Cloud 101CircleEventsBlog
Download Presentations from the CSA AI Summit at RSAC Now

Download Publication

Cloud Incident Response Framework – A Quick Guide
Cloud Incident Response Framework – A Quick Guide

Cloud Incident Response Framework – A Quick Guide

Release Date: 04/21/2020

With the abundance of Cloud Incident Response (CIR) standards, frameworks and guidelines available in the industry, CSA’s Cloud Incident Response Working Group aims to provide a holistic and consistent view across widely used frameworks for the user, be it CSPs or cloud customers. Ultimately, the working group hopes to develop a holistic Cloud Incident Response (CIR) framework that covers the major causes of cloud incidents (both security and non-security related), and their handling and mitigation strategies. The aim is to serve as a go-to guide for cloud users to effectively prepare for and manage the aftermath of cloud incidents, along with serving as a transparent and common framework for CSPs to share cloud incident response practices with their customers.


This Quick Guide distills the main objectives and gives readers an overview of the key contributions and efforts currently underway inside this working group
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
HSM-as-a-Service Use Cases, Considerations, and Best Practices
HSM-as-a-Service Use Cases, Considerations, and...
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
How Continuous Controls Monitoring Brings IT Unity & Agility
How Continuous Controls Monitoring Brings IT Unity & Agility
Published: 05/10/2024
CSA Community Spotlight: Educating the Security Industry with CISO Rick Doten
CSA Community Spotlight: Educating the Security Industry with CISO ...
Published: 05/08/2024
Navigating Legacy Infrastructure: A CISO’s Strategy for Success
Navigating Legacy Infrastructure: A CISO’s Strategy for Success
Published: 05/08/2024
Resource Constraints in Kubernetes and Security
Resource Constraints in Kubernetes and Security
Published: 05/06/2024

Acknowledgements

Michael Roza
Michael Roza
Head of Risk, Audit, Control and Compliance

Michael Roza

Head of Risk, Audit, Control and Compliance

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Haojie Zhuang Headshot Missing
Haojie Zhuang

Haojie Zhuang

Dr. Hing-Yan Lee
Dr. Hing-Yan Lee
Executive Vice President of Government Affairs, CSA

Dr. Hing-Yan Lee

Executive Vice President of Government Affairs, CSA

Dr. Hing Yan Lee serves as the Executive Vice President of Asia Pacific (APAC) for Cloud Security Alliance. Dr. Lee has over 30 years of ICT working experience in both the public and private sectors. In the recent 9+ years, he was Director of National Cloud Computing Office at Infocomm Development Authority, where he was responsible for, inter alia, developing the cloud ecosystem, promoting cloud adoption by government agencies and private...

Read more

Ashish Kurmi Headshot Missing
Ashish Kurmi

Ashish Kurmi

Saan Vandendriessche
Saan Vandendriessche

Saan Vandendriessche

Larry Marks Headshot Missing
Larry Marks

Larry Marks

Soon Tein Lim
Soon Tein Lim

Soon Tein Lim

Jane Chow Headshot Missing
Jane Chow
Associate Research Analyst, CSA

Jane Chow

Associate Research Analyst, CSA

Alex Siow
Alex Siow

Alex Siow

Christopher Hughes Headshot Missing
Christopher Hughes

Christopher Hughes

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training