulnerabilities/">Vulnerabilities</option> <option value="/blog/terms/vulnerability-data/">Vulnerability Data</option> <option value="/blog/terms/working-group/">Working Group</option> <option value="/blog/terms/zero-trust/">Zero Trust</option></select></div></div></div></div></div><div class="c-card c-card--exhibit"><div class="c-card__item u-bg-color-gray-25"><h5 class="c-heading">Latest from CSA</h5><a href="https://cvent.me/lA2MBa?utm_source=launch&amp;utm_campaign=launch&amp;utm_medium=website"><div class="o-grid u-pt12"><div class="o-grid__cell o-grid__cell--width-40 o-grid__cell--no-gutter"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6Mzk2NjAsInB1ciI6ImJsb2JfaWQifX0=--ff01093c6a10823bccf95b0c25d5f1c78a005409/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJyZXNpemVfdG9fbGltaXQiOlsxMzIsOTldfSwicHVyIjoidmFyaWF0aW9uIn19--1c3631b2c4e5d2a9f120d3fbdaa1517964193ad5/FinCloud-Security-Summit-2025-800x600-latest-news.png" /></div><div class="o-grid__cell"><h6>Register for the Virtual FinCloud Security Summit </h6></div></div></a><a href="https://series.brighttalk.com/series/6980/"><div class="o-grid u-pt12"><div class="o-grid__cell o-grid__cell--width-40 o-grid__cell--no-gutter"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6Mzk3NDksInB1ciI6ImJsb2JfaWQifX0=--719cfb55ecdb523a86b6dac74631c2a8874c235b/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJyZXNpemVfdG9fbGltaXQiOlsxMzIsOTldfSwicHVyIjoidmFyaWF0aW9uIn19--1c3631b2c4e5d2a9f120d3fbdaa1517964193ad5/CCM-video-series-800x600.png" /></div><div class="o-grid__cell"><h6>Watch the CCM Video Series</h6></div></div></a><a href="https://www.profabula.com/training-purchase"><div class="o-grid u-pt12"><div class="o-grid__cell o-grid__cell--width-40 o-grid__cell--no-gutter"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6Mzk3MjYsInB1ciI6ImJsb2JfaWQifX0=--9e16242779c655f045c7fdb4527fe442edf57d0e/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJyZXNpemVfdG9fbGltaXQiOlsxMzIsOTldfSwicHVyIjoidmFyaWF0aW9uIn19--1c3631b2c4e5d2a9f120d3fbdaa1517964193ad5/CCZT%20Training%20Partner%20-%20Profabula%20800x600%20latest%20news.png" /></div><div class="o-grid__cell"><h6>Sign Up for CCZT Classes on the West Coast</h6></div></div></a></div></div><div class="u-pt24"><form data-turbo="false" action="/ads/dfovoajyzb706d18kg3zvn3b" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="dS5tAspUsFKJDmWw5Ks2kyl5-6t6Bxo78LVip3HsVeFWQtzDr6YNzmS6vo7N6Wqlwl9V57tKVymT95sTbThVcA" autocomplete="off" /><button class="ad-display"><img src="https://cloudsecurityalliance.org/rails/active_storage/blobs/redirect/eyJfcmFpbHMiOnsiZGF0YSI6Mzk1NDksInB1ciI6ImJsb2JfaWQifX0=--fc20544507efbf9f719063feffffbddba32dc742/CCM%20Implementation%20Videos%20campaign%20blog%20ad.png" /></button></form><form data-turbo="false" action="/ads/6tfg9sye4vc1qj27sijkt9sc" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="_kQClg74vloztoxf8mKzwvm3yQfC6t8KnLwvs-Y3om4xs2GBHFVsVzXLH4FsJQr1B_I30YaFxbawI2vMDW7wqw" autocomplete="off" /><button class="ad-display"><img src="https://cloudsecurityalliance.org/rails/active_storage/blobs/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MzkzMTYsInB1ciI6ImJsb2JfaWQifX0=--75ece90b5ad343ef66530d835cacacc8699bd43e/ZS-REv-CSAAd-DORAandBeyond-800x600-01%5B39%5D.jpg" /></button></form></div></div></div></div></div><div class="o-area"><div class="o-container u-mb32"><div class="c-pagination c-pagination--centered"><div class="c-pagination__item c-pagination__item--active"><a href="#">1</a></div><div class="c-pagination__item"><a rel="next" href="/blog?page=2">2</a></div><div class="c-pagination__item"><a href="/blog?page=3">3</a></div><div class="c-pagination__item"><a href="/blog?page=4">4</a></div><div class="c-pagination__item"><a href="/blog?page=5">5</a></div><div class="c-pagination__item c-pagination__item--disabled"><a href="#">…</a></div><div class="c-pagination__item"><a rel="next" href="/blog?page=2">Next ›</a></div><div class="c-pagination__item"><a href="/blog?page=162">Last »</a></div></div></div></div><script>(function() { $(function() { return $("#terms").change(function() { return window.location.href = $(this).val(); }); }); }).call(this); </script></main><footer class="c-layout-footer"><div class="o-area"><div class="cookie-banner" style="display: block;"><div data-controller="dynamic-content"><div class="c-notification c-notification--info" id="cookie-banner-main"><div class="c-notification__item c-notification__item--icon"><div class="fas fa-info-circle"></div></div><div class="c-notification__item"><p><strong>We value your privacy.