ChaptersEventsBlog
We're exploring how organizations adapt IAM to AI. Take the AI Identity and Risk Readiness Survey by September 5 →

Working Group

Controls Catalog

Expanding CSA's CCM, developing implementation guidelines, and maintaining a repository of controls as code.
This working group focuses on expanding and standardizing cybersecurity control objectives across various technologies, including Cloud, AI, and IoT/OT. It extends the CSA Cloud Control Matrix (CCM), ensuring interoperability with global frameworks. The group also defines control implementation guidelines, maintains a repository of technical controls as code, and enables automation to streamline compliance integration and enforcement.

  • Expands CSA’s Cloud Control Matrix (CCM) to support diverse technologies (Cloud, AI, IoT/OT).
  • Standardizes controls for interoperability across regulatory frameworks.
  • Develops vendor-agnostic and vendor-specific implementation guidelines for control adoption.
  • Defines control objectives related to cybersecurity, privacy, safety, and accountability.
  • Establishes a repository of technical controls as code to streamline compliance integration.

Working Group Leadership

Andy Ruth
Andy Ruth

Andy Ruth

Content Developer, CSA

Daniele Catteddu
Daniele Catteddu

Daniele Catteddu

Chief Technology Officer, CSA

Daniele Catteddu is an information security and risk management practitioner, technologies expert and privacy evangelist with over 15 of experience. He worked in several senior roles both in the private and public sector. He is member of various national and international security expert groups and committees on cyber-security and privacy, keynote speaker at several conferences and author of numerous studies and papers on risk management, ...

Read more

Larry Hughes
Larry Hughes

Larry Hughes

VP of Research & Development

Larry Hughes is the Vice President of Research and Development at the Cloud Security Alliance. With more than 20 years of experience in the security industry, Larry’s holds five advanced security certifications, including CCSK, CCSP, and CISSP. His past roles include Principal Consultant at LJH Cybersecurity, GRC Director at Equinix, and Head of Information Security at 

Read more

Publications in ReviewOpen Until
Data Security within AI EnvironmentsAug 29, 2025
AICM Auditing GuidelinesSep 03, 2025
A Practitioner’s Guide to Post-Quantum CryptographySep 17, 2025
Cloud Threat Modeling 2025Sep 19, 2025
View all
Who can join?

Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.

What is the time commitment?

The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.

Virtual Meetings

Attend our next meeting. You can just listen in to decide if this group is a good for you or you can choose to actively participate. During these calls we discuss current projects, and well as share ideas for new projects. This is a good way to meet the other members of the group. You can view all research meetings here.

Open Peer Reviews

Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.

Learn how to participate in a peer review here.

Data Security within AI Environments

Open Until: 08/29/2025

 AI’s demand for large and diverse datasets introduces significant cybersecurity risks across the entire data lifecycl...

AICM Auditing Guidelines

Open Until: 09/03/2025

Auditing steps for each of the 243 controls of the AI Controls Matrix for internal or external auditors that are going to e...

A Practitioner’s Guide to Post-Quantum Cryptography

Open Until: 09/17/2025

As quantum computing advances, the threat it poses to classical cryptographic algorithms becomes increasingly urgent. This ...

Cloud Threat Modeling 2025

Open Until: 09/19/2025

The purpose of this document is to enable and encourage effective threat modeling for cloud applications, services, and sec...