Seattle, WA — October 23, 2025 — The Cloud Security Alliance (CSA), the world’s leading not-for-profit organization committed to AI, cloud, and Zero Trust cybersecurity education, today announced the official launch of STAR for AI, introducing the first global framework for AI assurance across both Level 1 and Level 2 tiers. This milestone builds upon CSA’s AI Controls Matrix (AICM) and its newly released mapping to ISO/IEC 42001:2023, creating a cohesive, standards-aligned pat...| Cloud Security Alliance
When did you last explain to your terminal why you were running that command? "Kurt, why did you create this entry in our Airtable?" Two months had passed. I had no memory of it. But Airtable's audit logs showed the entry was created using a token I'd configured for AI tools. That gave me the crucial clue: which system to check. I searched my AI conversation logs for the entry text. Instantly found. Complete context preserved. A quick timeline analysis revealed the exact decision ...| Cloud Security Alliance
Governing generative and agentic AI while enabling AI innovation at the same time can feel like whiplash. In the upcoming Cloud Security Alliance (CSA) whitepaper, we introduce the Capabilities-Based Risk Assessment (CBRA). This structured methodology for evaluating enterprise AI risk looks at the capabilities and context of the system, not just its function or output, allowing security teams to right-size controls. The goal is for innovation to scale without surprises. Join our sessio...| Cloud Security Alliance
The Cloud Controls Matrix (CCM) is a framework of controls that are essential for cloud computing security. Created by CSA, the CCM aligns with CSA best practices. You can use CCM to systematically assess and guide the security of any cloud implementation. CCM also provides guidance on which actors within the cloud supply chain should implement which security controls. Both cloud service customers (CSCs) and cloud service providers (CSPs) use CCM in many ways. CSCs use CCM to: Asses...| Cloud Security Alliance
Written by: Ken Huang, Fellow and Co-chair of AI Safety Working Groups, CSA and CEO, DistributedApps.ai Monisha Dhanraj, CEO, Frondeur Labs Chitraksh Singh, AI Security Researcher, Frondeur Labs In this blog, we'll talk about KillChainGraph and what it's trying to accomplish. Cybersecurity is tough. Organizations invest heavily in defenses, but breaches still happen regularly. The challenge isn't just detecting threats—it's understanding how attacks unfold over...| Cloud Security Alliance
Artificial intelligence is shaping the future of business, society, and daily life at an unprecedented pace. Yet, alongside innovation comes urgent responsibility: ensuring that AI systems are safe, secure, ethical, and resilient. CSA, together with Northeastern University, has created the Trusted AI Safety Expert (TAISE) certificate program to meet this moment. Launching today, TAISE is a movement toward safer, more responsible AI. With its comprehensive curriculum, rigorous assessment...| Cloud Security Alliance
Cloud environments have become central to modern business operations, but their scale, complexity, and dynamic nature create significant security challenges. Traditional penetration testing methods, manual exploits, and scripted scans often struggle to cover rapidly evolving multi-cloud infrastructures. AI and Large Language Models (LLMs) are changing the way organizations approach cloud security. By combining AI-driven intelligence with human expertise, companies can detect vulnerabili...| Cloud Security Alliance
Artificial intelligence is reshaping the world at a pace that few technologies have ever matched. From healthcare to customer support, AI systems now influence decisions with profound consequences. Yet alongside its promise, AI carries risks such as bias, hallucinations, privacy breaches, and a lack of transparency. These risks have created what experts call a trust gap between capability and confidence. AI without trust is unsustainable. Organizations that cannot demonstrate responsibl...| Cloud Security Alliance
Not long ago, I led the transformation of a fast moving technology company’s engineering organization. Our goal was to move from a traditional, high functioning team to one built entirely around AI native principles. It didn’t begin with a sweeping strategy. It started with uncomfortable experiments. A new IDE. A handful of reimagined processes. A few engineers willing to challenge their habits. But as those changes gained traction, we found ourselves building something fundamentally di...| Cloud Security Alliance
The definition of enterprise security has evolved beyond recognition. Traditionally enterprises used to secure their applications, data and users within their physical locations from external threats. However, enterprise boundaries have moved beyond these physical walls due to emergence of emergence of hybrid work models, multi-cloud environments and expanding ecosystems partners. This new enterprise perimeter involves sharing enterprise resources between multiple devices, applications, c...| Cloud Security Alliance
Passwordless Authentication is becoming more relevant in the modern era of digital security by offering organizations a strong defence against credential based cyber-attacks that have always been the most prevalent cause for data breaches. In this article we will explore how passwordless technologies work and how they are slowly reshaping authentication and reducing the risks of credential driven threats. Reports That Underpin the Article The recent Comcast Business Cybersecu...| Cloud Security Alliance
