CyberArk Secure Cloud Access achieves CSA STAR Level 1 certification

August 4, 2025 Rahul Dubey

CSA STAR Level 1 certification

When you hand over the keys to your cloud, you’d better know who’s holding them—and for how long.

In a world where speed is everything and complexity is the norm, organizations need more than visibility. They need assurance. That’s why we’re proud to share that CyberArk achieved CSA STAR Level 1 certification for its Secure Cloud Access (SCA) solution.

The Cloud Security Alliance’s (CSA) Security Trust and Assurance Registry (STAR) is a standardized, publicly accessible framework that allows organizations to evaluate and compare cloud security postures.

” Level 1 certification demonstrates that CyberArk SCA doesn’t just meet industry standards for regulatory compliance. It also upholds the rigorous documentation and transparency requirements enterprise customers demand—affirming our reputation as a trusted cloud security leader.”

CSA STAR Level 1 certification: Proof over promises in cloud security

As one of CSA’s key initiatives, the public STAR registry documents cloud providers’ security and privacy controls. To earn Level 1 certification, organizations must complete the Consensus Assessments Initiative Questionnaire (CAIQ), mapping their controls to 197 objectives in CSA’s Cloud Controls Matrix (CCM)—a cybersecurity framework tailored for the cloud.

Achieving this certification reinforces CyberArk’s long-standing commitment to security best practices. It reflects a mature, transparent security posture that goes beyond basic compliance to cover critical areas like data protection, incident response, identity management, and network security.

CyberArk Secure Cloud Access: Zero standing privileges in action

So how does CyberArk Secure Cloud Access deliver on the promise of strong, transparent security in a multi-cloud world? It starts with zero standing privileges (ZSP), a core architectural principle that aligns closely with CSA’s guidance around least privilege, identity-centric controls, and continuous risk reduction.

CyberArk SCA provides native access to cloud consoles and CLI tools while removing excess entitlements. It grants privileged access only when needed and automatically revokes it after each session, significantly reducing the cloud attack surface.

Instead of slowing down developers, engineers, and third parties, CyberArk SCA embeds strong security directly into their access workflows, delivering granular access controls without disrupting how people work.

With session protection, recording, and full audit trails, organizations gain the confidence to secure cloud data and applications without compromise. The solution also analyzes entitlements and enforces dynamic access policies, accelerating risk reduction and addressing the persistent sprawl of excessive permissions and standing privileges that lead to security gaps and compliance risks.

CSA and CyberArk: Independent validation means trusted cloud security

As organizations continue to scale their cloud infrastructure across AWS, Azure, Google Cloud, and other platforms, consistent security controls are more important than ever.

“The CSA STAR framework ensures that the same high standards apply, no matter the cloud provider. This addresses a key concern for enterprises: managing complex, hybrid cloud infrastructures.”

This makes the certification particularly relevant for CyberArk SCA, which applies ZSP to multi-cloud environments.

Today’s security leaders don’t want marketing promises—they want evidence. The CSA STAR Level 1 certification for Secure Cloud Access offers clear, third-party validation that CyberArk cloud access controls meet the highest standards for security, transparency, and compliance.

Rahul Dubey is vice president of public sector solutions at CyberArk.

No Previous Articles

Next Article
In code we trust: How to create and enforce trust of custom code at scale
In code we trust: How to create and enforce trust of custom code at scale

In today’s threat landscape, the software supply chain has become a prime target for attackers. From inject...