EMERALD: Evidence Management for Continuous Certification as a
Service in the Cloud
Christian Banse
1
, Bj
¨
orn Fanta
2
, Juncal Alonso
3 a
and Cristina Martinez
3 b
1
Fraunhofer AISEC, Garching b. M
¨
unchen, Germany
2
Fabasoft, Linz, Austria
3
TECNALIA, Basque Research and Technology Alliance (BRTA), Derio, Spain
Keywords:
Cyber Security Certification, Compliance, Evidence Management, Cloud Computing, Artificial Intelligence.
Abstract:
The conspicuous lack of cloud-specific security certifications, in addition to the existing market fragmenta-
tion, hinder transparency and accountability in the provision and usage of European cloud services. Both
issues ultimately reflect on the level of customers’ trustworthiness and adoption of cloud services. The up-
coming demand for continuous certification has not yet been definitively addressed and it remains unclear how
the level ’high’ of the European Cybersecurity Certification Scheme for Cloud Services (EUCS) shall be tech-
nologically achieved. The introduction of AI in cloud services is raising the complexity of certification even
further. This paper presents the EMERALD Certification-as-a-Service (CaaS) concept for continuous certifi-
cation of harmonized cybersecurity schemes, like the EUCS. EMERALD CaaS aims to provide agile and lean
re-certification to consumers that adhere to a defined level of security and trust in a uniform way across hetero-
geneous environments consisting of combinations of different resources (Cloud, Edge, IoT). Initial findings
suggest that EMERALD will significantly contribute to continuous certification, boosting providers and users
of cloud services to maintain regulatory compliance towards the latest and upcoming security schemes.
1 INTRODUCTION
Cloud-based services have grown from basic comput-
ing services to complex ecosystems, comprising (vir-
tual) infrastructure, business processes, and applica-
tion code. These advanced services also increasingly
leverage the usage of Artificial Intelligence, includ-
ing Machine Learning or Natural Language Process-
ing techniques, raising the complexity even higher.
Due to the cascade of dependencies between different
products and services, the need has arisen to make the
certification process for cloud-based services more
agile, for example by using continuous monitoring
and assessment, as evidenced by references to it in
the EU Cybersecurity Act (Commission, 2019) (EU
CSA) certifications.
To transform the continuous assessment and cer-
tification concept into the complete realization of a
Certification-as-a-Service (CaaS), several challenges
need to be solved: 1) the state-of-the-art proofs of
concept for continuous monitoring lack interoperabil-
a
https://orcid.org/0000-0002-9244-2652
b
https://orcid.org/0000-0002-3302-1129
ity at technological level, 2) the adoption of cloud
and edge computing and the incorporation of topic-
or domain-specific regulations, such as AI, involves a
significant strain on companies to comply with a mul-
titude of different security schemes, 3) the existing
market fragmentation for continuous certification hin-
ders transparency and accountability in the provision
of European cloud services, and 4) smart tools and
models need to be adopted to ease the agile applica-
tion and implementation of the CaaS concept, reduc-
ing complexity in the whole cloud certification value
chain and facilitating the adoption of CaaS by the var-
ious stakeholders.
In this paper, we present EMERALD, a novel ap-
proach to automatic cloud service certification with a
focus on evidence management. The main objective
of EMERALD is to provide a framework that enables
continuous Certification-as-a-Service (CaaS) and ag-
ile and lean re-certification. Targets are services that
adhere to a defined level of security and trust in a uni-
form way across heterogeneous environments made
of combinations of various Cloud and IoT resources.
190
Banse, C., Fanta, B., Alonso, J. and Martinez, C.
EMERALD: Evidence Management for Continuous Certification as a Service in the Cloud.
DOI: 10.5220/0013348100003950
Paper published under CC license (CC BY-NC-ND 4.0)
In Proceedings of the 15th International Conference on Cloud Computing and Services Science (CLOSER 2025), pages 190-197
ISBN: 978-989-758-747-4; ISSN: 2184-5042
Proceedings Copyright © 2025 by SCITEPRESS – Science and Technology Publications, Lda.
2 CONTINUOUS
CYBERSECURITY
CERTIFICATION
Continuous cybersecurity certification is a concept
inspired by the “Continuous Auditing” notion men-
tioned by ENISA during the creation of the EUCS
(ENISA, 2020). It refers to cybersecurity require-
ments related to continuous monitoring, with the in-
tended meaning of “automatic monitoring”. This in-
volves 1) gathering data at discrete intervals with suf-
ficient frequency, 2) comparing the gathered data to
a reference, 3) reporting deviations for timely analy-
sis, 4) initiating a process to fix any non-conformity
discovered and 5) notifying the CAB (Conformity As-
sessment Body) of a major non-conformity.
