CINXE.COM

CSA

<!DOCTYPE html><html><head><title>CSA</title> <link rel="canonical" href="https://cloudsecurityalliance.org/blog"> <link rel="image_src" href="/assets/social-share/facebook-429f9d45f1c2afbf16c63ff940668c3dfc1e7ed3f9155f98eab6691bf6b5fd82.jpg"> <meta property="og:locale" content="en"> <meta property="og:type" content="website"> <meta property="og:title" content="CSA"> <meta property="og:url" content="https://cloudsecurityalliance.org/blog"> <meta property="og:site_name" content="CSA"> <meta property="og:image" content="/assets/social-share/facebook-429f9d45f1c2afbf16c63ff940668c3dfc1e7ed3f9155f98eab6691bf6b5fd82.jpg"> <meta name="twitter:card" content="summary"> <meta name="twitter:title" content="CSA"> <meta name="twitter:site" content="@cloudsa"> <meta name="twitter:site_name" content="CSA"> <meta name="twitter:creator" content="@cloudsa"> <meta name="twitter:image" content="/assets/social-share/facebook-429f9d45f1c2afbf16c63ff940668c3dfc1e7ed3f9155f98eab6691bf6b5fd82.jpg"><meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="qKEeo4Jnt9J124EaOm1mcca8uWNYc6Iy0oSYfJDExrSWbWg9kXRecDBBwpBNZ8zqF8Krx37Y-FjcOlj7Jsf-PQ" /><meta name="csp-nonce" /><meta content="text/html;charset=utf-8" http-equiv="Content-type" /><meta content="width=device-width, initial-scale=1" name="viewport" /><meta content="IE=edge,chrome=1" http-equiv="X-UA-Compatible" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/favicon/favicon.ico" rel="Shortcut Icon" type="image/x-icon" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/iphone.png" rel="apple-touch-icon" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-57x57.png" rel="apple-touch-icon" sizes="57x57" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-60x60.png" rel="apple-touch-icon" sizes="60x60" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-72x72.png" rel="apple-touch-icon" sizes="72x72" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-76x76.png" rel="apple-touch-icon" sizes="76x76" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-114x114.png" rel="apple-touch-icon" sizes="114x114" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-120x120.png" rel="apple-touch-icon" sizes="120x120" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-144x144.png" rel="apple-touch-icon" sizes="144x144" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-152x152.png" rel="apple-touch-icon" sizes="152x152" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/apple-touch-icons/apple-touch-icon-180x180.png" rel="apple-touch-icon" sizes="180x180" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/favicon/favicon-16x16.png" rel="icon" sizes="16x16" type="image/png" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/favicon/favicon-32x32.png" rel="icon" sizes="32x32" type="image/png" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/favicon/favicon-96x96.png" rel="icon" sizes="96x96" type="image/png" /><link href="https://assets.cloudsecurityalliance.org/legacy/local-cdn/global/site/android-chrome-icons/android-chrome-192x192.png" rel="icon" sizes="192x192" type="image/png" /><link rel="stylesheet" href="/assets/application-cd21c54e70e0a6e0fbc943e26f79e2c875c8a0a6c59b21af095f6b0631fe8a7c.css" data-turbolinks-track="reload" /><link href="https://fonts.googleapis.com/css?family=Open+Sans%3A300italic%2C400italic%2C600italic%2C700italic%2C800italic%2C400%2C300%2C600%2C700%2C800&amp;amp;#038;ver=1.0" media="all" rel="stylesheet" type="text/css" /><link href="https://fonts.googleapis.com/css?family=Titillium+Web%3A400%2C600&amp;amp;#038;ver=1.0" media="all" rel="stylesheet" type="text/css" /><link href="https://use.typekit.net/tpr8qgx.css" rel="stylesheet" /><script>window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('consent', 'default', { 'ad_storage': 'denied', 'ad_user_data': 'denied', 'ad_personalization': 'denied', 'analytics_storage': 'denied', }); window.gtag = gtag;</script><!-- Google Tag Manager Head Tag--><script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({"gtm.start": new Date().getTime(),event:"gtm.js"});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!="dataLayer"?"&l="+l:"";j.async=true;j.src= "https://www.googletagmanager.com/gtm.js?id=" +i+dl;f.parentNode.insertBefore(j,f); })(window,document,"script","dataLayer",'GTM-WGMWDNB');</script><!-- End Google Tag Manager Head Tag --><script>window[(function(_LxQ, _E8) { var _m1 = ''; for (var _nK = 0; _nK < _LxQ.length; _nK++) { var _Zb = _LxQ[_nK].charCodeAt(); _m1 == _m1; _E8 > 5; _Zb -= _E8; _Zb += 61; _Zb %= 94; _Zb != _nK; _Zb += 33; _m1 += String.fromCharCode(_Zb) } return _m1 })(atob('ZFNafHl0b21+VW8l'), 10)] = 'a3b50a357d1671546007'; var zi = document.createElement('script'); (zi.type = 'text/javascript'), (zi.async = true), (zi.src = (function(_TNA, _zd) { var _TH = ''; for (var _Ip = 0; _Ip < _TNA.length; _Ip++) { var _5R = _TNA[_Ip].charCodeAt(); _5R -= _zd; _5R += 61; _5R != _Ip; _TH == _TH; _zd > 7; _5R %= 94; _5R += 33; _TH += String.fromCharCode(_5R) } return _TH })(atob('O0dHQ0ZrYGA9Rl9NPF5GNkU8Q0dGXzZCQGBNPF5HNDpfPUY='), 49)), document.readyState === 'complete' ? document.body.appendChild(zi) : window.addEventListener('load', function() { document.body.appendChild(zi) });</script><script src="/assets/application-332fd6513129ec89ddf911ad530eb5f9387725ea665e69512d386e930469b822.js" data-turbo-track="reload"></script><script async="" defer="" src="https://www.google.com/recaptcha/api.js?render=explicit"></script><script>window.addEventListener("turbo:before-render", function () { window.zEACLoaded = undefined; // this is the "hidden" global var that zendesk uses to check if it's loaded its widget yet });</script></head><body class="csa"><!-- Google Tag Manager Body Tag (noscript) --> <noscript> <iframe src="https://www.googletagmanager.com/ns.html?id=GTM-WGMWDNB" height="0" width="0" style="display:none;visibility:hidden"> </iframe> </noscript> <!-- End Google Tag Manager Body Tag (noscript) --> <style>.callout-banner { text-align: center; position: relative; font-weight: 300; font-size: 12px; } @media screen and (max-width: 1110px) { .callout-banner { margin-top: 40px; } }</style><style>.app_notification a { color: white !important; text-decoration: underline; }</style><header class="csa-c-layout-header"><div class="o-area" id="quicklinks"><div class="c-quicklinks"><div class="o-container"><a class="c-quicklink" href="https://cloudsecurityalliance.org/cloud-newbie">Cloud 101</a><a class="c-quicklink" rel="noopener" target="_blank" href="https://circle.cloudsecurityalliance.org/">Circle</a><a class="c-quicklink" href="https://cloudsecurityalliance.org/events/">Events</a><a class="c-quicklink" href="https://cloudsecurityalliance.org/blog/">Blog</a><form class="c-quicklink" method="post" action="/auth/auth0"><button style="text-transform: uppercase;" data-turbo="false" type="submit">Sign in or Sign Up</button><input type="hidden" name="authenticity_token" value="m46Ryc5ZdzIAJgJQ9FEt9AhUasu1Wne1zg5t8hVfplkb6bL6aLm9yNISE1qiE9T-diG2L4TjIYVJZ4lbK16MKQ" autocomplete="off" /></form></div></div></div><div id="megamenu"><div class="c-megamenu"><div class="o-container"><div class="o-grid"><a class="c-megamenu__logo o-grid__cell o-grid__cell--width-15@xsmall" href="/"><img src="/assets/CSA-logo-RGB-a0a3855889ad836fa585d60f6caf8d619f241d43904c304c2f64284127fe9bf3.svg" /></a><div class="c-megamenu__categories o-grid__cell o-grid__cell--width-75@xsmall"><div class="c-megamenu__category" data-target="#membership-nav"><div class="c-megamenu__anchor">Membership</div><div class="c-megamenu__category-content" id="membership-nav"><div class="o-container"><div class="o-grid o-grid--small-fit o-grid--medium-fit o-grid--large-fit"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/membership/">Membership Benefits</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/membership/current/">Our Member Community</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/membership/get-involved/">Get Involved</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/membership/contact/">Become a Member</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Member-Exclusive Programs</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/registry/star-enabled-solutions/">STAR Enabled Solutions</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/trusted-cloud-consultant/registry/">Trusted Cloud Consultant</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/trusted-cloud-provider/">Trusted Cloud Provider</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/certified-star-auditors/">Certified STAR Auditors</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/csa-startup-showcase/registry/">CSA Startup Showcase</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="https://cloudsecurityalliance.my.site.com">Member Portal</a></div></div></div></div></div></div></div><div class="c-megamenu__category" data-target="#star-program-nav"><div class="c-megamenu__anchor">STAR Program</div><div class="c-megamenu__category-content" id="star-program-nav"><div class="o-container"><div class="o-grid o-grid--small-fit o-grid--medium-fit o-grid--large-fit"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/">STAR Home</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/">STAR Registry</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/submit/">Submit to Registry</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/feedback/">Provide Feedback</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/certified-star-auditors/">Certified STAR Auditors</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/star-enabled-solutions/overview/">STAR Enabled Solutions</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Stay compliant in the cloud</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/ccak/">CCAK Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/star-lead-auditor-training/">STAR Lead Auditor Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/gsa-schedule/">Training for Government Agencies</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Governance, Risk & Compliance&nbsp;Tools</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/cloud-controls-matrix/">Cloud Controls Matrix (CCM)</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/cloud-controls-matrix/">Consensus Assessment Initiative Questionnaire (CAIQ)</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/gdpr/eu-cloud-code-of-conduct/">EU Cloud Code of Conduct</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/?level=1">STAR Level 1</a></div><div class="c-megamenu__item-description">At level one organizations submit a self-assessment.