ChaptersEventsBlog
How is your enterprise using AI Agents? Help us benchmark security and take the survey before November 30 →

Download Publication

Security Guidance for Critical Areas of Focus in Cloud Computing v4.0
Security Guidance for Critical Areas of Focus in Cloud Computing v4.0

Security Guidance for Critical Areas of Focus in Cloud Computing v4.0

Release Date: 07/26/2017

Working Group: Security Guidance

The rise of cloud computing as an ever-evolving technology brings with it a number of opportunities and challenges. Cloud is now becoming the back end for all forms of computing, including the ubiquitous Internet of Things. Cloud computing is the foundation for the information security industry. New ways of organizing compute, such as containerization and DevOps are inseparable from cloud and accelerating our revolution. With this document, we aim to provide both guidance and inspiration to support business goals while managing and mitigating the risks associated with the adoption of cloud computing technology. 

The Cloud Security Alliance promotes implementing best practices for providing security assurance within the domain of cloud computing and has delivered a practical, actionable roadmap for organizations seeking to adopt the cloud paradigm. The fourth version of the Security Guidance for Critical Areas of Focus in Cloud Computing is built on previous iterations of the security guidance, dedicated research, and public participation from the Cloud Security Alliance members, working groups, and the industry experts within our community. This version incorporates advances in cloud, security, and supporting technologies; reflects on real-world cloud security practices; integrates the latest Cloud Security Alliance research projects; and offers guidance for related technologies.
  • Cloud Computing Concepts and Architectures
  • Governance and Enterprise Risk Management
  • Legal Issues, Contracts and Electronic Discovery
  • Compliance and Audit Management
  • Information Governance
  • Management Plane and Business Continuity
  • Infrastructure Security
  • Virtualization and Containers
  • Incident Response
  • Application Security
  • Data Security and Encryption
  • Identity, Entitlement and Access Management
  • Security as a Service
  • Related Cloud Technologies
Download this Resource

Bookmark
Share
View translations
Related resources
Security Guidance for Critical Areas of Focus in Cloud Computing v5
Security Guidance for Critical Areas of Focus i...
Security Guidance v4.0 Info Sheet
Security Guidance v4.0 Info Sheet
Justify Your Investment in CCSK Training
Justify Your Investment in CCSK Training
Securing Application-to-Application Traffic with AI/AGI/ML-Powered Virtual Firewalls: A Comprehensive Framework for Multi-Cloud, Hybrid, and On-Premises Environments
Securing Application-to-Application Traffic with AI/AGI/ML-Powered ...
Published: 11/21/2025
Why I'm Joining CSA
Why I'm Joining CSA
Published: 09/16/2025
Jurassic Access: What Jurassic Park Teaches Us About Identity and Access Management
Jurassic Access: What Jurassic Park Teaches Us About Identity and A...
Published: 08/01/2025
Implementing CCM: Cloud Security Monitoring & Logging
Implementing CCM: Cloud Security Monitoring & Logging
Published: 07/28/2025

Interested in helping develop research with CSA?

Related Certificates & Training