ChaptersCircleEventsBlog
Join us for the in-person CCSK Azure course at Black Hat from August 4–5! Register now for a hands-on deep dive and secure your spot now!

Download Publication

Cloud Octagon Model
Cloud Octagon Model

Cloud Octagon Model

Release Date: 06/24/2019

In this document CSA provides an approach to assess risk in SaaS cloud computing. The Cloud Octagon Model stems from an approach conceptualized and implemented by the Cloud Security Group within the Technology & Engineering department, Corporate Information Security Office (CISO), ABN AMRO Bank NV (Netherlands). It counts such aspects as procurement, IT governance, architecture, development and engineering, service providers, risk processes, data classification, and country. The model provides practical guidance and structure to all involved risk parties in order to keep pace with rapid changes in privacy and data protection laws and regulations, and changes in technology and its security implications. The model aims to:
  • reduce risks associated with cloud computing;
  • improve the effectiveness of the cloud risk team;
  • improve manageability of the solution; and
  • improve security.

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
State of SaaS Security Report 2025
State of SaaS Security Report 2025
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
CSA CCM v4.0 Addendum - IBM Cloud Framework for Financial Services v1.1.0
CSA CCM v4.0 Addendum - IBM Cloud Framework for...
Navigating the Cybersecurity Imperative in India’s Manufacturing Ascent
Navigating the Cybersecurity Imperative in India’s Manufacturing As...
Published: 06/27/2025
Why Do Organizations Migrate to the Public Cloud? Hint: It Isn’t About Cost Anymore
Why Do Organizations Migrate to the Public Cloud? Hint: It Isn’t Ab...
Published: 06/26/2025
A Primer on Model Context Protocol (MCP) Secure Implementation
A Primer on Model Context Protocol (MCP) Secure Implementation
Published: 06/23/2025
Protecting the Weakest Link: Why Human Risk Mitigation is at the Core of Email Security
Protecting the Weakest Link: Why Human Risk Mitigation is at the Co...
Published: 06/20/2025

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Michael Roza is a seasoned risk, audit, control and compliance, and cybersecurity professional with over 20 years of experience across multinational enterprises and startups. As a Cloud Security Alliance (CSA) Research member for over 10 years, he has led and contributed to more than 140 CSA projects spanning Zero Trust, AI, IoT, Top Threats, DecSecOps, Cloud Key Management, Cloud Control Matrix, and many others.

He has co-chaired...

Read more

Jim De Haas
Jim De Haas
Cloud Security Expert

Jim De Haas

Cloud Security Expert

Seasoned security professional with a demonstrated history of working on critical, complex and highly available banking applications. A technology enthusiast, who enjoys collaborating with cross-functional teams. A strong communicator who can evangelize security across the organisation. Specialised in Cloud Security (Both AWS and Azure), IT Security, training DevOps engineers in security topics and making security understandable to non-secu...

Read more

Cheyenne Seur Headshot Missing
Cheyenne Seur

Cheyenne Seur

Timo Muller Headshot Missing
Timo Muller

Timo Muller

Biswajt Behera Headshot Missing
Biswajt Behera

Biswajt Behera

Alok Saxena Headshot Missing
Alok Saxena

Alok Saxena

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training