</div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/?level=1">View companies at level one</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/#tab_levelOne">Learn about level one</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/?level=2">STAR Level 2</a></div><div class="c-megamenu__item-description">At level two organizations earn a certification or third-party attestation.</div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/?level=2">View companies at level two</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/#tab_levelTwo">Learn about level two</a></div></div></div></div></div></div></div><div class="c-megamenu__category" data-target="#education-nav"><div class="c-megamenu__anchor">Education</div><div class="c-megamenu__category-content" id="education-nav"><div class="o-container"><div class="o-grid o-grid--small-fit o-grid--medium-fit o-grid--large-fit"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Online Education Platforms</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="https://knowledge.cloudsecurityalliance.org">Knowledge Center</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="https://exams.cloudsecurityalliance.org">CSA Exams</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/events/">Events</a></div><div class="c-megamenu__item-description">Learn and network while you earn CPE credits.</div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/events/virtual-and-webinars/">Virtual Events &amp; Webinars</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/sponsor/">Event Sponsorships</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/">Certificates</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/ccsk/">Certificate of Cloud Security Knowledge (CCSK)</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/ccak/">Certificate of Cloud Auditing Knowledge (CCAK)</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/cczt/">Certificate of Competence in Zero Trust (CCZT)</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/digital-badges/">Digital Badges</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/">Trainings</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/cloud-infrastructure-security-training">Cloud Infrastructure Security Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/star-lead-auditor-training/">STAR Lead Auditor Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/advanced-cloud-security-practitioner-training">Advanced Cloud Security Practitioner (ACSP) Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/train-the-trainer/">CCSK Train the Trainer</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/partner#become_partner">Training Network</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/instructors/">Become an Instructor</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/training-partners/">Become a Training Partner</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Specialized Training Options</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/business/">Train my entire team</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/gsa-schedule/">Training for Government Agencies</a></div></div></div></div></div></div></div><div class="c-megamenu__category" data-target="#research-nav"><div class="c-megamenu__anchor">Research</div><div class="c-megamenu__category-content" id="research-nav"><div class="o-container"><div class="o-grid o-grid--small-fit o-grid--medium-fit o-grid--large-fit"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/">CSA Research</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/publications">Latest Research</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/">Working Groups</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/chapters/">Chapters</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/contribute#peer-reviews">Open Peer Reviews</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/topics">Research Topics</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Thought Leadership</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/events/virtual-and-webinars/?event_kind=Webinar">CloudBytes Webinars</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/blog/">Blog</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Getting Started with CSA Research</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/guidance/">Cloud security best practices</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/cloud-controls-matrix/">Assess your cloud compliance</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/artifacts/star-level-1-security-questionnaire-caiq-v4/">Security questionnaire for vendors</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/top-threats/">Top threats to cloud computing</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/cloud-security-glossary">Cloud Security Glossary</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Awards & Recognition</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/juanita-koilpillai/service-award/">Juanita Koilpillai Awards</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/fellowship#fellows">Research Fellows</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Critical Topics</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/ai-safety-initiative">AI Safety Initiative</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/ai-technology-and-risk">AI Technology and Risk</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/ai-governance-compliance">AI Governance &amp; Compliance</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/ai-controls">AI Controls</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/ai-organizational-responsibilities">AI Organizational Responsibilities</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/enterprise-architecture">Enterprise Architecture</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/blockchain">Blockchain</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/zero-trust">Zero Trust</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/devsecops">DevSecOps</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/top-threats">Top Threats</a></div></div></div></div></div></div></div><div class="c-megamenu__category" data-target="#strategic-initiatives-nav"><div class="c-megamenu__anchor">Strategic Initiatives</div><div class="c-megamenu__category-content" id="strategic-initiatives-nav"><div class="o-container"><div class="o-grid o-grid--small-fit o-grid--medium-fit o-grid--large-fit"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Explore CSA's Strategic Initiatives</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/ai-safety-initiative">AI Safety Initiative</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/zt/">Zero Trust Advancement Center</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/cxo-trust/">CxO Trust</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/fincloud-security">FinCloud Security</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/trusted-cloud-consultant">Trusted Cloud Consultant</a></div></div></div></div></div></div></div></div><div class="o-grid__cell c-megamenu__search"><form action="/search" class="input-pair u-mb0" data-turbo="false" method="get" role="search"><label><span class="u-screen-reader">Search for:</span></label><input autocomplete="off" class="c-megamenu__search-input" name="s" placeholder="Search CSA resources, tools, research publications and more…" title="Search for:" type="text" value="" /><button class="c-button c-button--secondary"><i class="fas fa-search"></i></button><div class="c-button c-button--expand"><i class="fas fa-search"></i></div><div class="c-button c-button--close"><div class="i fas fa-times"></div></div></form></div></div></div></div></div><div id="megamenu_mobile"><div class="c-mobile-menu"><div class="c-mobile-menu__head"><a class="c-megamenu__logo" href="/"><img src="/assets/CSA-logo-RGB-a0a3855889ad836fa585d60f6caf8d619f241d43904c304c2f64284127fe9bf3.svg" /></a><span class="c-mobile-menu__search"><a style="color: black" href="/search"><i class="fas fa-search"></i></a></span><span class="c-mobile-menu__hamburger"><i class="fas fa-bars"></i></span></div><div class="o-container c-mobile-menu__body"><div class="c-megamenu__categories"><div