CSIS - Cloud Security Industry Summit
  • Home
  • Purpose
  • Work Streams
  • Documents
  • Contacts

Cloud Security Industry Summit

The Cloud Security Industry Summit (CSIS) is a group of Cloud Service Providers, with a mission to align on a vision and approach to developing best-of-breed security solutions. The group includes members from top Cloud Service Providers, partnering as an industry team and evolving a coordinated approach for improving cloud security from component to system to solution.

CSIS - Identify security challenges
CSIS - Cloud Service Providers and define industry

Purpose

  • Identify security challenges that impact all Cloud Service Providers and define industry wide requirements and solutions for resolving them
  • Bring together leading CSP experts who are facing similar external security threats at global scale
  • Share threat intelligence best known methods (BKMs) that provide value to all
  • Define and test mechanisms for incident response, containment and recovery
  • Enable members to deploy these techniques more broadly to build end user confidence in public cloud

Work Streams

In order to achieve the CSIS goals, the members formed a technical work group focused on Supply Chain Assurance. The technical work group has worked towards identifying mechanisms to verify supply chain security from component to system to solution. Due to the increasing level of sophistication of attackers and nation state threat mitigations, it is critical for a new generation of servers to be built that are more secure than ever.

CSIS - Position papers
CSIS – Cloud Security Hub

Documents

Position papers are not designed as prescriptive requirements but rather as input for industry organizations and hardware vendors developing roadmaps and/or requirements relating to cloud adoption. These are freely available, however please reference CSIS if you utilize these in RFPs, RFQs, publications, etc. Papers will be iterated accordingly as needed.

Latest News

  • Cloud Security Alliance Issues Recommendations on Firmware Integrity in the Cloud Data Center

Download PDF

  • A Case for a Trustworthy BMC
  • Secure Firmware Development Best Practices
  • Firmware Integrity in the Cloud Data Center

Get In Touch

 
Privacy Policy
Copyright© 2023