</strong> <span>Our website uses analytics and advertising cookies to improve your browsing experience. Read our full</span> <a href="/legal/privacy-notice/">Privacy Policy</a><span>.</span></p><div class="c-button-group c-button-group--centered u-mb16"><a class="c-button c-button--gray" data-action="click-&gt;dynamic-content#update" data-dynamic-content-hide-param="#cookie-banner-main" data-dynamic-content-show-param="#cookie-banner-customize" href="#">Customize</a><a class="c-button c-button--blue" id="cookie-banner-accept-all" data-action="cookie-consent#acceptAll" data-controller="cookie-consent" href="#">Allow</a></div></div></div><div class="c-notification c-notification--info" id="cookie-banner-customize" style="display: none;"><div class="c-notification__item c-notification__item--icon"><div class="fas fa-info-circle"></div></div><div class="c-notification__item"><p class="u-pt12" style="line-height: 1.3em; font-size: 1.2em;"><strong>About the Cookies</strong></p><form class="c-form" data-action="cookie-consent#update" data-controller="cookie-consent" action="/blog" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="QjNv9TnfsCXiKi_kyG-TEi8fC5Ekc8y27dC3ZqqzBTRCSyh5sqsSxxnmB7zJ38r-NXDI8BOEE0FmPjSBGXpTJw" autocomplete="off" /><p><strong>Analytics cookies,</strong> from <a target="_blank" href="https://analytics.google.com/">Google Analytics</a> and <a target="_blank" href="https://clarity.microsoft.com/">Microsoft Clarity</a> help us analyze site usage to continuously improve our website.</p><div class="c-form__item-group c-form__item-group--duo c-form__item-group--checkbox--big"><div class="c-form__item"><input id="analytics" type="checkbox" value="1" checked="checked" name="analytics" /></div><div class="c-form__item c-form__item--label"><label for="analytics">Enable cookies for analytics.</label></div></div><p class="u-pt12"><strong>Advertising cookies,</strong> enable <a target="_blank" href="https://policies.google.com/privacy">Google</a> to collect information to display content and ads tailored to your interests.</p><div class="c-form__item-group c-form__item-group--duo c-form__item-group--checkbox--big"><div class="c-form__item"><input id="advertising" type="checkbox" value="1" checked="checked" name="advertising" /></div><div class="c-form__item c-form__item--label"><label for="advertising">Enable cookies for advertising.</label></div></div><div class="c-button-group c-button-group--centered u-mb16 u-mt16"><a class="c-button c-button--gray" id="cookie-banner-reject-all" data-action="cookie-consent#rejectAll" data-controller="cookie-consent" href="#">Decline All</a><input type="submit" name="commit" value="Confirm" class="c-button c-button--blue" data-disable-with="Confirm" /></div></form></div></div></div></div><div class="c-footer"><div class="o-container"><div class="o-grid o-grid--small-full o-grid--medium-full o-grid--large-fit"><div class="c-footer__item o-grid__cell o-grid__cell--width-30@medium u-align-left"><div class="c-footer__logo u-separate"><img src="/assets/csa-logo-white-33c6ce89081b4488f9fe480c8e4f5e662f8a9723e5467d30359ff832c269b7d6.png" /></div><p class="u-separate"><a class="c-button c-button--social-circle c-button--linkedin" target="_blank" rel="noopener" href="https://www.linkedin.com/groups/1864210/profile"><img src="/assets/social-share/li-icon-09fa81c48d4329077ed9608610eb94677c1598373b57333973e931874e641c30.svg" /></a><a class="c-button