Continuous certification offers significant advan-
tages by providing an ongoing evaluation and audit-
ing process, unlike the current certification process,
which is typically conducted in larger fixed interval,
e.g., one year. In the current process, cybersecurity
requirements are assessed and audited in a discrete
manner. In contrast, continuous certification allows
internal or external auditors to perform certification-
related activities on a more continual basis.
Achieving continuous cybersecurity certification
requires overcoming significant challenges in in-
teroperability, regulatory coherence, and evidence
reuse. Frameworks like EMERALD, which build
upon the findings of projects such as MEDINA (Orue-
Echevarria et al., 2021), offer promising solutions
by introducing automated evidence collection, cer-
tification graphs, and adaptive compliance mecha-
nisms. The EU has acknowledged these challenges
through initiatives like the EU CSA, promoting con-
tinuous certification methodologies. However, de-
spite technological advancements, European compa-
nies often face barriers to entry, whether as consumers
or providers of cloud services. Lack of interoperabil-
ity, market fragmentation, and the absence of com-
prehensive, reusable evidence frameworks are signifi-
cant hurdles that limit trust and thus participation and
growth in the cloud ecosystem.
2.1 Context and Need
Cloud computing services have become indispensable
across industries, with advanced functionalities such
as machine learning (ML) and natural language pro-
cessing (NLP) being integral to modern applications.
According to Eurostat, the adoption of cloud services
in large enterprises increased by 21 percentage points
since 2014, highlighting a paradigm shift in opera-
tional frameworks. Cloud-based systems now encom-
pass intricate layers of infrastructure, business pro-
cesses, and application code, amplifying the need for
robust security measures.
2.2 Challenges and Gaps
The transition to continuous cybersecurity certifica-
tion is fraught with several challenges, ranging from
technological interoperability to regulatory fragmen-
tation. In the following, we list four key issues.
1. Fragmentation in Certification Schemes: The co-
existence of various certification schemes, such
as ISO standards, the Cloud Security Alliance’s
Cloud Controls Matrix (CCM) (Cloud Security
Alliance, 2021), and country-specific frameworks
(e.g., German BSI C5, Spanish ENS, French
SecNum Cloud), complicates compliance efforts.
The EU Cybersecurity Certification Scheme for
Cloud Services (EUCS) by (ENISA, 2020), aims
to address this fragmentation but lacks detailed
implementation guidelines for achieving high-
assurance levels.
2. Interoperability Challenges: Cloud systems rely
on a diverse range of tools and technologies, cre-
ating interoperability issues in continuous moni-
toring and assessment. The Open Security Con-
trols Assessment Language (OSCAL) originally
developed by (Piez, 2019) offers potential solu-
tions but has not gained widespread adoption (es-
pecially in Europe), leading to inconsistencies in
data formats and evaluation methods.
3. Stakeholder Specific Barriers: Both, consumers
and providers of cloud services, face dispropor-
tionately high entry barriers. As consumers,
stakeholders struggle with limited expertise and
resources to secure operations effectively. As
providers, they often lack visibility and face chal-
lenges in integrating with larger systems, exac-
erbating interoperability and compliance difficul-
ties.
4. AI Integration Complexities: The integration of
AI technologies, such as LLM, ML and NLP,
further complicates certification processes. AI
models require specialized evaluation methods
to ensure robustness against adversarial attacks,
bias, and data poisoning. While frameworks like
the AI Cloud Service Compliance Criteria Cata-
logue (AIC4) address these concerns, they remain
nascent and fragmented.
Current and future research must focus on har-
monizing certification, establishing standards for ev-
idence management, fostering stakeholder inclusive-
ness, and addressing AI-specific challenges.
EMERALD: Evidence Management for Continuous Certification as a Service in the Cloud
191
HTML
EMERALD UI/UX
Interoperability for cyber security agencies
Certification
graph
Mapping Assistant
for Requirements
with Intelligence
Metrics
Infrastr./ Source code
evidence component
Organisational
evidence extraction
Trustworthiness
component
Repository of
controls and metrics
Cloud security
schemes
AI standards/
schemes
Orchestrator
AI evidence
component
1b
1c
1a
2c
2b
2a
3
4a
4b
Figure 1: The EMERALD approach showing definition of
controls and metrics as well as the collection and assess-
ment of evidence in the certification graph.
