资讯

Understand the critical next steps to secure and manage your non-human identities (NHIs) effectively. Refine your strategy, ...
The CAIQ is used by CSPs to submit to the CSA STAR Registry. The Consensus Assessments Initiative Questionnaire (CAIQ) v3.1. offers an industry-accepted way to document which security controls exist ...
When it comes to executing identity processes, 96% of organizations still rely on manual workflows. Automation is the ...
As AI agents integrate into enterprise and critical infrastructure, proactive red teaming must become a continuous function. Security teams need to test isolated model behaviors, full agent workflows, ...
This CSA Data Security Glossary identifies and defines 127 terms relevant to data security. Based on the CSA Cloud Security Glossary, NIST Glossary, and other public sources, this compilation of data ...
The challenge of identity management for AI agents centers on the question: What kind of identity should your AI agent ...
Discover how deterministic AI empowers DevSecOps by automating secure, policy-aligned remediations and shifting from ...
Refresher on key management and encryption Deep dive into each phase of the key management lifecycle: Generation, Distribution, Storage, Usage, Backup and Recovery, Revocation, Rotation, and ...
Learn CIEM and secure cloud access best practices: effective identity visibility, least-privilege, zero‑standing privileges, ...
Why do organizations migrate to the public cloud? It may sound like a simple question in 2025, but there’s complexity to it.
This paper from the CSA AI Technology and Risk Working Group discusses the importance of AI model risk management (MRM). It showcases how model risk management contributes to responsible AI ...
Explore OWASP’s new NHI Top 10 list, designed to standardize non-human identity security and help teams manage these critical ...