c-button--social-circle c-button--twitter" target="_blank" rel="noopener" href="https://twitter.com/intent/tweet?text=&amp;url="><img src="/assets/social-share/x-icon-d5737d8484c6d1c6b2c18ad43c18037db1925464c40f14899cdfdb82fe33a861.svg" /></a><a class="c-button c-button--social-circle c-button--facebook" target="_blank" rel="noopener" href="https://www.facebook.com/csacloudfiles"><img src="/assets/social-share/fb-icon-c0307da13019b8e4ef32e5f2e7039eac01c272bcbc2c3a7aad4ba033c0a27153.svg" /></a><a class="c-button c-button--social-circle c-button--youtube" target="_blank" rel="noopener" href="https://www.youtube.com/channel/UCrcG6ZtsBPz3xkUZU6asVhA"><img src="/assets/social-share/yt-icon-ade320bf2b6ffeae084895dac740b736c7dda9f181a871260f83da2462465ab3.svg" /></a><p class="u-separate"><span>© 2009–</span><span>2025</span> <span>Cloud Security Alliance.</span><br /><span>All rights reserved.</span></p></p></div><div class="c-footer__item o-grid__cell"><div class="o-grid o-grid--small-full o-grid--medium-full o-grid--large-fit"><div class="o-grid__cell"><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/membership/">Corporate Membership</a></h6><a href="https://cloudsecurityalliance.org/membership/enterprises/">Cloud Customers</a><a href="https://cloudsecurityalliance.org/membership/solution-providers/">Cloud Solution Providers</a></div><div class="c-footer__list"><h6><a href="https://circle.cloudsecurityalliance.org/home">Join as an Individual</a></h6><a href="https://cloudsecurityalliance.org/circle/">Circle Community Forum</a><a href="https://cloudsecurityalliance.org/chapters/">Chapters</a><a href="https://cloudsecurityalliance.org/research/working-groups/">Working Groups</a></div><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/research/">Research</a></h6><a href="https://cloudsecurityalliance.org/research/artifacts/">Download Publications</a><a href="https://cloudsecurityalliance.org/research/working-groups/">View Working Groups</a><a href="https://cloudsecurityalliance.org/research/topics">View All Topics</a></div><div class="c-footer__list"><h6><span>Find a...</span></h6><a href="https://cloudsecurityalliance.org/trusted-cloud-consultant">Cloud Consultant</a><a data-turbo="false" href="https://cloudsecurityalliance.org/star/registry/">Cloud Service Provider</a><a href="https://cloudsecurityalliance.org/trusted-cloud-provider">Trusted Cloud Provider</a></div></div><div class="o-grid__cell"><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/education/">Certificates</a></h6><a href="https://cloudsecurityalliance.org/education/ccsk/">CCSK</a><a href="https://cloudsecurityalliance.org/education/ccak/">CCAK</a><a href="https://cloudsecurityalliance.org/education/cczt/">CCZT</a></div><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/events/">Events</a></h6><a href="https://cloudsecurityalliance.org/events/americas">Americas</a><a href="https://cloudsecurityalliance.org/events/emea/">EMEA</a><a href="https://cloudsecurityalliance.org/events/apac/">APAC</a></div><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/education/">Education</a></h6><a href="https://cloudsecurityalliance.org/blog/">Blog</a><a data-turbo="false" href="https://cloudsecurityalliance.org/events/virtual-and-webinars/">Virtual Events &amp; Webinars</a><a href="https://cloudsecurityalliance.org/education/">Training</a><a href="https://cloudsecurityalliance.org/cloud-newbie">Cloud 101</a></div><div class="c-footer__list"><h6><span>Popular Resources</span></h6><a href="https://cloudsecurityalliance.org/research/guidance/">Security Guidance</a><a href="https://cloudsecurityalliance.org/research/cloud-controls-matrix/">CCM</a><a href="https://cloudsecurityalliance.org/research/cloud-controls-matrix/">CAIQ</a><a href="https://cloudsecurityalliance.org/star/">STAR</a><a href="https://cloudsecurityalliance.org/privacy/gdpr/">GDPR</a></div></div><div class="o-grid__cell"><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/about/">About CSA</a></h6><a