Statements (48)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:security
|
gptkbp:availableOn |
https://cloudsecurityalliance.org/research/guidance/
|
gptkbp:category |
risk management
compliance cloud security IT governance |
gptkbp:domain |
gptkb:Security_as_a_Service
Incident Response Application Security Data Center Operations Cloud Security Operations Traditional Security, Business Continuity, and Disaster Recovery Cloud Application Architecture Compliance and Audit Management Data Security and Information Lifecycle Management Encryption and Key Management Governance and Enterprise Risk Management Identity, Entitlement, and Access Management Interoperability and Portability Legal Issues: Contracts and Electronic Discovery Threat and Vulnerability Management Virtualization and Containers Supply Chain Management, Transparency, and Accountability |
gptkbp:firstPublished |
2009
|
gptkbp:focusesOn |
cloud computing security
|
https://www.w3.org/2000/01/rdf-schema#label |
CSA Security Guidance
|
gptkbp:language |
English
|
gptkbp:latestReleaseVersion |
2021
v4.0 |
gptkbp:numberOfDomains |
17
|
gptkbp:provides |
best practices
security principles |
gptkbp:publishedBy |
gptkb:Cloud_Security_Alliance
|
gptkbp:relatedTo |
CSA Cloud Controls Matrix
CSA STAR Program |
gptkbp:structure |
domains
|
gptkbp:targetAudience |
auditors
compliance officers cloud providers cloud customers security architects |
gptkbp:usedBy |
cloud service providers
enterprises security professionals |
gptkbp:bfsParent |
gptkb:CCSK
gptkb:Certificate_of_Cloud_Security_Knowledge_(CCSK) gptkb:Security_Guidance_for_Critical_Areas_of_Focus_in_Cloud_Computing |
gptkbp:bfsLayer |
6
|