Skip to main content

CSA STAR Self-Assessment

Last updated: April 2026

This document provides FeatureSignals' self-assessment against the Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) v4.

Overview

The CSA Security, Trust, Assurance, and Risk (STAR) program provides a framework for cloud service providers to demonstrate their security posture. This self-assessment maps FeatureSignals' controls to CCM v4 domains.

AIS — Application & Interface Security

ControlDescriptionStatus
AIS-01Application security policyImplemented — CLAUDE.md standards
AIS-02Application security baselineImplemented — CI/CD with testing
AIS-03Application security metricsImplemented — test coverage, vuln scanning
AIS-04Secure application designImplemented — hexagonal architecture, ISP
AIS-06Automated app security testingImplemented — go test -race, govulncheck
AIS-07Application vulnerability remediationImplemented — CI blocks on critical vulns

BCR — Business Continuity and Operational Resilience

ControlDescriptionStatus
BCR-01Business continuity planDocumented
BCR-02Risk assessmentImplemented — risk register
BCR-03Business continuity testingQuarterly backup restore tests
BCR-04DocumentationIncident response plan documented
BCR-06BackupDatabase backups configured
BCR-08Disaster recoveryDR runbook documented

CCC — Change Control and Configuration Management

ControlDescriptionStatus
CCC-01Change management policyImplemented — Git PR workflow
CCC-02Quality testingImplemented — CI/CD pipeline
CCC-03Change management technologyGit + CI/CD
CCC-05Change agreementsPR reviews required
CCC-09Change restorationGit revert, migration rollback

DSP — Data Security and Privacy

ControlDescriptionStatus
DSP-01Security and privacy policyPrivacy policy published
DSP-02Secure disposalAccount deletion with anonymization
DSP-03Data inventoryData categories documented in ROPA
DSP-04Data classificationPII, business data, public data
DSP-05Data flow documentationSub-processor data flows documented
DSP-07Data protection by designPrivacy by design principles applied
DSP-10Sensitive data transferTLS 1.3, SCCs for international transfers
DSP-17Data retention and deletionConfigurable retention, automated purge

GRC — Governance, Risk, and Compliance

ControlDescriptionStatus
GRC-01Governance programSecurity policies and procedures
GRC-02Risk management programRisk assessment framework
GRC-03Organizational policyCLAUDE.md standards enforced
GRC-04Policy reviewAnnual policy review cycle

HRS — Human Resources

ControlDescriptionStatus
HRS-02Acceptable useAcceptable use policy
HRS-04Employment terminationAccess revocation procedure
HRS-06Employment agreementsSecurity obligations in agreements
HRS-10Security awareness trainingAnnual training program

IAM — Identity & Access Management

ControlDescriptionStatus
IAM-01Identity and access management policyRBAC documented
IAM-02Strong password policyConfigurable password policies
IAM-03Identity inventoryTeam member management
IAM-04Segregation of dutiesFour roles with distinct permissions
IAM-06User access provisioningInvitation-based with role assignment
IAM-07User access de-provisioningMember removal with audit logging
IAM-08User access reviewQuarterly access review process
IAM-09Segregation of privileged accessOwner role for sensitive operations
IAM-12User ID credentialsEmail + password, API keys (hashed)
IAM-13Multi-factor authenticationTOTP MFA available

IVS — Infrastructure & Virtualization Security

ControlDescriptionStatus
IVS-01Infrastructure security policyInfrastructure as Code
IVS-03Network securityTLS, firewall rules, private networks
IVS-04SegmentationSeparate evaluation and management APIs
IVS-09Network architecture documentationArchitecture docs published

LOG — Logging and Monitoring

ControlDescriptionStatus
LOG-01Logging and monitoring policyStructured logging implemented
LOG-02Audit loggingComprehensive audit trail
LOG-03Security monitoring and alertingHealth checks, rate limit monitoring
LOG-05Audit log monitoringIntegrity hashing, export capability
LOG-09Log protectionAppend-only audit logs with chain hashing
LOG-13Access audit loggingLogin attempts tracked

SEF — Security Incident Management

ControlDescriptionStatus
SEF-01Security incident management policyIncident response plan documented
SEF-02Service management policySLA commitments documented
SEF-03Incident response plansSeverity-based response procedures
SEF-04Incident response testingSemi-annual tabletop exercises
SEF-05Incident response metricsPost-mortem process

TVM — Threat and Vulnerability Management

ControlDescriptionStatus
TVM-01Threat and vulnerability management policyAutomated scanning
TVM-02Vulnerability prioritizationSeverity-based remediation SLAs
TVM-03Vulnerability remediationCI blocks critical/high vulnerabilities
TVM-04Detection updatesDaily CVE database updates
TVM-07Penetration testingAnnual (planned)
TVM-09Vulnerability management reportingScan reports retained

Next Steps

  1. Level 1 — Self-Assessment: This document (current)
  2. Level 2 — Third-Party Audit: CSA STAR Certification (planned post-ISO 27001)
  3. Level 3 — Continuous Monitoring: CSA STAR Continuous (future)