Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

Working Group

Cloud Security Services Management

This working group hopes to develop a platform for CSPs to publish their security requirements; for security vendors to share their security products and services, and to provide a platform for interoperability testing.
Roles and Responsibilities of Third Party Security Services
Roles and Responsibilities of Third Party Security Services

Download

Cloud Security Services Management
Working Group Overview

This working group hopes to develop a platform for CSPs to publish their security requirements; for security vendors to share their security products and services, and to provide a platform for interoperability testing.


Drafts & Important Docs

Working Group Leadership

Dr. Kai Chen
Dr. Kai Chen

Dr. Kai Chen

Dr. Kai Chen is now serving as the Cybersecurity Ecosystem Specialist of Huawei Technologies Co.,Ltd., is responding for Huawei cybersecurity ecosystem development including strategy, policy and partner engagement, etc. He has over 15 years work experience in applied cryptography, information and network security technical research, standard development, policy and regulation fields; published over 20 research papers and delivered speeches ...

Read more

Dr. Liu Wenmao
Dr. Liu Wenmao

Dr. Liu Wenmao

Director of Innovation Center

Dr. Liu is the Director of Innovation Center, and also the leader of XingYun Lab (Cloud Security) of NSFOCUS Inc. He received his Ph.D. in Information Security from the Harbin Institute of Technology in 2013. After completion of his degree, Dr. Liu served as a researcher at NSFOCUS Inc. During the first two years in NSFOCUS, he was also working at Tsinghua University as a postdoc. He works closely with academia, is a member of the China Com...

Read more

Publications in ReviewOpen Until
CSA Large Language Model (LLM) Threats TaxonomyApr 19, 2024
Data Security - CCSK v5 Study GuideApr 22, 2024
Information Technology Governance, Risk, and Compliance in Healthcare v2Apr 26, 2024
Enterprise Authority To Operate (EATO) Controls FrameworkMay 12, 2024
View all
Who can join?

Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.

What is the time commitment?

The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.

Open Peer Reviews

Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.

Learn how to participate in a peer review here.

CSA Large Language Model (LLM) Threats Taxonomy

Open Until: 04/19/2024

This document establishes a common taxonomy and definitions for key terms related to AI risk scenarios, threats, and contro...

Data Security - CCSK v5 Study Guide

Open Until: 04/22/2024

Data security stands as a cornerstone of maintaining organizational integrity and confidentiality. The rapid expansion of c...

Information Technology Governance, Risk, and Compliance in Healthcare v2

Open Until: 04/26/2024

Cloud GRC is an effective means for organizations to gather important risk data, validate compliance, and report results. O...

Enterprise Authority To Operate (EATO) Controls Framework

Open Until: 05/12/2024

The Enterprise Authority To Operate (EATO) working group is opening their Controls Framework for open peer review.<...