The National Laboratories of the Department of Energy stand at the forefront of scientific innovation, tackling complex challenges and advancing research across the world. But behind these groundbreaking discoveries lies a less glamorous reality: the overwhelming number of compliance processes that haven’t evolved at the same pace as the science they support. Across the DOE (not to mention other federal agencies and the private sector), we see the same pattern: GRC teams drowning in spre...| Cloud Security Alliance
What is using an LLM as a judge? Using an LLM as a judge is the practice of using a large language model to evaluate the quality of AI-generated content, essentially letting one model serve as the “judge” of another model’s output. At its core, using an LLM as a judge involves leveraging the reasoning and evaluation capabilities of one AI system to assess the performance of another AI system. The LLM judge is given instructions or criteria through a prompt — which may include few-shot...| Cloud Security Alliance
With enterprise applications increasingly distributed across on-premises data centers, cloud environments, and SaaS platforms, this fragmentation makes it difficult to secure access, govern usage, and manage compliance. As the application footprint grows, so does risk. For example, mergers and acquisitions can instantly expand an organization’s application portfolio by thousands, overwhelming security teams tasked with inventorying and securing these assets. Shadow IT—applications deplo...| Cloud Security Alliance
As the need for innovative artificial intelligence grows, regulatory bodies are working quickly to create frameworks that balance acceleration with safety, accountability, and trust. Notably, the European Union’s AI Act is poised to reshape how organizations approach AI governance, especially when it comes to general-purpose AI (GPAI) models. To help companies prepare, the EU recently introduced a voluntary AI Code of Practice, which serves as a significant early step toward AI c...| Cloud Security Alliance
Introduction Imagine giving a stranger your house keys just because they walked past your driveway. That’s effectively what many organizations still do—granting implicit trust to users or systems based on network location. Zero Trust flips this model on its head by treating every access request as untrusted until proven otherwise. This is why zero trust architecture has become the gold standard in cybersecurity. But what exactly is zero trust, and why is identity its cor...| Cloud Security Alliance
AI is revolutionizing how we detect and respond to threats, enhancing the capacity to protect sensitive data and systems from malicious actors.| cloudsecurityalliance.org
Read cloud security best practices recommended by security experts in this document crowd-sourced and developed by the Cloud Security Alliance community of experts.| CSA
The Cloud Controls Matrix (CCM) is a framework of controls that are essential for cloud computing security. Created by CSA, the CCM aligns with CSA best practices. You can use CCM to systematically assess and guide the security of any cloud implementation. CCM also provides guidance on which actors within the cloud supply chain should implement which security controls. Both cloud service customers (CSCs) and cloud service providers (CSPs) use CCM in many ways. CSCs use CCM to: Asses...| Cloud Security Alliance
Learn how the shared responsibility model is applied to security, governance, compliance, and BC/DR in cloud computing.| cloudsecurityalliance.org
The SaaS Security Capability Framework defines configurable, consumable, and customer-facing security controls provided by SaaS vendors to their customers.| cloudsecurityalliance.org
Do you have a bank account, cryptocurrency, and/or any assets managed by a financial institution or bank? I bet you want the financial institutions that handle them for you to keep those assets safe from any threat, including, a Cryptographically Relevant Quantum Computer (CRQC) which is on the horizon. To help with this the SEC has released their Post-Quantum Financial Infrastructure Framework (PQFIF), which provides a roadmap for the quantum-safe transition of the global financial infra...| Cloud Security Alliance
Security operations center (SOC) analysts assisted by AI are faster and more accurate compared to counterparts working manually SEATTLE – Oct. 7, 2025 – Beyond the Hype: A Benchmark Study of AI in the SOC, a new report from the Cloud Security Alliance (CSA), the world’s leading not-for-profit organization committed to AI, cloud, and Zero Trust cybersecurity education, and Dropzone AI, the leading provider of AI SOC analysts, has found that AI-assisted security analysts demonstrate grea...| Cloud Security Alliance
Written by Ken Huang, CEO at DistributedApps.ai and Jerry Huang, Engineering Fellow, Kleiner Perkins. Abstract AI agents used in e-commerce necessitates secure payment protocols capable of handling high-determinism user authorization, agent authentication, and non-repudiable accountability. The Agent Payments Protocol (AP2) [1], an open extension to Agent2Agent (A2A) [2] and Model Context Protocol (MCP) [3], introduces Verifiable Credentials (VCs) in the form of crypt...| Cloud Security Alliance
The Cloud Security Alliance (CSA) leads the industry in offering cloud security-specific research, education, certification, events and best practices.| cloudsecurityalliance.org
Results highlight the importance of unified visibility across code-to-cloud environments to counter risks effectively| CSA
In today’s digital landscape, SaaS has emerged as a vital lifeline for operations in organizations big and small. As businesses entrust the cloud with their invaluable data, security of these applications and the information they harbor takes center stage. While SaaS applications are secure by| CSA
Cloud Controls Matrix (CCM)| CSA