ChaptersCircleEventsBlog

Download Publication

The Evolution of STAR: Introducing Continuous Auditing
The Evolution of STAR: Introducing Continuous Auditing

The Evolution of STAR: Introducing Continuous Auditing

Release Date: 09/14/2021

The CSA Continuous Auditing Certification (aka STAR Level 3) is the most rigorous assurance tier in the STAR program. Level 3 certified services providers can demonstrate critical security controls are monitored and validated continuously providing customers with the ultimate level of transparency and assurance. Continuous security controls auditing and certification delivers best-in-class security transparency and assurance customers need in an ever-changing threat landscape. 
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Requirements for Bodies Providing STAR Certification
Requirements for Bodies Providing STAR Certific...
NIST CSF v2 Cloud Community Profile - Based on CCM v4
NIST CSF v2 Cloud Community Profile - Based on ...
Informative Reference Details for the Mapping of CCM v4 to NIST CSF v2
Informative Reference Details for the Mapping o...
A New Era for Compliance: Introducing the Compliance Automation Revolution (CAR)
A New Era for Compliance: Introducing the Compliance Automation Rev...
Published: 04/29/2025
Navigating the FedRAMP Evolution: How CSA CCM Provides a Solid Foundation
Navigating the FedRAMP Evolution: How CSA CCM Provides a Solid Foun...
Published: 04/03/2025
Can GenAI Services Be Trusted? | At the Discovery of STAR for AI
Can GenAI Services Be Trusted? | At the Discovery of STAR for AI
Published: 01/29/2025
The Compliance Automation Revolution: Time for Real Change
The Compliance Automation Revolution: Time for Real Change
Published: 01/28/2025

Acknowledgements

Bader Zyoud
Bader Zyoud
Information Security Manager

Bader Zyoud

Information Security Manager

Information Security Manager with more than twelve years of experience in cybersecurity, risks management, security projects consultation ,governance and advisory services, IT Operations , threat intelligence, security and IT technical audit, SOC,artificial intelligence, security transformation programs, incident management, implementation of business resilience and project risk capabilities in terms of information security, strategic plann...

Read more

Alain Pannetrat
Alain Pannetrat
Software Engineer II, CSA

Alain Pannetrat

Software Engineer II, CSA

Daniele Catteddu
Daniele Catteddu
Chief Technology Officer, CSA

Daniele Catteddu

Chief Technology Officer, CSA

Daniele Catteddu is an information security and risk management practitioner, technologies expert and privacy evangelist with over 15 of experience. He worked in several senior roles both in the private and public sector. He is member of various national and international security expert groups and committees on cyber-security and privacy, keynote speaker at several conferences and author of numerous studies and papers on risk management, ...

Read more

John DiMaria
John DiMaria
Director of Operations Excellence, CSA

John DiMaria

Director of Operations Excellence, CSA

John DiMaria; CSSBB, HISP, MHISP, AMBCI, CERP is the Director of Operations Excellence and Research Fellow with the Cloud Security Alliance. He has 40 years of experience in Standards and management System Development, including Information Systems, Business Continuity, and Quality. John was one of the innovators and co-founders of the CSA STAR programs Open Certification Framework for cloud providers and developed the first certification s...

Read more

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Pete Chronis Headshot Missing
Pete Chronis

Pete Chronis

Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training