Cybersecurity Directory: Purpose and Scope
The Cloud Security Authority directory maps the professional service landscape for cloud-focused cybersecurity — covering providers, practitioners, tools, and frameworks operating within US regulatory and compliance contexts. The directory spans the full range of cloud security disciplines, from infrastructure hardening and identity management to incident response and regulatory audit readiness. Listings are organized by service category, practitioner credential, and applicable compliance domain, enabling service seekers and procurement teams to navigate the sector with precision. This page describes the directory's inclusion standards, maintenance protocols, scope limitations, and its structural relationship to the reference content hosted across the network.
Standards for Inclusion
Inclusion in this directory requires that a listed entity — whether a firm, independent practitioner, or tool vendor — operates demonstrably within the cloud security service sector and meets one or more of the following qualification thresholds:
- Credential or certification alignment: Personnel or organizational credentials must correspond to recognized standards bodies. Relevant certifications include those issued by (ISC)², ISACA, CompTIA, and the Cloud Security Alliance (CSA). The CSA's Cloud Controls Matrix (CCM) and the CCSK (Certificate of Cloud Security Knowledge) serve as baseline competency references for practitioner listings.
- Regulatory compliance scope: Entities providing services under federal or sector-specific mandates — including FedRAMP, HIPAA Security Rule (45 CFR Part 164), or PCI DSS — must document the specific regulatory scope of their service offering.
- Framework alignment: Service providers must be able to demonstrate alignment with at least one named security framework. The NIST Cybersecurity Framework (CSF) and NIST SP 800-144 (Guidelines on Security and Privacy in Public Cloud Computing) are the primary reference standards applied during intake review.
- Operational domain specificity: Listings are categorized by primary cloud platform (AWS, Azure, Google Cloud), service model (IaaS, PaaS, SaaS), or functional discipline (e.g., cloud penetration testing, cloud vulnerability management, cloud identity and access management).
Generalist IT security firms without documented cloud-specific service lines are not eligible for inclusion under cloud security service categories. Listings under compliance-specific categories — such as FedRAMP requirements or SOC 2 cloud compliance — require documentation that the entity has completed or actively supports those assessment processes.
How the Directory Is Maintained
The directory operates under a structured review cycle with three distinct phases:
- Initial intake screening: Submitted listings are cross-checked against publicly verifiable sources, including state business registration databases, federal contractor registries (SAM.gov for government-facing entities), and certification body verification portals (e.g., (ISC)² member verification, CSA STAR Registry).
- Category classification: Approved listings are assigned to one or more functional categories drawn from the directory taxonomy — which mirrors recognized cloud security domains including cloud security posture management, cloud workload protection, zero trust cloud architecture, and devsecops cloud.
- Periodic review: Listings undergo re-verification against current credential status and regulatory standing. Entities whose certifications lapse, whose regulatory authorization is revoked, or whose service scope shifts outside cloud security are removed or recategorized without notice.
The directory taxonomy reflects the domain structure described in the NIST SP 800-53 Rev 5 control families and the Cloud Security Alliance's Security Guidance v4.0. Tool listings are distinguished from practitioner listings — a firm offering a SaaS cloud security tool is classified separately from a managed security service provider (MSSP) delivering cloud security operations.
What the Directory Does Not Cover
The directory excludes the following categories:
- On-premises-only security products and services: Vendors whose solutions do not extend to cloud-hosted workloads, cloud-native architectures, or hybrid environments fall outside the directory's scope.
- Generic IT services marketed as cybersecurity: Firms offering general IT support, network monitoring without cloud context, or endpoint management without cloud integration are not listed.
- Unverified practitioners: Individual consultants without verifiable credentials from a recognized body — (ISC)², ISACA, CompTIA, or equivalent — are not listed in practitioner categories.
- Legal, insurance, or financial advisory services: Cybersecurity legal counsel, cyber insurance brokers, and risk actuarial services constitute separate professional sectors. The directory does not cover these disciplines even when they intersect with cloud security risk management.
- Training and education providers: Certification training programs, bootcamps, and academic programs are outside the listing scope. Reference content on professional development pathways is addressed separately under cloud security certifications.
The directory also does not replicate or replace procurement vehicles. Federal contracting vehicles (GSA Schedules, CIO-SP3) and state-level procurement frameworks operate through their respective government portals and are referenced descriptively within the network's cloud security for government and cloud security compliance frameworks pages — not through directory listings.
Relationship to Other Network Resources
The directory is one structural layer within the broader Cloud Security Authority network. Reference content — covering technical domains such as cloud data encryption, container security, cloud network security, and cloud misconfiguration risks — is maintained separately from listing records and is not governed by the same intake criteria.
The cloud security vendor directory and cloud security tools comparison pages address the product and platform layer of the market, while this directory addresses the service provider and practitioner layer. The cloud security glossary provides definitional grounding for technical terminology referenced across all listing categories.
Full listing access, category browsing, and intake submission are available through cybersecurity listings. Structural and navigational guidance for using the directory's taxonomy and search categories is documented under how to use this cybersecurity resource.