{"id":4389,"date":"2019-01-01T20:10:02","date_gmt":"2019-01-01T20:10:02","guid":{"rendered":"http:\/\/howk.de\/w1\/cloud-security-alliance-national-technology-security-coalition-release-streamlining-vendor-it-security-and-risk-assessments-whitepaper\/"},"modified":"2019-01-01T20:10:02","modified_gmt":"2019-01-01T20:10:02","slug":"cloud-security-alliance-national-technology-security-coalition-release-streamlining-vendor-it-security-and-risk-assessments-whitepaper","status":"publish","type":"post","link":"https:\/\/howk.de\/?p=4389","title":{"rendered":"Cloud Security Alliance, National Technology Security Coalition Release \u201cStreamlining Vendor IT Security and Risk Assessments\u201d Whitepaper"},"content":{"rendered":"<p>Report advocates for a new approach to how organizations manage risks, achieve assurance, and enable trust in the cloudSEATTLE \u2013 Dec. 20, 2018 \u2013The Cloud Security Alliance (CSA), the world\u2019s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced the publication of \u201cStreamlining Vendor IT Security and Risk Assessments: A perspective on standards-based assurance of cloud providers.\u201d Written in partn&#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Report advocates for a new approach to how organizations manage risks, achieve assurance, and enable trust in the cloudSEATTLE \u2013 Dec. 20, 2018 \u2013The Cloud Security Alliance (CSA), the world\u2019s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced the publication of \u201cStreamlining [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.9.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cloud Security Alliance, National Technology Security Coalition Release \u201cStreamlining Vendor IT Security and Risk Assessments\u201d Whitepaper - Howk IT-Dienstleistungen<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/howk.de\/?p=4389\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Security Alliance, National Technology Security Coalition Release \u201cStreamlining Vendor IT Security and Risk Assessments\u201d Whitepaper - Howk IT-Dienstleistungen\" \/>\n<meta property=\"og:description\" content=\"Report advocates for a new approach to how organizations manage risks, achieve assurance, and enable trust in the cloudSEATTLE \u2013 Dec. 20, 2018 \u2013The Cloud Security Alliance (CSA), the world\u2019s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced the publication of \u201cStreamlining [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/howk.de\/?p=4389\" \/>\n<meta property=\"og:site_name\" content=\"Howk IT-Dienstleistungen\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/howk.de\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-01T20:10:02+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/howk.de\/?p=4389#article\",\"isPartOf\":{\"@id\":\"https:\/\/howk.de\/?p=4389\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/howk.de\/#\/schema\/person\/b029bd02d4f35dce869ef54c81a100c5\"},\"headline\":\"Cloud Security Alliance, National Technology Security Coalition Release \u201cStreamlining Vendor IT Security and Risk Assessments\u201d Whitepaper\",\"datePublished\":\"2019-01-01T20:10:02+00:00\",\"dateModified\":\"2019-01-01T20:10:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/howk.de\/?p=4389\"},\"wordCount\":86,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/howk.de\/#organization\"},\"articleSection\":[\"Hi Tech\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/howk.de\/?p=4389#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/howk.de\/?p=4389\",\"url\":\"https:\/\/howk.de\/?p=4389\",\"name\":\"Cloud Security Alliance, National Technology Security Coalition Release \u201cStreamlining Vendor IT Security and Risk Assessments\u201d Whitepaper - Howk IT-Dienstleistungen\",\"isPartOf\":{\"@id\":\"https:\/\/howk.de\/#website\"},\"datePublished\":\"2019-01-01T20:10:02+00:00\",\"dateModified\":\"2019-01-01T20:10:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/howk.de\/?p=4389#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/howk.de\/?p=4389\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/howk.de\/?p=4389#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/howk.de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Security Alliance, National Technology Security Coalition Release \u201cStreamlining Vendor IT Security and Risk Assessments\u201d Whitepaper\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/howk.de\/#website\",\"url\":\"https:\/\/howk.de\/\",\"name\":\"Howk IT-Dienstleistungen\",\"description\":\"Howk IT Services - Howk IT-Dienstleistungen\",\"publisher\":{\"@id\":\"https:\/\/howk.de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/howk.de\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/howk.de\/#organization\",\"name\":\"HowK\",\"url\":\"https:\/\/howk.de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/howk.de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/howk.de\/w1\/wp-content\/uploads\/2013\/12\/howk-logo.png\",\"contentUrl\":\"https:\/\/howk.de\/w1\/wp-content\/uploads\/2013\/12\/howk-logo.png\",\"width\":170,\"height\":170,\"caption\":\"HowK\"},\"image\":{\"@id\":\"https:\/\/howk.de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/howk.de\",\"http:\/\/de.linkedin.com\/in\/howkde\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/howk.de\/#\/schema\/person\/b029bd02d4f35dce869ef54c81a100c5\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/howk.de\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b5a20f4d07bca1b73f25cff58a1116c4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b5a20f4d07bca1b73f25cff58a1116c4?