ChaptersCircleEventsBlog
Join us for the in-person CCSK Azure course at Black Hat from August 4–5! Register now for a hands-on deep dive and secure your spot now!
Research Publications currently filtered by Term.
×

Download Publication

Information Security Management through Reflexive Security
Information Security Management through Reflexive Security

Information Security Management through Reflexive Security

Release Date: 08/01/2019

Working Group: DevSecOps

DevOps, the practice of applying developmental best practices such as collective collaboration to infrastructure operations, has been shown to positively impact efficiencies of development and operations teams today, especially in the cloud environment. Given its strengthening adoption, it is necessary to consider its impact on information security itself and look to apply those practices to the arena of information security management.

This document defines “Reflexive Security” as a new security management approach that is built upon the interrelationships between security, development and operations necessary for protecting the security stance and the deliverables of an organization.

Download this Resource

Bookmark
Share
Related resources
The Six Pillars of DevSecOps: Measure, Monitor, Report, and Action
The Six Pillars of DevSecOps: Measure, Monitor,...
The Six Pillars of DevSecOps - Collaboration and Integration
The Six Pillars of DevSecOps - Collaboration an...
The Six Pillars of DevSecOps - Pragmatic Implementation
The Six Pillars of DevSecOps - Pragmatic Implem...
A Primer on Model Context Protocol (MCP) Secure Implementation
A Primer on Model Context Protocol (MCP) Secure Implementation
Published: 06/23/2025
Cloud Security: Whose Job Is It?
Cloud Security: Whose Job Is It?
Published: 06/23/2025
Runtime Integrity Measurement Overview
Runtime Integrity Measurement Overview
Published: 06/13/2025
Closing the Blind Spot in Enterprise DNS Security: Why DNS Posture Management Matters
Closing the Blind Spot in Enterprise DNS Security: Why DNS Posture ...
Published: 06/12/2025

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Michael Roza is a seasoned risk, audit, control and compliance, and cybersecurity professional with over 20 years of experience across multinational enterprises and startups. As a Cloud Security Alliance (CSA) Research member for over 10 years, he has led and contributed to more than 140 CSA projects spanning Zero Trust, AI, IoT, Top Threats, DecSecOps, Cloud Key Management, Cloud Control Matrix, and many others.

He has co-chaired...

Read more

Sean Heide
Sean Heide

Sean Heide

Ronald Tse
Ronald Tse
CEO, Ribose

Ronald Tse

CEO, Ribose

Ronald has served CSA in numerous capacities, including as a member of CSA's APAC Research Advisory and International Standardization Council. Additionally, he co-chairs the Open Certification Framework (OCF), SaaS Governance, and DevSecOps working groups. He is the founder and CEO of Ribose, where under his leadership the company has been consistently awarded the industry's highest cloud security ratings, including being the on...

Read more

David Lewis Headshot Missing
David Lewis

David Lewis

Eric Gauthier Headshot Missing
Eric Gauthier

Eric Gauthier

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training