3 TOWARDS CERTIFICATION-
AS-A-SERVICE (CaaS): THE
EMERALD APPROACH
The EMERALD approach, as seen in Figure 1 is
driven by the typical workflow encountered when
dealing with certification and auditing, and ranges
from extracting evidence and storing evidence, man-
aging the necessary meta-information about the tar-
geted controls to the evaluation and assessment of the
selected controls according to a selected schema. In
the following, the individual parts will be detailed.
3.1 Representing Standards, Controls
and Metrics
Repository of Controls and Metrics. In order to
automatically demonstrate compliance to security cat-
alogs and certifications, these works need to be avail-
Table 1: Example metadata of metric TransportEncryption-
ProtocolVersion.
Key Value
Name Transport Encryption
Protocol Version
Description This metric is used to
assess if an up-to-date
transport encryption pro-
tocol version is used.
Category Transport Encryption
Scale / Values Ordinal, [1.0, 1.1, 1.2,
1.3]
Recommended
Target Value
>= 1.2
Interval on-demand, every 5 min-
utes
able in a machine-readable form. A repository of
controls and metrics ( 1b ) is the central component
to hold these information (Martinez et al., 2024).
EMERALD promotes interoperability with standards
such as OSCAL in order to provide data such as secu-
rity schemes and certifications as well as the controls
defined by them ( 1a ). Furthermore, EMERALD pro-
poses scheme-independent security metrics in order
to provide a generic security assessment of the target
system (called certification target), which can then
be put into the context of a particular audit or certi-
fication. This is known as an audit scope within the
framework. Table 1 shows an example of the meta-
data defined for each metric.
Metric Recommendation and Mapping. The
mapping between controls of a particular catalog to
one or more metrics is not static. Over the course of
the development, it is expected that new metrics arise
that may be more suitable than existing ones. Further-
more, security schemes are also frequently updated.
Therefore, we envision a component that selects the
most suitable set of metrics for each control in the cat-
alog in an intelligent way ( 1b ). Since the re-usability
of evidence (and therefore metrics) is one of the key
goals for EMERALD, different strategies of choosing
metrics can be imagined. One of the ideas is to com-
bine security schemes of different granularity and do-
mains. For example, a company might choose to tar-
get the BSI C5 to ensure its baseline cloud security.
But since it is also employing AI in its cloud service,
it aims to also be compliant to an upcoming AI se-
curity scheme. Since there is a potential overlap in
both schemes when it comes to ensuring the security
CLOSER 2025 - 15th International Conference on Cloud Computing and Services Science
192
of data, a set of common metrics that are suitable for
both schemes should be chosen.
The recommendation and mapping of metrics is
explored by the EMERALD component MARI (Map-
ping Assistant for Requirements with Intelligence)
( 1c ), which takes text inputs (e.g., strings) and anal-
yses, whether the strings are similar or equal enough.
MARI enables a user to time-efficiently map different
cybersecurity schemes among each other. (1) a user is
able to find fitting (already implemented) metrics for
controls. (2) a user is able to map controls of differ-
ent new target schemes to controls of a selected source
scheme. In case of (1), the association of controls and
metrics takes as an input one particular control and a
set of metrics. The output is a list of metrics relevant
for the control, ordered according to relevancy. For
the case (2), association of controls among different
schemes, the input is one control of one scheme and
a set of controls of another scheme. The result is a
list of a list of controls (of the target scheme), ordered
according to relevancy to the source control.
3.2 Extraction and Modeling of
Evidence
At the core of the EMERALD framework, the concept
of evidence is used. An evidence is a piece of infor-
mation that proves that a system poses certain prop-
erties or behaves in a certain desired way (Anisetti
et al., 2020). EMERALD builds on the concept of so-
called semantic evidence as defined by (Banse et al.,
2023). This extends the original evidence definition
by (Anisetti et al., 2020) by a structure defined in an
ontology or taxonomy. We aim to extend the men-
tioned previous work on integrating semantic tech-
nologies into the cloud-certification process and pro-
vide an extensive ontology of all concepts related to
the certification process. The objective is to unify
all this information into a common knowledge graph,
the Certification Graph ( 3 ) (Sch
¨
oberl et al., 2024).
EMERALD envisions the collection, using so-called
evidence extractors ( 2a , 2b , 2c ), and semantic mod-
eling of such evidence at different layers.
Infrastructure Layer. The (virtual) infrastructure
layer includes different types of resources deployed
in the cloud, their properties as well as their relation-
ships. Evidence of configurations will be extracted
using open-source tools such as Clouditor
1
, as well as
by providing interfaces to commercial cloud security
posture tools or native solutions such as Azure Pol-
1
https://github.com/clouditor/clouditor
icy
2
.
