Join the Trusted Cloud Initiative

Join the Trusted Cloud Initiative and participate in the creation of trustworthy cloud computing with the Cloud Security Alliance.

To join simply send an e-mail to

Specify if you prefer to be a member of the Architecture, Certification, or Implementation groups.  For more detail visit:

After joining you will receive e-mail communications, access to the collaboration site where we post documentation and meeting materials, and invitations to meetings to collaborate with cloud computing experts in security and privacy from multiple industries and geographies.  The Cloud Security Alliance has busily created extremely useful guides and best practices, and we’re leveraging the work of each of the CSA groups, for example the Security Controls matrix of 100 key security requirements that are mapped and traced back to PCI, HIPAA, COBIT, NIST, and ISO standards.


Topics discussed to date include:

  • XDAS Distributed Audit Service
  • Open Auth (OAuth) and the decision by Twitter to disable Basic Authentication in favor of OAuth for it’s web services API… note that the gift to switch is double the I/O  (the OAuth PEP now permits 350 requests/hour)
  • When it is or isn’t appropriate to use OpenID for Web 2.0 style single sign-on
  • Using a privately signed SAML token for federated x-cloud authentication
  • Wrappers for XACML (Extensible Access Control Markup Language)
  • Enterprise User Directories vs Cloud User Directories
  • Choosing the right Identity Provider for the use case.
  • OAuth V2 IETF Draft Specification
  • XACML Policy Enforcement, Policy Administration, and Policy Decision Point application integration
  • Key Management Infrastructures:  Discussion on the Security Benefits of Cloud Tenants to control their own Root Certificate Authority for SSH/SFTP/SSL and strong mutual authentication.
  • Physical Access Controls to Data Center Facilities hosting Cloud Services
  • Carrier Neutral Facilities for “Private Cloud” Service Providers with demands for Dark Fibre connectivity
  • Federated Authentication with Cloud Services
  • Cloud Powered DMZs & Private Cloud HoneyPots

One Response to Join the Trusted Cloud Initiative

  1. Pingback: Confidentiality Integrity & Availability – the troika of an IT security trocha « Joyeur

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s