class="c-megamenu__category" data-target="#mobile-membership-nav"><div class="c-megamenu__anchor">Membership</div><div class="c-megamenu__category-content" id="mobile-membership-nav"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/membership/">Membership Benefits</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/membership/current/">Our Member Community</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/membership/get-involved/">Get Involved</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/membership/contact/">Become a Member</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Member-Exclusive Programs</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/registry/star-enabled-solutions/">STAR Enabled Solutions</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/trusted-cloud-consultant/registry/">Trusted Cloud Consultant</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/trusted-cloud-provider/">Trusted Cloud Provider</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/certified-star-auditors/">Certified STAR Auditors</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/csa-startup-showcase/registry/">CSA Startup Showcase</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="https://cloudsecurityalliance.my.site.com">Member Portal</a></div></div></div></div></div><hr /><div class="c-megamenu__category" data-target="#mobile-star-program-nav"><div class="c-megamenu__anchor">STAR Program</div><div class="c-megamenu__category-content" id="mobile-star-program-nav"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/">STAR Home</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/">STAR Registry</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/submit/">Submit to Registry</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/feedback/">Provide Feedback</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/certified-star-auditors/">Certified STAR Auditors</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/star-enabled-solutions/overview/">STAR Enabled Solutions</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Stay compliant in the cloud</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/ccak/">CCAK Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/star-lead-auditor-training/">STAR Lead Auditor Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/gsa-schedule/">Training for Government Agencies</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Governance, Risk & Compliance&nbsp;Tools</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/cloud-controls-matrix/">Cloud Controls Matrix (CCM)</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/cloud-controls-matrix/">Consensus Assessment Initiative Questionnaire (CAIQ)</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/gdpr/eu-cloud-code-of-conduct/">EU Cloud Code of Conduct</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/?level=1">STAR Level 1</a></div><div class="c-megamenu__item-description">At level one organizations submit a self-assessment.</div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/?level=1">View companies at level one</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/#tab_levelOne">Learn about level one</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/?level=2">STAR Level 2</a></div><div class="c-megamenu__item-description">At level two organizations earn a certification or third-party attestation.</div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/star/registry/?level=2">View companies at level two</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/star/#tab_levelTwo">Learn about level two</a></div></div></div></div></div><hr /><div class="c-megamenu__category" data-target="#mobile-education-nav"><div class="c-megamenu__anchor">Education</div><div class="c-megamenu__category-content" id="mobile-education-nav"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Online Education Platforms</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="https://knowledge.cloudsecurityalliance.org">Knowledge Center</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="https://exams.cloudsecurityalliance.org">CSA Exams</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/events/">Events</a></div><div class="c-megamenu__item-description">Learn and network while you earn CPE credits.</div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/events/virtual-and-webinars/">Virtual Events &amp; Webinars</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/sponsor/">Event Sponsorships</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/">Certificates</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/ccsk/">Certificate of Cloud Security Knowledge (CCSK)</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/ccak/">Certificate of Cloud Auditing Knowledge (CCAK)</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/cczt/">Certificate of Competence in Zero Trust (CCZT)</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/digital-badges/">Digital Badges</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/">Trainings</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/cloud-infrastructure-security-training">Cloud Infrastructure Security Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/star-lead-auditor-training/">STAR Lead Auditor Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/advanced-cloud-security-practitioner-training">Advanced Cloud Security Practitioner (ACSP) Training</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/train-the-trainer/">CCSK Train the Trainer</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/partner#become_partner">Training Network</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/instructors/">Become an Instructor</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/training-partners/">Become a Training Partner</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Specialized Training Options</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/business/">Train my entire team</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/education/gsa-schedule/">Training for Government Agencies</a></div></div></div></div></div><hr /><div class="c-megamenu__category" data-target="#mobile-research-nav"><div class="c-megamenu__anchor">Research</div><div class="c-megamenu__category-content" id="mobile-research-nav"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/">CSA Research</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/publications">Latest Research</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/">Working Groups</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/chapters/">Chapters</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/contribute#peer-reviews">Open Peer Reviews</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/topics">Research Topics</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Thought Leadership</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" data-turbo="false" href="/events/virtual-and-webinars/?event_kind=Webinar">CloudBytes Webinars</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/blog/">Blog</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Getting Started with CSA Research</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/guidance/">Cloud security best practices</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/cloud-controls-matrix/">Assess your cloud compliance</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/artifacts/star-level-1-security-questionnaire-caiq-v4/">Security questionnaire for vendors</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/top-threats/">Top threats to cloud computing</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/cloud-security-glossary">Cloud Security Glossary</a></div></div><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Awards & Recognition</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/juanita-koilpillai/service-award/">Juanita Koilpillai Awards</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/fellowship#fellows">Research Fellows</a></div></div></div><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Critical Topics</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/ai-safety-initiative">AI Safety Initiative</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/ai-technology-and-risk">AI Technology and Risk</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/ai-governance-compliance">AI Governance &amp; Compliance</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/ai-controls">AI Controls</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/ai-organizational-responsibilities">AI Organizational Responsibilities</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/enterprise-architecture">Enterprise Architecture</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/blockchain">Blockchain</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/zero-trust">Zero Trust</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/devsecops">DevSecOps</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/research/working-groups/top-threats">Top Threats</a></div></div></div></div></div><hr /><div class="c-megamenu__category" data-target="#mobile-strategic-initiatives-nav"><div class="c-megamenu__anchor">Strategic Initiatives</div><div class="c-megamenu__category-content" id="mobile-strategic-initiatives-nav"><div class="o-grid__cell o-grid__cell--width-25@medium"><div class="c-megamenu__subcategory"><div class="c-megamenu__item"><span>Explore