Application Layer. Cloud services not only com-
prise the infrastructure layer, but are usually also
made of applications and business code. It is of ut-
most importance that not only the resources deployed
in the cloud, but also the code managing the service it-
self adheres to the principles of security standards and
certifications. The EMERALD approach also consid-
ers this by including a rich semantic description of
the applications deployed on or interacting with in-
frastructure resources. This also comprises a classifi-
cation of the functional or behavioral patterns of the
application, for example whether the application in-
teracts with a database or issues HTTP(S) requests.
Code property graphs (Yamaguchi et al., 2014; Weiss
and Banse, 2022) or commercial tools can be lever-
aged to collect evidence on this layer.
Organizational Layer. Often, security standards
and certifications refer not only to technical measures
but also to policies and procedures that must be in
place. Therefore, it is important to also consider the
organizational layer, usually comprised of documents
describing said procedures. The proposed certifica-
tion graph should include a semantic understanding
of the different types of documents; automated assess-
ment using techniques such as Large Language Mod-
els (LLMs) and Natural Language Processing (NLP)
is necessary in order to extract compatible evidence
out of the documents. One of the major challenges is
that EMERALD aims to harmonize evidence gathered
from documents with evidence gathered from techni-
cal layers by using a common set of metrics for both.
Instead, previous approaches such as (Deimling and
Fazzolari, 2023) relied on a separate set of metrics for
analyzing documents.
Data Layer. The data layer describes the actual
business data processed by the cloud service. With
the recent advancements in AI, a secure storage and
processing of AI models, such as LLMs becomes
paramount. Therefore, we aim to include a classifi-
cation of AI models and parameters in order to make
a statement about different metrics of an AI model,
such as fairness or robustness.
2
https://learn.microsoft.com/en-us/azure/governance/
policy/overview
EMERALD: Evidence Management for Continuous Certification as a Service in the Cloud
193
C
CertificationTarget
id
name
description
created at
updated at
metadata
C
Catalog
id
name
description
categories
all in scope
assurance levels
short name
metadata
C
Category
name
catalog id
description
controls
C
Control
id
category name
category catalog id
name
description
controls
metrics
parent control id
parent control category name
parent control category catalog id
assurance level
C
AuditScope
id
certification target id
catalog id
assurance level
C
Certificate
id
name
audit scope id
issue date
expiration date
assurance level
description
states
C
AssessmentResult
id
timestamp
metric id
metric configuration
compliant
evidence id
resource id
resource types
non compliance comments
certification target id
tool id
C
Metric
id
name
description
category
scale
range
interval
implementation
deprecated since
C
MetricConfiguration
target value
is default
updated at
metric id
certification target id
C
MetricImplementation
metric id
lang
code
updated at
C
EvaluationResult
id
certification target id
control id
control category name
control catalog id
parent control id
status
timestamp
failing assessment result ids
comment
valid until
*
1
*
1
1
*
1
*
*
1
1
*
1
*
1
*
1
1
*
*
1
1
*
1
1
1
1
*
1
*
Figure 2: Excerpt of the data model used by various EMERALD components.
3.3 Orchestration, Assessment and
Trustworthiness
The orchestrator ( 4a ) component is in charge of over-
seeing the whole certification process. It keeps the
state of the various evidence collectors and schedules
the necessary evaluation and assessment of evidence
in the certification graph, to finally arrive at a certifi-
cation decision.
Figure 2 shows an excerpt of the common data
model used by the orchestrator and the remaining
components.
The Catalog, Category and Control classes are
used to model data related to the security catalogs
and schemes (see Section 3.1)
The Metric class represents a security metric and
can be further described by its MetricImplementa-
tion. The implementation of a metric can be done
in different programming languages. In EMER-
ALD we leverage the logic programming lan-
guage Rego
3
.
The CertificationTarget represents the target or
system we want to assess. In the EMERALD con-
text, this is usually a cloud service, but with the
3
https://www.openpolicyagent.org/docs/latest/
policy-language/
advent of regulations like NIS-2 or the Cyber Re-
silience Act (CRA), we aimed to chose a neutral
name for this class. Each service can configure
specific target values for metrics (in the form of
a MetricConfiguration), to account for company-
specific security defaults.
As part of the assessment, an AssessmentResult
is created for each metric, based on suitable evi-
dence by querying the certification graph.
In order to put the results of the assessment in the
context of a concrete audit, an AuditScope is cre-
ated. This comprises a certification target and a
selected catalog. For each control of the selected
catalog, an EvaluationTarget is created by com-
bining the results of suitable assessment results
based on the mapping of metric to control.
