• Skip to primary navigation
  • Skip to main content
  • Skip to footer
ControlCase No Tag LOGO md

ControlCase

IT Certifications, Continuous Compliance and Cybersecurity Services Provider

  • Company
    • About Us
    • Careers
    • Locations
    • Team
  • Industries
    • Business Process Outsourcing
    • Cloud Service Providers
    • Retail
    • Telecom | Entertainment
    • Managed Service Providers
  • Certifications
    • PCI DSS Certification
    • CSA STAR Certification
    • GDPR Assessment
    • HIPAA Assessment
    • HITRUST Certification
    • ISO 27001 Certification
    • FedRAMP 3PAO Services and NIST 800-53
    • CMMC Certification
    • MARS-E Assessment
    • PCI SSF
    • P2PE Certification
    • SOC2 Report
  • Solutions
    • Continuous Compliance Solution
    • One Audit
    • Card Data Discovery Software
    • Data Security Rating
  • Testing
    • Application Reviews
    • Application Security Training
    • Code Reviews
    • Card Data Discovery
    • External Vulnerability Scans
    • Firewall Security Reviews
    • Internal Vulnerability Scans
    • Log Monitoring
    • Penetration Testing
  • Resources
    • Events
    • News
    • Webinars
    • Courses
    • Blog
    • Tools
    • Become a Partner
  • Contact Us
  • English

CSA (Cloud Security Alliance) STAR Program

You are here: Home / Blog / CSA (Cloud Security Alliance) STAR Program
Cloud Security Alliance (CSA) Star Checklist
Get it for FREE

If you’d like to know about all things CSA STAR, you’ve come to the right place. In this blog, created by the compliance experts at ControlCase, we’re going to ask and address the following questions and topics:

• What is the Cloud Security Alliance?
• Why the STAR Program
• CSA STAR Levels of Assessment
• CSA STAR Cloud Controls Matrix and Domains
• The Cloud Security Alliance STAR Certification Program
• Cloud Security Alliance Questionnaire CAIQ
• The STAR Registry

What is the Cloud Security Alliance?

The Cloud Security Alliance (CSA), founded in 2008, is the world’s leading organization committed to outlining and raising awareness to the proper measures for securing a cloud computing environment.

Why the Cloud Security Alliance STAR Certification Program?

The CSA established the STAR program as a solution for cybersecurity compliance throughout the widespread adoption of cloud services. STAR stands for Security, Transparency, Assurance, and Risk.The overall goal of the CSA STAR Program is to bring in the key principles of the Cloud Controls Matrix while providing total transparency and helping clients adhere to specific requirements. This is accomplished through the CSA STAR Program…

…providing the tools to evaluate cloud services.

…establishing a way for providers to prove the compliance and security measures their company takes.

…creating a registry to bring together all information.

The STAR Program assists enterprises, or anyone in the cloud computing market, in evaluating the risk to an organization and implementing controls based upon identified risks.

Specifically, the STAR Program offers assurance against a very heterogenous (with common needs and issues) cloud computing market by supporting organizations in effectively and efficiently addressing these dedicated areas:

• Defining trust in the cloud
• Fostering accountability
• Evaluating risk.
• Measuring assurance
• Simplifying compliance and procurement.​

CSA STAR Levels of Assessment

There are multiple levels of assessment when it comes to CSA STAR.

CSA STAR Levels 1 and 2 cover Self-Assessments and Third Party Audits, as seen in the following table:

CSA STAR Level 1: Self-Assessment​

Organizations can submit one or both the security and privacy self-assessments.​Organizations should pursue Level 1 if they are:​

  • Operating in a low-risk environment.​
  • Wanting to offer increased transparency around the security controls they have in place.​
  • Looking for a cost-effective way to improve trust and transparency.​

CSA STAR Level 2: Third Party Audit​

Allows organizations to build off other industry certifications and standards to make them specific for the cloud.​Organizations should pursue Level 2 if they are:

  • Operating in a medium-to-high risk environment​
  • Already holding or adhering to the following: ISO 27001 or  SOC 2​
  • Looking for a cost-effective way to increase assurance for cloud security and privacy.​

 

STAR Level 3 is Continuous Auditing, as seen in the following graphic:Cloud Security Alliance

CSA STAR Cloud Controls Matrix and Domains

The Cloud Security Alliance Cloud Controls Matrix (CSA CCM) is a cybersecurity control framework for cloud computing, as mentioned on the CSA website. The Cloud Controls Matrix structure is based around the ISO 27001 structure with a specific focus on cloud computing.

197 control objectives make up the CSA CCM. The control objectives are structured in the 17 Cloud Security Alliance domains, with the goal of thoroughly encompassing all aspects of cloud computing.

Following are the 17 CSA Domains:

• Application & Interface Security
• Audit and Assurance
• Business Continuity Mgmt & Op Resilience
• Change Control & Configuration Management
• Cryptography, Encryption, and Key Management
• Datacenter Security
• Data Security & Privacy
• Governance, Risk Management, and Compliance
• Human Resources Security
• Identity & Access Management
• Interoperability & Portability
• Infrastructure & Virtualization Security
• Logging and Monitoring
• Security Incident Management, E-Discovery, & Cloud Forensics
• Supply Chain Management, Transparency, & Accountability
• Threat & Vulnerability Management
• Universal EndPoint Management

Cloud Security Alliance Questionnaire CAIQ v4

The Consensus Assessment Initiative Questionnaire (CAIQ) consists of yes or no questions for cloud consumers and auditors to ask a cloud provider to assess their compliance against the Cloud Controls Matrix. The CAIQ helps customers determine the level of security maintenance in prospective providers. The CAIQ results are submitted to the STAR Registry.

STAR Registry

In the spirit of transparency, the STAR Registry hosts a public repository for cloud market assessments to perform risk-based cloud services. A requirement of the CSA STAR Program is that organizations must publish their results on the STAR Registry, making the information freely accessible by anyone. The establishment of a public registry makes the CSA STAR unlike other frameworks.

 

Contact our team today to get started

About Us

ControlCase is a global provider of certification, cybersecurity, and continuous compliance services. ControlCase is committed to empowering organizations to develop and deploy strategic information security and compliance programs that are simplified, cost-effective, and comprehensive in both on-premise and cloud environments.
ControlCase offers certifications and a broad spectrum of cyber security services that meet the needs of companies required to certify to PCI DSS, HITRUST, SOC2, CMMC, ISO 27001, PCI PIN, PCI P2PE, PCI TSP, PCI SSF, CSA STAR, HIPAA, GDPR, SWIFT, and FedRAMP.

  • Facebook
  • LinkedIn
  • Twitter
  • YouTube

Footer

Connect

Corporate Headquarters
3975 FAIR RIDGE DR STE T25S-D
FAIRFAX, VA 22033

Send us a message

Call Us

Search

About Us

ControlCase is a United States based company, headquartered in Fairfax, Virginia with locations in North America, Europe, Latin America, Asia/Pacific, Australia and the Middle East to serve our clients globally.

Quick Links

  • Company
  • Careers
  • Locations
  • Covid-19 Notice

Certifications, Assessments and Reports

  • PCI DSS Certification
  • CSA STAR Certification
  • GDPR Assessment
  • HIPAA Assessment
  • HITRUST Certification
  • ISO 27001 Certification
  • FedRAMP and 3PAO Services
  • MARS-E Assessment
  • PCI SSF
  • P2PE Certification
  • SOC2 Report

© ControlCase LLC 2025 | Privacy Policy | Impartiality Statement | Legal Notices

  • English
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}