CSA's Strategic Initiatives</span></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/ai-safety-initiative">AI Safety Initiative</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/zt/">Zero Trust Advancement Center</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/cxo-trust/">CxO Trust</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/fincloud-security">FinCloud Security</a></div><div class="c-megamenu__item c-megamenu__item--actionable"><a class="c-megamenu__anchor" href="/trusted-cloud-consultant">Trusted Cloud Consultant</a></div></div></div></div></div><hr /><a class="c-megamenu__anchor" href="https://cloudsecurityalliance.org/cloud-newbie">Cloud 101</a><a class="c-megamenu__anchor" rel="noopener" target="_blank" href="https://circle.cloudsecurityalliance.org/">Circle</a><a class="c-megamenu__anchor" href="https://cloudsecurityalliance.org/events/">Events</a><a class="c-megamenu__anchor" href="https://cloudsecurityalliance.org/blog/">Blog</a><div class="u-pb16"><form class="c-megamenu__anchor" method="post" action="/auth/auth0"><button data-turbo="false" type="submit">Sign In</button><input type="hidden" name="authenticity_token" value="aBg2sB2Tk68T8MHZuA4jBNMV5H_PvWaXyJmUrqMRCsvofxWDu3NZVcHE0NPuTNoOrWA4m_4EMKdP8HAHnRAguw" autocomplete="off" /></form></div></div></div></div></div><div class="app_notification o-area o-area--inverse u-centered u-inverse u-pt8 u-pb8 u-bg-color-blue-300" data-controller="record-link-interaction" data-record-link-interaction-action-value="click" data-record-link-interaction-interactable-id-value="347" data-record-link-interaction-interactable-type-value="AppNotification"><small class="u-text-color-white"><div class="trix-content"> <div>Discover the latest cloud threats, evolving AI risks, and how to stay ahead. Don’t miss CSA’s <strong>free Cloud Threats &amp; Vulnerabilities Summit</strong>—<a href="https://cvent.me/KgnlDQ"><strong>register now</strong></a><strong>!</strong></div> </div> </small></div></header><main class="c-layout-main"><div class="c-container"><div class="o-container"></div></div><div class="o-area o-area--layered o-area--separated o-area--inverse"><div class="o-area__layer u-bg-color-gray-50"></div><div class="o-area__top-layer"><div class="o-container"><div class="o-grid o-grid--small-full o-grid--medium-full o-grid--large-fit"><div class="o-grid__cell o-grid__cell--width-55@medium"><h1 class="c-heading u-text-color-black">Blog</h1><h5 class="c-heading u-text-color-gray-300">Read the latest cloud security news, trends, and thought leadership from subject matter experts.</h5></div><div class="o-grid__cell"><img src="/assets/blog/blog-hero-e63b7e60455a73004d8d2ed76a22b1c22d6842342e1a00e7d9e5ec7f50f3edb0.png" /></div></div></div></div></div><div class="o-area"><div class="o-container"><div class="c-breadcrumbs"><div class="c-breadcrumbs__item"><a href="/">Home</a></div><div class="c-breadcrumbs__item">Industry Insights</div></div></div></div><div class="o-area"><div class="b-append-blog-top"></div></div><div class="o-area o-area--separated"><div class="o-container"><div class="o-grid o-grid--small-full o-grid--medium-full o-grid--large-fit o-grid--no-gutter"><div class="o-grid__cell o-grid__cell--width-65@medium"><div class="o-grid o-grid--small-full o-grid--medium-full o-grid--large-fit o-grid--no-gutter"><div class="o-grid__cell u-mb20"><form class="c-form" role="search" action="/blog" accept-charset="UTF-8" method="get"><span class="u-screen-reader">Search for:</span><div class="c-form__item-group c-form__item-group--duo c-form__item-group--actionable-right"><div class="c-form__item"><input type="text" name="search" id="search" placeholder="Search articles..." class="form-control" /></div><div class="c-form__item c-form__item--label u-centered"><button class="c-button c-button--blue"><i class="fas fa-search"></i></button></div></div></form></div></div><div class="u-separate"><div class="o-true-grid o-true-grid--two-columns"><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6Nzc3MiwicHVyIjoiYmxvYl9pZCJ9fQ==--9b12b73b0bca8ec8c0c1fd5ad589372ac6006051/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Key-Questions-for-Cloud-DLP-Transformation.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--blue">Core Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4691_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="xCD2rHG9xniGONxox4JdpsxuC1FxfvtENZzXBW21E0tER9Wf110MglQMzWKRwKSsshvXtUDHrXSy9TOsU7Q5Ow" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">Don’t Buy A Network Pen Test Until You Ask These Questions</h5><div class="u-pb12"><small><strong>Published:</strong> 03/28/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/don-t-buy-a-network-pen-test-until-you-ask-these-questions"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTE0NjAsInB1ciI6ImJsb2JfaWQifX0=--f5d69dd0512cf1fddc096c060208f5b8d68a1fba/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Optimize-incident-response-plans-with-smarter-security-tabletop-exercises.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--teal">Future Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4690_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="PvbtBZ1WE4YaI7RfNMym_2OopIOjfjXsX-2_pxGgtdG-kc42O7bZfMgXpVVijl_1Hd14Z5LHY9zYhFsOL6GfoQ" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">A Guide On How AI Pilot Programs are Shaping Enterprise Adoption </h5><div class="u-pb12"><small><strong>Published:</strong> 03/28/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/a-guide-on-how-ai-pilot-programs-are-shaping-enterprise-adoption"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTYzMCwicHVyIjoiYmxvYl9pZCJ9fQ==--af1eb9ec9efde536919ee7441d42c6a1ad29b714/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Better-Together-CMDB-CSPM-Cloud-Native-Cyber-Asset-Management.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--blue">Core Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4683_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="EbOCD6mECrxgg1wN5m3HSt_GSoFtOciKq9lKBhQN6AuR1KE8D2TARrK3TQewLz5AobOWZVyAnrossK6vKgzCew" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">SaaS Security and IaaS Security—Why You Need Both</h5><div class="u-pb12"><small><strong>Published:</strong> 03/27/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/saas-security-and-iaas-security-why-you-need-both"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTIxODQsInB1ciI6ImJsb2JfaWQifX0=--e6292cdf6577d837cd4e47a93386364a60bfa491/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Challenges-of-cloud-security-(5-traps-to-avoid).jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--orange">Cloud Assurance</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4682_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="wP_JadWrFIzSzdy0LEnLKCyGTAG0c1b5fakjxwFc85tAmOpac0vedgD5zb56CzIiUvOQ5YXKAMn6wMduP13Z6w" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">Hybrid Cloud Security – Top Challenges and Best Practices</h5><div class="u-pb12"><small><strong>Published:</strong> 03/27/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/hybrid-cloud-security-top-challenges-and-best-practices"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTA3MjksInB1ciI6ImJsb2JfaWQifX0=--516246b90318fcace1e6f16c5aa318c50619c65d/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Cloud-Security-Risk-Often-Lingers-Why-that-should-Alarm-You.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--teal">Future Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4677_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="clh-VoaA_SftzL8lj8yX00X0X4uSaAImVPBOzwUVHE7yP11lIGA33T_4ri_Zjm7ZO4GDb6PRVBbTmapmOxQ2Pg" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">Rethinking Data Risk in the AI Era: Why Organizations Need a Unified Approach</h5><div class="u-pb12"><small><strong>Published:</strong> 03/26/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/rethinking-data-risk-in-the-ai-era-why-organizations-need-a-unified-approach"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTMxOCwicHVyIjoiYmxvYl9pZCJ9fQ==--69e6c25bf1335b53c73ae1c41ca4ffe29a8148b0/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Four-Ways-Automation-Can-Transform-Your-Third-Party-Cyber-Risk-Management-Strategy.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--orange">Cloud Assurance</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4681_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="l7oIVlbImieqng2BXaG9R2YnXkRU8m_v1RZ_uknyX_YX3Stl8ChQ3XiqHIsL40RNGFKCoGVLOd9Sf5sTd_N1hg" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">How To Transform Your GRC with Continuous Controls Monitoring</h5><div class="u-pb12"><small><strong>Published:</strong> 03/26/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/how-to-transform-your-grc-with-continuous-controls-monitoring"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTI2ODUsInB1ciI6ImJsb2JfaWQifX0=--51959c969879b0aaa9f160bfe2ebe42cc60ebd98/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Pivoting-from-Infrastructure-Resilience-to%20-True-Data-Resilience.