href="https://cloudsecurityalliance.org/contact/">Contact Us</a><a href="https://cloudsecurityalliance.org/press-releases/">Press Releases</a><a href="https://cloudsecurityalliance.org/membership/current-affiliates/">Affiliates</a><a href="https://cloudsecurityalliance.org/press-coverage/">Press Coverage</a><a href="https://cloudsecurityalliance.org/quality-policy/">Quality Policy</a></div><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/about/csa-staff/">Our Team</a></h6><a data-turbo="false" href="https://cloudsecurityalliance.org/about/board-of-directors/">Board of Directors</a><a data-turbo="false" href="https://cloudsecurityalliance.org/about/csa-staff/">Management &amp; Staff</a><a href="https://cloudsecurityalliance.org/about/careers">Careers</a></div><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/legal/">Legal</a></h6><a href="https://cloudsecurityalliance.org/legal/privacy-notice/">Privacy Notice</a><a href="https://cloudsecurityalliance.org/legal/website-terms-and-conditions/">Terms &amp; Conditions</a></div><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/cloud-security-glossary/">Cloud Security Glossary</a></h6></div></div></div></div></div></div></div><div class="u-scroll-to-top"><span class="c-button c-button--primary c-button--elevated">&utrif;</span></div></div></footer><div class="c-modal"><div class="c-modal__content"></div><span class="c-modal__close-button"></span></div> <script id="ze-snippet" src="https://static.zdassets.com/ekr/snippet.js?key=2121b371-8db3-4beb-8ca2-5e994ec5fb73"></script> <script type="text/javascript"> var isDesktop = true; // device detection if(/(android|bb\d+|meego).+mobile|avantgo|bada\/|blackberry|blazer|compal|elaine|fennec|hiptop|iemobile|ip(hone|od)|ipad|iris|kindle|Android|Silk|lge |maemo|midp|mmp|netfront|opera m(ob|in)i|palm( os)?|phone|p(ixi|re)\/|plucker|pocket|psp|series(4|6)0|symbian|treo|up\.(browser|link)|vodafone|wap|windows (ce|phone)|xda|xiino/i.test(navigator.userAgent) || /1207|6310|6590|3gso|4thp|50[1-6]i|770s|802s|a wa|abac|ac(er|oo|s\-)|ai(ko|rn)|al(av|ca|co)|amoi|an(ex|ny|yw)|aptu|ar(ch|go)|as(te|us)|attw|au(di|\-m|r |s )|avan|be(ck|ll|nq)|bi(lb|rd)|bl(ac|az)|br(e|v)w|bumb|bw\-(n|u)|c55\/|capi|ccwa|cdm\-|cell|chtm|cldc|cmd\-|co(mp|nd)|craw|da(it|ll|ng)|dbte|dc\-s|devi|dica|dmob|do(c|p)o|ds(12|\-d)|el(49|ai)|em(l2|ul)|er(ic|k0)|esl8|ez([4-7]0|os|wa|ze)|fetc|fly(\-|_)|g1 u|g560|gene|gf\-5|g\-mo|go(\.w|od)|gr(ad|un)|haie|hcit|hd\-(m|p|t)|hei\-|hi(pt|ta)|hp( i|ip)|hs\-c|ht(c(\-| |_|a|g|p|s|t)|tp)|hu(aw|tc)|i\-(20|go|ma)|i230|iac( |\-|\/)|ibro|idea|ig01|ikom|im1k|inno|ipaq|iris|ja(t|v)a|jbro|jemu|jigs|kddi|keji|kgt( |\/)|klon|kpt |kwc\-|kyo(c|k)|le(no|xi)|lg( g|\/(k|l|u)|50|54|\-[a-w])|libw|lynx|m1\-w|m3ga|m50\/|ma(te|ui|xo)|mc(01|21|ca)|m\-cr|me(rc|ri)|mi(o8|oa|ts)|mmef|mo(01|02|bi|de|do|t(\-| |o|v)|zz)|mt(50|p1|v )|mwbp|mywa|n10[0-2]|n20[2-3]|n30(0|2)|n50(0|2|5)|n7(0(0|1)|10)|ne((c|m)\-|on|tf|wf|wg|wt)|nok(6|i)|nzph|o2im|op(ti|wv)|oran|owg1|p800|pan(a|d|t)|pdxg|pg(13|\-([1-8]|c))|phil|pire|pl(ay|uc)|pn\-2|po(ck|rt|se)|prox|psio|pt\-g|qa\-a|qc(07|12|21|32|60|\-[2-7]|i\-)|qtek|r380|r600|raks|rim9|ro(ve|zo)|s55\/|sa(ge|ma|mm|ms|ny|va)|sc(01|h\-|oo|p\-)|sdk\/|se(c(\-|0|1)|47|mc|nd|ri)|sgh\-|shar|sie(\-|m)|sk\-0|sl(45|id)|sm(al|ar|b3|it|t5)|so(ft|ny)|sp(01|h\-|v\-|v )|sy(01|mb)|t2(18|50)|t6(00|10|18)|ta(gt|lk)|tcl\-|tdg\-|tel(i|m)|tim\-|t\-mo|to(pl|sh)|ts(70|m\-|m3|m5)|tx\-9|up(\.b|g1|si)|utst|v400|v750|veri|vi(rg|te)|vk(40|5[0-3]|\-v)|vm40|voda|vulc|vx(52|53|60|61|70|80|81|83|85|98)|w3c(\-| )|webc|whit|wi(g |nc|nw)|wmlb|wonu|x700|yas\-|your|zeto|zte\-/i.test(navigator.userAgent.substr(0,4))) { isDesktop = false; } window.zESettings = { webWidget: { color: { launcherText: '#FFFFFF' } } }; var customizeWidget = function () { // Dodge Recaptcha when it also exists on the page if (typeof grecaptcha !== 'undefined') { $('#launcher').animate({'margin-right': '80px'}); }; }; setTimeout(customizeWidget, 2000); </script> </body></html>

Pages: 1 2 3 4 5 6 7 8 9 10