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/howk.de\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud Security Alliance, National Technology Security Coalition Release \u201cStreamlining Vendor IT Security and Risk Assessments\u201d Whitepaper - Howk IT-Dienstleistungen","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/howk.de\/?p=4389","og_locale":"en_US","og_type":"article","og_title":"Cloud Security Alliance, National Technology Security Coalition Release \u201cStreamlining Vendor IT Security and Risk Assessments\u201d Whitepaper - Howk IT-Dienstleistungen","og_description":"Report advocates for a new approach to how organizations manage risks, achieve assurance, and enable trust in the cloudSEATTLE \u2013 Dec. 20, 2018 \u2013The Cloud Security Alliance (CSA), the world\u2019s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced the publication of \u201cStreamlining [&hellip;]","og_url":"https:\/\/howk.de\/?p=4389","og_site_name":"Howk IT-Dienstleistungen","article_publisher":"https:\/\/www.facebook.com\/howk.de","article_published_time":"2019-01-01T20:10:02+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/howk.de\/?p=4389#article","isPartOf":{"@id":"https:\/\/howk.de\/?p=4389"},"author":{"name":"admin","@id":"https:\/\/howk.de\/#\/schema\/person\/b029bd02d4f35dce869ef54c81a100c5"},"headline":"Cloud Security Alliance, National Technology Security Coalition Release \u201cStreamlining Vendor IT Security and Risk Assessments\u201d Whitepaper","datePublished":"2019-01-01T20:10:02+00:00","dateModified":"2019-01-01T20:10:02+00:00","mainEntityOfPage":{"@id":"https:\/\/howk.de\/?p=4389"},"wordCount":86,"commentCount":0,"publisher":{"@id":"https:\/\/howk.de\/#organization"},"articleSection":["Hi Tech"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/howk.de\/?p=4389#respond"]}]},{"@type":"WebPage","@id":"https:\/\/howk.de\/?p=4389","url":"https:\/\/howk.de\/?p=4389","name":"Cloud Security Alliance, National Technology Security Coalition Release \u201cStreamlining Vendor IT Security and Risk Assessments\u201d Whitepaper - Howk IT-Dienstleistungen","isPartOf":{"@id":"https:\/\/howk.de\/#website"},"datePublished":"2019-01-01T20:10:02+00:00","dateModified":"2019-01-01T20:10:02+00:00","breadcrumb":{"@id":"https:\/\/howk.de\/?p=4389#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/howk.de\/?p=4389"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/howk.de\/?p=4389#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/howk.de\/"},{"@type":"ListItem","position":2,"name":"Cloud Security Alliance, National Technology Security Coalition Release \u201cStreamlining Vendor IT Security and Risk Assessments\u201d Whitepaper"}]},{"@type":"WebSite","@id":"https:\/\/howk.de\/#website","url":"https:\/\/howk.de\/","name":"Howk IT-Dienstleistungen","description":"Howk IT Services - Howk IT-Dienstleistungen","publisher":{"@id":"https:\/\/howk.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/howk.de\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/howk.de\/#organization","name":"HowK","url":"https:\/\/howk.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/howk.de\/#\/schema\/logo\/image\/","url":"https:\/\/howk.de\/w1\/wp-content\/uploads\/2013\/12\/howk-logo.png","contentUrl":"https:\/\/howk.de\/w1\/wp-content\/uploads\/2013\/12\/howk-logo.png","width":170,"height":170,"caption":"HowK"},"image":{"@id":"https:\/\/howk.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/howk.de","http:\/\/de.linkedin.com\/in\/howkde"]},{"@type":"Person","@id":"https:\/\/howk.de\/#\/schema\/person\/b029bd02d4f35dce869ef54c81a100c5","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/howk.de\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b5a20f4d07bca1b73f25cff58a1116c4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b5a20f4d07bca1b73f25cff58a1116c4?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/howk.de\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/howk.de\/index.php?rest_route=\/wp\/v2\/posts\/4389"}],"collection":[{"href":"https:\/\/howk.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/howk.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/howk.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/howk.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4389"}],"version-history":[{"count":0,"href":"https:\/\/howk.de\/index.php?rest_route=\/wp\/v2\/posts\/4389\/revisions"}],"wp:attachment":[{"href":"https:\/\/howk.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/howk.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/howk.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}