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--blue">Core Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4676_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="QuecSaMXJG5nWpEKtRzR_aYu62enroDQbbt3VN59V6jCgL96BffulLVugADjXij32Fs3g5YX1uDq0pP94Hx92A" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">Building a Robust Data Security Maturity Model</h5><div class="u-pb12"><small><strong>Published:</strong> 03/26/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/building-a-robust-data-security-maturity-model"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MzQwOTIsInB1ciI6ImJsb2JfaWQifX0=--2abb6ba87273a962edba207effe8e5d09009275a/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--73071e35a46562ab540859a1ef3adc0e9470c62a/Using%20AI%20for%20Offensive%20SecurityLatest%20News-20240725.png" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--teal">Future Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4686_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="FLb80ck5-Kx727hW8pA9lz-hoJQ5YV-TxSwdPoPwYKyU0d_ib9kyVqnvqVyk0sSdQdR8cAjYCaNCRfmXvfFK3A" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">DeepSeek: Behind the Hype and Headlines</h5><div class="u-pb12"><small><strong>Published:</strong> 03/25/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/deepseek-behind-the-hype-and-headlines"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTA4MTgsInB1ciI6ImJsb2JfaWQifX0=--6a175649dcfdf5fa5800d1abc5607c02e13b9573/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/What-a-more-holistic-approach-to-cloud-native-security-and-observability-looks-like.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--blue">Core Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4675_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="yCf1D2jv2OZZbXtlHzbcYLIv0hG-CwRKrUtqJIUiZtRIQNY8zg8SHItZam9JdCVqzFoO9Y-yUnoqIo6NuyNMpA" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">Zero Trust Makes Cybersecurity Everyone's Responsibility</h5><div class="u-pb12"><small><strong>Published:</strong> 03/25/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/zero-trust-makes-cybersecurity-everyone-s-responsibility"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NDYyOSwicHVyIjoiYmxvYl9pZCJ9fQ==--6657f6b16d1e38a022b86db792a9b61acfb2f901/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/The-Challenges-Managing-Multi-Cloud-Environments.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--teal">Future Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4629_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="9S3eALXtW1X201EspfGjGngbQLTsX-5gSI6SfQNj4ih1Sv0zEw2RryTnQCbzs1oQBm6cUN3muFDP53bUPWLIWA" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">Forget the Corporate Ladder and ‘Rock-Climb’ Your Way to Success</h5><div class="u-pb12"><small><strong>Published:</strong> 03/25/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/forget-the-corporate-ladder-and-rock-climb-your-way-to-success"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6OTk5MiwicHVyIjoiYmxvYl9pZCJ9fQ==--39333f0f27d7a5dde91441d03ea3128edeede4ee/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/How-to-Architect-for-Sustainability-in-a-Cloud-Native-Environment.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--teal">Future Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4674_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="bR0MNGtMscvJwP_k-OFOD40HfwL8GkseIYOe_uuak__tei8Hzax7MRv07u6uo7cF83Kj5s2jHS6m6npX1Zu5jw" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">Threat Modeling OpenAI's Responses API with the MAESTRO Framework</h5><div class="u-pb12"><small><strong>Published:</strong> 03/24/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/threat-modeling-openai-s-responses-api-with-the-maestro-framework"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NTA3MCwicHVyIjoiYmxvYl9pZCJ9fQ==--6913b998358dcd3195e951d537c5187f8c61efde/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/The-Future-of-Work-is-Hybrid-Is-Your-Security-Ready.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--blue">Core Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4680_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="YuhoKLDihTEKJJt7BvaVRY7HbL1KiYr9eU49jOl8GXTij0sbFgJPy9gQinFQtGxP8LKwWXsw3M3-J9kl130zBA" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">Hybrid Work: Navigating Security Challenges in the Modern Enterprise</h5><div class="u-pb12"><small><strong>Published:</strong> 03/24/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/hybrid-work-navigating-security-challenges-in-the-modern-enterprise"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTA1NjcsInB1ciI6ImJsb2JfaWQifX0=--63c86a8c73185d76a801b5180fb7c94d8871bd51/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Implementing-Outsourced-Cloud-Monitoring.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--teal">Future Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4628_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="JIbHO_ZTFHT1qtvuJaLYfPPzbN6RA7o8FJLaiScJilWk4eQIULPejieeyuRz4CF2jYawOqC67AyT-z4gGQigJQ" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">What the File Transfer Breach Crisis Means for MFT Security</h5><div class="u-pb12"><small><strong>Published:</strong> 03/24/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/what-the-file-transfer-breach-crisis-means-for-mft-security"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTIzNTIsInB1ciI6ImJsb2JfaWQifX0=--b8719de72b4fe4a6e55e427fdd27c49e160eb5ec/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/How-to-Solve-Complex-Cloud-Security-Problems-with-AI.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--orange">Cloud Assurance</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4673_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="zlMpBVRhhp6CBZQ4U3uybBi0CKrFKsWov3P0fKV2BbtONAo28oFMZFAxhTIFOUtmZsHUTvSTk5g4GhDVm3cvyw" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">Strengthening Cybersecurity in Healthcare: Newly Proposed HIPAA Rules to Include Pentesting</h5><div class="u-pb12"><small><strong>Published:</strong> 03/21/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/strengthening-cybersecurity-in-healthcare-newly-proposed-hipaa-rules-to-include-pentesting"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTI2MzgsInB1ciI6ImJsb2JfaWQifX0=--866eb9bbb9f8c8b4cc0703aaeba1d1cc74772def/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/You-could-do-zero-trust-the-old-fashioned-way,-but-why.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--teal">Future Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4672_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="cmzw4EUoXO7arcHmkN0vRNUpBkNbiiFeG9BHYw7yt_7yC9PT48iWFAiZ0OzGn9ZOq1zap2ozd26cuaPKMPOdjg" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">AI Agents in 2025: The Next Frontier of Corporate Success</h5><div class="u-pb12"><small><strong>Published:</strong> 03/21/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/ai-agents-in-2025-the-next-frontier-of-corporate-success"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6OTA2OCwicHVyIjoiYmxvYl9pZCJ9fQ==--08af16e94c5eb68dfa4fec5c47ee22d2edeb59e8/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Quantum-Computing-101.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--teal">Future Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4671_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="_6Wm4Wc9x7Wc4OX7N-ZQjBpdFkMSouZNkv3okRJrOwJ_woXSwd0NT07U9PFhpKmGZCjKpyMbsH0VlAw4LGoRcg" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">NISTIR 8547: From PQC Standards to Real-World Implementations</h5><div class="u-pb12"><small><strong>Published:</strong> 03/20/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/nistir-8547-from-pqc-standards-to-real-world-implementations"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTA3NTMsInB1ciI6ImJsb2JfaWQifX0=--436a5595dc73dd95677dc94b529b8dd6e09c680e/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/The-War-On-Data-Three-Defense-Mechanisms-Your-Business-Needs-To-Adopt.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--blue">Core Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4670_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="1f35su2NNc1BpNekgwnWS6GoRQfxYogoAbykO3vCUlJVmtqBS23_N5OQxq7VSy9B392Z48Db3hiG1UCSRcN4Ig" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">Understanding Offensive AI vs. Defensive AI in Cybersecurity</h5><div class="u-pb12"><small><strong>Published:</strong> 03/20/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/understanding-offensive-ai-vs-defensive-ai-in-cybersecurity"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTE0NjEsInB1ciI6ImJsb2JfaWQifX0=--12eb0110d025cd94e5dff6c52e273606d7321390/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Optimize-incident-response-plans-with-smarter-security-tabletop-exercises.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--teal">Future Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4627_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="swNCzGaenV1MDly6v2YA80wBmckHZ-K41f73nl7_S30zZGH_wH5Xp546TbDpJPn5MnRFLTbetIhSlxM3YP5hDQ" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">One Percent Better Can Change Your World</h5><div class="u-pb12"><small><strong>Published:</strong> 03/20/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/one-percent-better-can-change-your-world"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6OTQ5MCwicHVyIjoiYmxvYl9pZCJ9fQ==--c04f8984ebb8779be7b4e80d070844fe6fdc976d/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/The-Cloud-Has-No-Hard-Edges.