CSA’s AI Safety Initiative is the premier coalition of trusted experts who converge to develop and deliver essential AI guidance and tools that empower organizations of all sizes to deploy AI solutions that are safe, responsible, and compliant.
The AI Technology and Risk Committee is focused on staying abreast of the latest technological advancements in AI while simultaneously identifying, understanding,
The AI Governance & Compliance Committee aspires to be the industry’s cornerstone for establishing, advocating, and disseminating governance and compliance standards for artificial intelligence.
The CSA AI Control Framework Working Group’s goal is to define a framework of control objectives to support organizations in their secure and responsible development, management, and use of AI technologies.
The AI Organizational Responsibilities Committee is committed to pioneering and setting industry standards for the definition of roles and responsibilities within security teams, specifically adapted to the emerging challenges and opportunities presented by AI technologies.
This group follows closely to the CCM working group in order to map the architecture domains that help enterprises identify critical components that are key to their cloud security architecture. These domains, when agreed upon to an adjacent CCM control domain, create a larger picture for easily implementing strategies.
This group investigates relevant use cases and security implications of blockchain. Currently, they are creating a framework and glossary that would help provide guidance and security around: wallets, exchanges, cryptography, and more. We welcome anyone who would like to join, even if you would like to just listen in on your first call.
This working group aims to develop Zero Trust standards to achieve consistency for cloud, hybrid and mobile endpoint environments. The topic of group discourse include Zero Trust benefits, architecture, automation and maturity models, publication reviews, and relevant industry forums and events.
Zero Trust is one of the most widely talked about cybersecurity trends today. Zero Trust says no part of a computer and networking system can be implicitly trusted, including the humans operating it. Therefore, we must put measures in place to provide assurance that the systems and their components are operating appropriately, typically under a “least privilege” model and continuously verified.
Our working group discusses the DevSecOps. We welcome anyone who would like to join, even if you would like to just listen-in on your first call.
This group aims to provide organizations with an up-to-date, expert-informed understanding of cloud security risks, threats and vulnerabilities in order to make educated risk-management decisions regarding cloud adoption strategies.
Cloud computing offers tremendous benefits in agility, resiliency, economy, and security. However, the security benefits only appear if you adopt cloud-native models and adjust your architectures and security controls to align with the capabilities of cloud platforms.
It is composed of 197 control objectives that are structured in 17 domains covering all key aspects of cloud technology. It can be used as a tool for the systematic assessment of a cloud implementation, and provides guidance on which security controls should be implemented by which actor within the cloud supply chain. The controls framework is aligned to the CSA Security Guidance for Cloud Computing, and is considered a de-facto standard for cloud security assurance and compliance.