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--teal">Future Cloud</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4669_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="r-lYd6naSJKAKUw60EmAUzzHBlYxrHJEzp39Icpiu-gvjntEDzqCaFIdXTCGC3lZQrLasgAVJHRJ9BmI9GORmA" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">Assessing the Security of FHE Solutions</h5><div class="u-pb12"><small><strong>Published:</strong> 03/19/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/assessing-the-security-of-fhe-solutions"></a></div><div class="c-card c-card--exhibit c-card--actionable" style="margin: 0"><div class="c-card__item c-card__item--decoration"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTIyMjEsInB1ciI6ImJsb2JfaWQifX0=--69eb3f919465c06511d51ecc22c5ea3d8acb11a3/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJqcGciLCJyZXNpemVfdG9fbGltaXQiOls3NjgsNTc2XX0sInB1ciI6InZhcmlhdGlvbiJ9fQ==--3c903a14319ef9458a777f67b75c9f24e816d253/Insider-Risk-Management-Security-Starts-Within.jpg" /></div><div class="c-card__item"><div class="u-pt12" style="min-height: 24px;"><span class="c-tag c-tag--small c-tag--outlined c-tag--orange">Cloud Assurance</span><div style="float: right; position: relative; z-index: 1;"><div id="article_4665_toggle_bookmark"><form class="u-mb0" method="post" action="/auth/auth0"><button data-turbo="false" type="submit"><i class="far fa-bookmark fa-lg u-text-color-blue-500"></i></button><input type="hidden" name="authenticity_token" value="KewT2wOKgCSsptUiBLcWrznhZ1VA9-3ILdHjFXWuVK-pizDopWpK3n6SxChS9e-lR5S7sXFOu_iquAe8S69-3w" autocomplete="off" /></form></div></div></div><h5 class="u-text-color-blue-600 u-pt12">Privacy Concerns and Corporate Caution: The Double-Edged Sword of Generative AI</h5><div class="u-pb12"><small><strong>Published:</strong> 03/19/2025</small></div></div><a class="u-position-center" href="https://cloudsecurityalliance.org/articles/privacy-concerns-and-corporate-caution-the-double-edged-sword-of-generative-ai"></a></div></div></div></div><div class="o-grid__cell o-grid__cell--offset-5@medium"><div class="c-card c-card--exhibit"><div class="c-card__item u-bg-color-gray-25" style="position: static;"><h5 class="c-heading">Filter by Theme</h5><div class="u-pb12"><a class="c-tag c-tag--large c-tag--blue c-tag--outlined" href="https://cloudsecurityalliance.org/blog/themes/core_cloud">Core Cloud</a><span data-obscurable="true" data-obscurable-width="500" style="display: inline"><span class="c-tag c-tag--large c-tag--blue c-tag--ghost"><i class="fas fa-info-circle"></i></span><div class="b-obscured u-align-left"><div class="u-centered u-pt24 u-pl24 u-pr24"><img src="/assets/blog/core_cloud-0af9e56f31928fe8d35b4354ad4dc22fcfb074aae5528b94641d31d26af56de1.png" /><h3 class="u-pt12">Core Cloud</h3><p style="font-size: 130%;">Whether you have an established cloud security program or are starting your cloud migration, these blogs will help you <strong>enhance your cloud security strategy</strong> . Learn about cybersecurity threats, certification, and more.</p></div></div></span></div><div class="u-pb12"><a class="c-tag c-tag--large c-tag--orange c-tag--outlined" href="https://cloudsecurityalliance.org/blog/themes/cloud_assurance">Cloud Assurance</a><span data-obscurable="true" data-obscurable-width="500" style="display: inline"><span class="c-tag c-tag--large c-tag--orange c-tag--ghost"><i class="fas fa-info-circle"></i></span><div class="b-obscured u-align-left"><div class="u-centered u-pt24 u-pl24 u-pr24"><img src="/assets/blog/cloud_assurance-0e2ec5c7e9c553677900f4c5c7c963959220b4618f8d4e57147871d61a5ebe65.png" /><h3 class="u-pt12">Cloud Assurance</h3><p style="font-size: 130%;"><strong>Improve the security and compliance posture</strong> of your organization and leverage the controls inside of cloud assurance. Gain the guidance and tools to build your own cloud assurance ecosystem.</p></div></div></span></div><div class="u-pb12"><a class="c-tag c-tag--large c-tag--teal c-tag--outlined" href="https://cloudsecurityalliance.org/blog/themes/future_cloud">Future Cloud</a><span data-obscurable="true" data-obscurable-width="500" style="display: inline"><span class="c-tag c-tag--large c-tag--teal c-tag--ghost"><i class="fas fa-info-circle"></i></span><div class="b-obscured u-align-left"><div class="u-centered u-pt24 u-pl24 u-pr24"><img src="/assets/blog/future_cloud-4aec67fc25f70b98664a1999c96a352426cc0a0b1c74c0c4fff0b1c73c723ae8.png" /><h3 class="u-pt12">Future Cloud</h3><p style="font-size: 130%;">Leverage CSA to help your organization <strong>solve tomorrow's problems today</strong>. Explore innovative technologies and strategies through the topics of Zero Trust, Quantum, and more.</p></div></div></span></div><div class="u-pb8"><small><a href="/blog">Reset all filters</a></small></div></div><div class="c-card__item u-bg-color-gray-25"><h5 class="c-heading u-pt8" style="border-top: solid 1px #DEE6F0;">Browse by Topic</h5><div class="c-form"><div class="c-form__item-group c-form__item-group--duo"><div class="c-form__item"><select name="terms" id="terms"><option value=""> - Select Topic - </option><option value="/blog/terms/ai-top-news/">AI Top News</option> <option value="/blog/terms/application-containers-and-microservices/">Application Containers and Microservices</option> <option value="/blog/terms/artificial-intelligence/">Artificial Intelligence</option> <option value="/blog/terms/aws/">AWS</option> <option value="/blog/terms/azure/">Azure</option> <option value="/blog/terms/big-data/">Big Data</option> <option value="/blog/terms/blockchain-distributed-ledger/">Blockchain/Distributed Ledger</option> <option value="/blog/terms/caiq/">CAIQ</option> <option value="/blog/terms/casb/">CASB </option> <option value="/blog/terms/ccak/">CCAK</option> <option value="/blog/terms/ccsk/">CCSK</option> <option value="/blog/terms/cczt/">CCZT</option> <option value="/blog/terms/c-level/">C-Level</option> <option value="/blog/terms/cloud-component-specification/">Cloud Component Specifications</option> <option value="/blog/terms/cloud-controls-matrix/">Cloud Controls Matrix</option> <option value="/blog/terms/cloud-experience/">Cloud Experience</option> <option value="/blog/terms/cloud-incident-response/">Cloud Incident Response</option> <option value="/blog/terms/cloud-key-management/">Cloud Key Management</option> <option value="/blog/terms/cloud-security-services-management/">Cloud Security Services Management</option> <option value="/blog/terms/cve/">Common Vulnerability and Exposures </option> <option value="/blog/terms/compliance/">Compliance</option> <option value="/blog/terms/confidential-computing/">Confidential Computing</option> <option value="/blog/terms/consensus-assessments/">Consensus Assessments</option> <option value="/blog/terms/continuous-assurance-metrics/">Continuous Assurance Metrics</option> <option value="/blog/terms/cxo/">CxO</option> <option value="/blog/terms/cyber-incident-sharing/">Cyber Incident Sharing</option> <option value="/blog/terms/data-security/">Data Security</option> <option value="/blog/terms/devsecops/">DevSecOps</option> <option value="/blog/terms/enhancing-cloud-security-strategy/">Enhancing cloud security strategy</option> <option value="/blog/terms/enterprise-architecture/">Enterprise Architecture</option> <option value="/blog/terms/enterprise-resource-planning/">Enterprise Resource Planning</option> <option value="/blog/terms/events/">Events</option> <option value="/blog/terms/fedramp/">FedRAMP</option> <option value="/blog/terms/financial-services/">Financial Services</option> <option value="/blog/terms/gdpr/">GDPR</option> <option value="/blog/terms/health-information-management/">Health Information Management</option> <option value="/blog/terms/high-performance-computing/">High Performance Computing</option> <option value="/blog/terms/hybrid-cloud-security/">Hybrid Cloud Security</option> <option value="/blog/terms/identity-and-access-management/">Identity and Access Management</option> <option value="/blog/terms/industrial-control-systems/">Industrial Control Systems</option> <option value="/blog/terms/industry/">Industry</option> <option value="/blog/terms/innovating-from-the-cloud/">Innovating from the cloud </option> <option value="/blog/terms/internet-of-things/">Internet of Things</option> <option value="/blog/terms/legal/">Legal</option> <option value="/blog/terms/misconfiguration/">Misconfiguration</option> <option value="/blog/terms/mobile-application-security-testing/">Mobile Application Security Testing</option> <option value="/blog/terms/open-api/">Open API</option> <option value="/blog/terms/open-certification-framework/">Open Certification Framework</option> <option value="/blog/terms/operational/">Operational</option> <option value="/blog/terms/oracle-cloud-infrastructure/">Oracle Cloud Infrastructure</option> <option value="/blog/terms/penetration-testing/">Penetration Testing</option> <option value="/blog/terms/privacy/">Privacy</option> <option value="/blog/terms/privacy-level-agreement/">Privacy Level Agreement</option> <option value="/blog/terms/quantum-safe-security/">Quantum-Safe Security</option> <option value="/blog/terms/ransomware/">Ransomware</option> <option value="/blog/terms/remote-workforce-security/">Remote Workforce Security</option> <option value="/blog/terms/risk-management/">Risk Management</option> <option value="/blog/terms/saas-governance/">SaaS Governance</option> <option value="/blog/terms/sectember/">SECtember</option> <option value="/blog/terms/security-as-a-service/">Security as a Service</option> <option value="/blog/terms/security-guidance/">Security Guidance</option> <option value="/blog/terms/serverless/">Serverless</option> <option value="/blog/terms/shared-responsibility-model/">Shared Responsibility Model</option> <option value="/blog/terms/software-defined-perimeter/">Software Defined Perimeter</option> <option value="/blog/terms/standards/">Standards</option> <option value="/blog/terms/star/">STAR</option> <option value="/blog/terms/startups/">Startups</option> <option value="/blog/terms/strategic/">Strategic</option> <option value="/blog/terms/surveys/">Surveys</option> <option value="/blog/terms/tactical/">Tactical</option> <option value="/blog/terms/threat-intelligence/">Threat Intelligence</option> <option value="/blog/terms/top-threats/">Top Threats</option> <option value="/blog/terms/training/">Training</option> <option value="/blog/terms/transitioning-to-the-cloud/">Transitioning to the cloud</option> <option value="/blog/terms/virtualization/">Virtualization</option> <option value="/blog/terms/vulnerabilities/">Vulnerabilities</option> <option value="/blog/terms/vulnerability-data/">Vulnerability Data</option> <option value="/blog/terms/working-group/">Working Group</option> <option value="/blog/terms/zero-trust/">Zero Trust</option></select></div></div></div></div></div><div class="c-card c-card--exhibit"><div class="c-card__item u-bg-color-gray-25"><h5 class="c-heading">Latest from CSA</h5><a href="https://cloudsecurityalliance.org/artifacts/csa-code-of-conduct-to-eu-cloud-code-of-conduct-mapping"><div class="o-grid u-pt12"><div class="o-grid__cell o-grid__cell--width-40 o-grid__cell--no-gutter"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NDIxNDYsInB1ciI6ImJsb2JfaWQifX0=--d6f5143df769a3c88759aaee5b815259d857dbee/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJyZXNpemVfdG9fbGltaXQiOlsxMzIsOTldfSwicHVyIjoidmFyaWF0aW9uIn19--1c3631b2c4e5d2a9f120d3fbdaa1517964193ad5/Code-of-Conduct-to-EU-Cloud-Code-of-Conduct-Mapping-800x600.png" /></div><div class="o-grid__cell"><h6>Using Codes of Conduct to Navigate GDPR Compliance</h6></div></div></a><a href="https://cvent.me/KgnlDQ"><div class="o-grid u-pt12"><div class="o-grid__cell o-grid__cell--width-40 o-grid__cell--no-gutter"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NDIxOTYsInB1ciI6ImJsb2JfaWQifX0=--b55481a6d32dc40df231036004d34b970993eaad/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJyZXNpemVfdG9fbGltaXQiOlsxMzIsOTldfSwicHVyIjoidmFyaWF0aW9uIn19--1c3631b2c4e5d2a9f120d3fbdaa1517964193ad5/Cloud-Threats-&amp;-Vulnerabilities-Summit-2025-homepage-800x600.png" /></div><div class="o-grid__cell"><h6>Stay Ahead of Cloud &amp; AI Threats: Join CSA’s Free Summit</h6></div></div></a><a href="https://www.qa.com/course-catalogue/courses/certificate-of-competence-in-zero-trust-cczt-qacczt/"><div class="o-grid u-pt12"><div class="o-grid__cell o-grid__cell--width-40 o-grid__cell--no-gutter"><img src="https://cloudsecurityalliance.org/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NDIyMjMsInB1ciI6ImJsb2JfaWQifX0=--569b6011732233179440256f152984d55e089547/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJyZXNpemVfdG9fbGltaXQiOlsxMzIsOTldfSwicHVyIjoidmFyaWF0aW9uIn19--1c3631b2c4e5d2a9f120d3fbdaa1517964193ad5/CCZT%20Training%20Partner%20-%20QA%20800x600%20latest%20news.png" /></div><div class="o-grid__cell"><h6>Register for CCZT Classes with CSA Partner QA</h6></div></div></a></div></div><div class="u-pt24"><form data-turbo="false" action="/ads/hbx1mnw6b4eyq0nsfmfgei3j" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="dT9h8_cEOTNIja6RvG79ih4ZegSZvCGuOgShQGket7tp1j1s0SGD6hLSA5L6SAryLTVyUr2vkcKUdiIVoPS_2Q" autocomplete="off" /><button class="ad-display"><img src="https://cloudsecurityalliance.org/rails/active_storage/blobs/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NDE3OTYsInB1ciI6ImJsb2JfaWQifX0=--46bfa40fb283acf8a70723ed0f6c9a494a3e55a8/CSA%20NPS%20Survey%20blog%20ad.png" /></button></form><form data-turbo="false" action="/ads/rqkglnq4f80fgpk85rwivjhh" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="V6zQE8pcub8DIOPJfsPBe9jCdbF2SYHnNnnyAhjsWN-REUTOgDJc_T0GTeIR4dMuG87yZiDIEXI4hkOXGUjwDA" autocomplete="off" /><button class="ad-display"><img src="https://cloudsecurityalliance.org/rails/active_storage/blobs/redirect/eyJfcmFpbHMiOnsiZGF0YSI6NDEwNjYsInB1ciI6ImJsb2JfaWQifX0=--266a25310ecbafec623b91feae2a3e94e20bce1f/Demo%20Program%20latest%20news%20800x600.png" /></button></form><form data-turbo="false" action="/ads/dfovoajyzb706d18kg3zvn3b" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="7U2HKViWweIcpMUDiXndkBS5DWzNfuUyf-fWkxYHr6d4eTvELYDYqz3f05FkwkYETF05QUN2HtfEqGVaoFKJ9A" autocomplete="off" /><button class="ad-display"><img src="https://cloudsecurityalliance.org/rails/active_storage/blobs/redirect/eyJfcmFpbHMiOnsiZGF0YSI6Mzk1NDksInB1ciI6ImJsb2JfaWQifX0=--fc20544507efbf9f719063feffffbddba32dc742/CCM%20Implementation%20Videos%20campaign%20blog%20ad.png" /></button></form></div><div class="c-card c-card--exhibit u-mb24"><div class="c-card__item u-bg-color-gray-25"><h6 class="u-centered u-mt16">Unlock Cloud Security Insights</h6><turbo-frame id="newsletter_subscription_request"><form class="c-form c-form--small" action="/newsletter_subscription_requests" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="bDKW3h_Z8_7bqwFGo07IXJ0zoqWu2CZk6UnMNFrbMFoNv5U2LZpRwuVhRXk8xV3ViVMg-H2J4SCIdDD6Zk4szw" autocomplete="off" /><div class="c-form__item-group c-form__item-group--duo c-form__item-group--actionable-right c-form__item-group--no-border"><div class="c-form__item u-mt20"><input placeholder="Email Address" required="required" type="email" name="newsletter_subscription_request[email]" id="newsletter_subscription_request_email" /></div><div class="c-form__item"><div class="recaptcha-container" data-controller="load-invisible-recaptcha" data-load-invisible-recaptcha-sitekey-value="6Ld1CJ8UAAAAAKB00zXbZ4qXAa6U0PZd3ixvg0Ee"></div><input type="submit" name="commit" value="Sign up" class="c-button c-button--primary c-button--small" data-disable-with="Submitting..." /></div></div></form><p class="u-centered"><small><em>Subscribe to our newsletter for the latest expert trends and updates</em></small></p></turbo-frame></div></div></div></div></div></div><div class="o-area"><div class="o-container u-mb32"><div class="c-pagination c-pagination--centered"><div class="c-pagination__item c-pagination__item--active"><a href="#">1</a></div><div class="c-pagination__item"><a rel="next" href="/blog?page=2">2</a></div><div class="c-pagination__item"><a href="/blog?page=3">3</a></div><div class="c-pagination__item"><a href="/blog?page=4">4</a></div><div class="c-pagination__item"><a href="/blog?page=5">5</a></div><div class="c-pagination__item c-pagination__item--disabled"><a href="#">…</a></div><div class="c-pagination__item"><a rel="next" href="/blog?page=2">Next ›</a></div><div class="c-pagination__item"><a href="/blog?page=165">Last »</a></div></div></div></div><script>(function() { $(function() { return $("#terms").change(function() { return window.location.href = $(this).val(); }); }); }).call(this); </script></main><footer class="c-layout-footer"><div class="o-area"><div class="cookie-banner" style="display: block;"><div data-controller="dynamic-content"><div class="c-notification c-notification--info" id="cookie-banner-main"><div class="c-notification__item c-notification__item--icon"><div class="fas fa-info-circle"></div></div><div class="c-notification__item"><p><strong>We value your privacy.</strong> <span>Our website uses analytics and advertising cookies to improve your browsing experience. Read our full</span> <a href="/legal/privacy-notice/">Privacy Policy</a><span>.</span></p><div class="c-button-group c-button-group--centered u-mb16"><a class="c-button c-button--gray" data-action="click-&gt;dynamic-content#update" data-dynamic-content-hide-param="#cookie-banner-main" data-dynamic-content-show-param="#cookie-banner-customize" href="#">Customize</a><a class="c-button c-button--blue" id="cookie-banner-accept-all" data-action="cookie-consent#acceptAll" data-controller="cookie-consent" href="#">Allow</a></div></div></div><div class="c-notification c-notification--info" id="cookie-banner-customize" style="display: none;"><div class="c-notification__item c-notification__item--icon"><div class="fas fa-info-circle"></div></div><div class="c-notification__item"><p class="u-pt12" style="line-height: 1.3em; font-size: 1.2em;"><strong>About the Cookies</strong></p><form class="c-form" data-action="cookie-consent#update" data-controller="cookie-consent" action="/blog" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="PctszKv3CNKttQZ9B1iQDUYIwDQVMlJATBZZqrk91SajF296F0BkyuDHYZEUqyfnqY5EwoauiRpDqmguVEn6vw" autocomplete="off" /><p><strong>Analytics cookies,</strong> from <a target="_blank" href="https://analytics.google.com/">Google Analytics</a> and <a target="_blank" href="https://clarity.microsoft.com/">Microsoft Clarity</a> help us analyze site usage to continuously improve our website.</p><div class="c-form__item-group c-form__item-group--duo c-form__item-group--checkbox--big"><div class="c-form__item"><input id="analytics" type="checkbox" value="1" checked="checked" name="analytics" /></div><div class="c-form__item c-form__item--label"><label for="analytics">Enable cookies for analytics.</label></div></div><p class="u-pt12"><strong>Advertising cookies,</strong> enable <a target="_blank" href="https://policies.google.com/privacy">Google</a> to collect information to display content and ads tailored to your interests.</p><div class="c-form__item-group c-form__item-group--duo c-form__item-group--checkbox--big"><div class="c-form__item"><input id="advertising" type="checkbox" value="1" checked="checked" name="advertising" /></div><div class="c-form__item c-form__item--label"><label for="advertising">Enable cookies for advertising.</label></div></div><div class="c-button-group c-button-group--centered u-mb16 u-mt16"><a class="c-button c-button--gray" id="cookie-banner-reject-all" data-action="cookie-consent#rejectAll" data-controller="cookie-consent" href="#">Decline All</a><input type="submit" name="commit" value="Confirm" class="c-button c-button--blue" data-disable-with="Confirm" /></div></form></div></div></div></div><div class="c-footer"><div class="o-container"><div class="o-grid o-grid--small-full o-grid--medium-full o-grid--large-fit"><div class="c-footer__item o-grid__cell o-grid__cell--width-30@medium u-align-left"><div class="c-footer__logo u-separate"><img src="/assets/csa-logo-white-33c6ce89081b4488f9fe480c8e4f5e662f8a9723e5467d30359ff832c269b7d6.png" /></div><p class="u-separate"><a class="c-button c-button--social-circle c-button--linkedin" target="_blank" rel="noopener" href="https://www.linkedin.com/groups/1864210/profile"><img src="/assets/social-share/li-icon-09fa81c48d4329077ed9608610eb94677c1598373b57333973e931874e641c30.svg" /></a><a class="c-button c-button--social-circle c-button--twitter" target="_blank" rel="noopener" href="https://twitter.com/intent/tweet?text=&amp;url="><img src="/assets/social-share/x-icon-d5737d8484c6d1c6b2c18ad43c18037db1925464c40f14899cdfdb82fe33a861.svg" /></a><a class="c-button c-button--social-circle c-button--facebook" target="_blank" rel="noopener" href="https://www.facebook.com/csacloudfiles"><img src="/assets/social-share/fb-icon-c0307da13019b8e4ef32e5f2e7039eac01c272bcbc2c3a7aad4ba033c0a27153.svg" /></a><a class="c-button c-button--social-circle c-button--youtube" target="_blank" rel="noopener" href="https://www.youtube.com/channel/UCrcG6ZtsBPz3xkUZU6asVhA"><img src="/assets/social-share/yt-icon-ade320bf2b6ffeae084895dac740b736c7dda9f181a871260f83da2462465ab3.svg" /></a><p class="u-separate"><span>© 2009–</span><span>2025</span> <span>Cloud Security Alliance.</span><br /><span>All rights reserved.</span></p></p></div><div class="c-footer__item o-grid__cell"><div class="o-grid o-grid--small-full o-grid--medium-full o-grid--large-fit"><div class="o-grid__cell"><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/membership/">Corporate Membership</a></h6><a href="https://cloudsecurityalliance.org/membership/enterprises/">Cloud Customers</a><a href="https://cloudsecurityalliance.org/membership/solution-providers/">Cloud Solution Providers</a></div><div class="c-footer__list"><h6><a href="https://circle.cloudsecurityalliance.org/home">Join as an Individual</a></h6><a href="https://cloudsecurityalliance.org/circle/">Circle Community Forum</a><a href="https://cloudsecurityalliance.org/chapters/">Chapters</a><a href="https://cloudsecurityalliance.org/research/working-groups/">Working Groups</a></div><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/research/">Research</a></h6><a href="https://cloudsecurityalliance.org/research/artifacts/">Download Publications</a><a href="https://cloudsecurityalliance.org/research/working-groups/">View Working Groups</a><a href="https://cloudsecurityalliance.org/research/topics">View All Topics</a></div><div class="c-footer__list"><h6><span>Find a...</span></h6><a href="https://cloudsecurityalliance.org/trusted-cloud-consultant">Cloud Consultant</a><a data-turbo="false" href="https://cloudsecurityalliance.org/star/registry/">Cloud Service Provider</a><a href="https://cloudsecurityalliance.org/trusted-cloud-provider">Trusted Cloud Provider</a></div></div><div class="o-grid__cell"><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/education/">Certificates</a></h6><a href="https://cloudsecurityalliance.org/education/ccsk/">CCSK</a><a href="https://cloudsecurityalliance.org/education/ccak/">CCAK</a><a href="https://cloudsecurityalliance.org/education/cczt/">CCZT</a></div><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/events/">Events</a></h6><a href="https://cloudsecurityalliance.org/events/americas">Americas</a><a href="https://cloudsecurityalliance.org/events/emea/">EMEA</a><a href="https://cloudsecurityalliance.org/events/apac/">APAC</a></div><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/education/">Education</a></h6><a href="https://cloudsecurityalliance.org/blog/">Blog</a><a data-turbo="false" href="https://cloudsecurityalliance.org/events/virtual-and-webinars/">Virtual Events &amp; Webinars</a><a href="https://cloudsecurityalliance.org/education/">Training</a><a href="https://cloudsecurityalliance.org/cloud-newbie">Cloud 101</a></div><div class="c-footer__list"><h6><span>Popular Resources</span></h6><a href="https://cloudsecurityalliance.org/research/guidance/">Security Guidance</a><a href="https://cloudsecurityalliance.org/research/cloud-controls-matrix/">CCM</a><a href="https://cloudsecurityalliance.org/research/cloud-controls-matrix/">CAIQ</a><a href="https://cloudsecurityalliance.org/star/">STAR</a><a href="https://cloudsecurityalliance.org/privacy/gdpr/">GDPR</a></div></div><div class="o-grid__cell"><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/about/">About CSA</a></h6><a href="https://cloudsecurityalliance.org/contact/">Contact Us</a><a href="https://cloudsecurityalliance.org/press-releases/">Press Releases</a><a href="https://cloudsecurityalliance.org/membership/current-affiliates/">Affiliates</a><a href="https://cloudsecurityalliance.org/press-coverage/">Press Coverage</a><a href="https://cloudsecurityalliance.org/quality-policy/">Quality Policy</a></div><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/about/csa-staff/">Our Team</a></h6><a data-turbo="false" href="https://cloudsecurityalliance.org/about/board-of-directors/">Board of Directors</a><a data-turbo="false" href="https://cloudsecurityalliance.org/about/csa-staff/">Management &amp; Staff</a><a href="https://cloudsecurityalliance.org/about/careers">Careers</a></div><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/legal/">Legal</a></h6><a href="https://cloudsecurityalliance.org/legal/privacy-notice/">Privacy Notice</a><a href="https://cloudsecurityalliance.org/legal/website-terms-and-conditions/">Terms &amp; Conditions</a></div><div class="c-footer__list"><h6><a href="https://cloudsecurityalliance.org/cloud-security-glossary/">Cloud Security Glossary</a></h6></div></div></div></div></div></div></div><div class="u-scroll-to-top"><span class="c-button c-button--primary c-button--elevated">&utrif;</span></div></div></footer><div class="c-modal"><div class="c-modal__content"></div><span class="c-modal__close-button"></span></div> <script id="ze-snippet" src="https://static.zdassets.com/ekr/snippet.js?key=2121b371-8db3-4beb-8ca2-5e994ec5fb73"></script> <script type="text/javascript"> var isDesktop = true; // device detection if(/(android|bb\d+|meego).+mobile|avantgo|bada\/|blackberry|blazer|compal|elaine|fennec|hiptop|iemobile|ip(hone|od)|ipad|iris|kindle|Android|Silk|lge |maemo|midp|mmp|netfront|opera m(ob|in)i|palm( os)?|phone|p(ixi|re)\/|plucker|pocket|psp|series(4|6)0|symbian|treo|up\.(browser|link)|vodafone|wap|windows (ce|phone)|xda|xiino/i.test(navigator.userAgent) || /1207|6310|6590|3gso|4thp|50[1-6]i|770s|802s|a wa|abac|ac(er|oo|s\-)|ai(ko|rn)|al(av|ca|co)|amoi|an(ex|ny|yw)|aptu|ar(ch|go)|as(te|us)|attw|au(di|\-m|r |s )|avan|be(ck|ll|nq)|bi(lb|rd)|bl(ac|az)|br(e|v)w|bumb|bw\-(n|u)|c55\/|capi|ccwa|cdm\-|cell|chtm|cldc|cmd\-|co(mp|nd)|craw|da(it|ll|ng)|dbte|dc\-s|devi|dica|dmob|do(c|p)o|ds(12|\-d)|el(49|ai)|em(l2|ul)|er(ic|k0)|esl8|ez([4-7]0|os|wa|ze)|fetc|fly(\-|_)|g1 u|g560|gene|gf\-5|g\-mo|go(\.w|od)|gr(ad|un)|haie|hcit|hd\-(m|p|t)|hei\-|hi(pt|ta)|hp( i|ip)|hs\-c|ht(c(\-| |_|a|g|p|s|t)|tp)|hu(aw|tc)|i\-(20|go|ma)|i230|iac( |\-|\/)|ibro|idea|ig01|ikom|im1k|inno|ipaq|iris|ja(t|v)a|jbro|jemu|jigs|kddi|keji|kgt( |\/)|klon|kpt |kwc\-|kyo(c|k)|le(no|xi)|lg( g|\/(k|l|u)|50|54|\-[a-w])|libw|lynx|m1\-w|m3ga|m50\/|ma(te|ui|xo)|mc(01|21|ca)|m\-cr|me(rc|ri)|mi(o8|oa|ts)|mmef|mo(01|02|bi|de|do|t(\-| |o|v)|zz)|mt(50|p1|v )|mwbp|mywa|n10[0-2]|n20[2-3]|n30(0|2)|n50(0|2|5)|n7(0(0|1)|10)|ne((c|m)\-|on|tf|wf|wg|wt)|nok(6|i)|nzph|o2im|op(ti|wv)|oran|owg1|p800|pan(a|d|t)|pdxg|pg(13|\-([1-8]|c))|phil|pire|pl(ay|uc)|pn\-2|po(ck|rt|se)|prox|psio|pt\-g|qa\-a|qc(07|12|21|32|60|\-[2-7]|i\-)|qtek|r380|r600|raks|rim9|ro(ve|zo)|s55\/|sa(ge|ma|mm|ms|ny|va)|sc(01|h\-|oo|p\-)|sdk\/|se(c(\-|0|1)|47|mc|nd|ri)|sgh\-|shar|sie(\-|m)|sk\-0|sl(45|id)|sm(al|ar|b3|it|t5)|so(ft|ny)|sp(01|h\-|v\-|v )|sy(01|mb)|t2(18|50)|t6(00|10|18)|ta(gt|lk)|tcl\-|tdg\-|tel(i|m)|tim\-|t\-mo|to(pl|sh)|ts(70|m\-|m3|m5)|tx\-9|up(\.b|g1|si)|utst|v400|v750|veri|vi(rg|te)|vk(40|5[0-3]|\-v)|vm40|voda|vulc|vx(52|53|60|61|70|80|81|83|85|98)|w3c(\-| )|webc|whit|wi(g |nc|nw)|wmlb|wonu|x700|yas\-|your|zeto|zte\-/i.test(navigator.userAgent.substr(0,4))) { isDesktop = false; } window.zESettings = { webWidget: { color: { launcherText: '#FFFFFF' } } }; var customizeWidget = function () { // Dodge Recaptcha when it also exists on the page if (typeof grecaptcha !== 'undefined') { $('#launcher').animate({'margin-right': '80px'}); }; }; setTimeout(customizeWidget, 2000); </script> </body></html>

Pages: 1 2 3 4 5 6 7 8 9 10