Finally, the state of a Certificate object can be up-
dated based on the evaluation results: either the
certificate is still valid if all assessment results are
“ok”, otherwise a minor or major deviation is de-
tected and the certificate owner must take actions
to restore it to a healthy state.
Ensuring Trust in the Approach. The trustwor-
thiness component ( 4b ) is in charge of ensuring
the integrity of all evidence results through the use
CLOSER 2025 - 15th International Conference on Cloud Computing and Services Science
194
TP
CSC
CSP3
CSP1
CSP3
CSP2
PILOT 1
PILOT 2
PILOT 3
laaS laaS / PaaS
SaaS
SaaS
Cloud Stack
CSP1 | CSP2
laaS / PaaS
PILOT 4
CATEGORY II
CATEGORY I
EMERALD: PILOTS
EMERALDEMERALD
EMERALDEMERALD
Tech Provider (TP)
Compliance
Cloud Service Provider (CSP)
Cloud Service Customer (CSC)
Figure 3: Overview of the four EMERALD pilots, involving three cloud service providers (CSP1-3), one cloud service
customer (CSC) as well as one technology provider (TP). The individual pilots are focused on different cloud service models,
e.g., IaaS/PaaS/SaaS.
of Blockchain technology as backbone, and can be
queried to find out whether data in the process was
manipulated. To ensure the integrity of the entire ev-
idence collection and processing chain, from the ini-
tial evidence extractors ( 2a , 2b , 2c ) to the final as-
sessment by the orchestrator ( 4a ), we are exploring
the creation of a hash for each piece of evidence that
avoids evidence disclosure, so that the hashes will be
transmitted signed from the evidence sources to the
trustworthiness component ( 4b ) for recording. This
feature will be optional, allowing each evidence ex-
tractor tool to choose whether to record the hashes
directly in the trustworthiness component ( 4b ) or via
the evidence store in the orchestrator ( 4a ). While the
second option is already implemented, we are cur-
rently assessing the implementation of this approach
through a proof of concept for the first option. The
technical design and implications of this method are
under discussion.
4 TOWARDS VALIDATION
In the following we give a brief overview on the cur-
rent state of implementation and the validation ap-
proach used in EMERALD. We use different pilots
to validate the scientific and technological results of
the project and to address the usability aspect of the
EMERALD approach towards CaaS.
4.1 Current State of Implementation
We are currently in the process of implementing the
individual components of the EMERALD framework
as an open-source solution
4
. Because of potential dif-
4
https://git.code.tecnalia.com/emerald/public
ferent technical requirements, the technology stack of
each component includes Java, Python and Go. The
components work together as micro-services, which
communicate either using REST or gRPC, depending
on the amount of data exchanged. In each case, well
defined APIs using OpenAPI or protobuf definitions
ensure a smooth data exchange between all compo-
nents.
The current state of implementation at the time
of writing comprises a first preliminary version of all
components, with the aim of deploying the compo-
nents in an integrated development cluster. Once the
integration is finished, we aim to validate various as-
pects of our approach using several pilots with differ-
ent partners.
4.2 Real-World Pilots in EMERALD
In order to validate the proposed framework, EMER-
ALD features four pilots in two different categories
(see Figure 3). The challenges identified in Section 2
are addressed in these two categories. In fact, the
challenge for a cloud service provider in these do-
mains is to be able to provide services not only to ad-
here to the mentioned security and privacy standards,
but also to specific regulatory policies and business
policies specific for the sector, and also to ensure the
end users a correct, coherent and transparent process-
ing of information and data over the whole certificate
life-cycle. The four pilots are mainly characterized
by closed cloud-ecosystems, this implies that in the
world of enterprise applications, they have a high en-
try barrier for SMEs and small service providers -
unless they specialize their service individually for a
particular customer, which does not scale.
EMERALD: Evidence Management for Continuous Certification as a Service in the Cloud
195
Category I - Certification of Private Clouds. The
first three pilots aim for demonstrating CaaS on the
level of cloud services (IaaS, PaaS and SaaS). Pilots
of Category I set their focus to public cloud environ-
ments and will build upon the findings and results al-
ready achieved in MEDINA
5
. Pilots of Category I will
target compliance to the level ‘high’ for continuous
certification with the EUCS and make use of a devel-
oped EMERALD UI, a component that is currently
under develoment.
Category II Certification of Hybrid Multi-
Clouds. The fourth pilot aims to certify hybrid
cloud-edge environments for the financial sector. Due
to regulation, there is a pressing need for continu-
ous certification in this sector. The application of
EMERALD would ensure real-time assessment of
several cloud services, validating that they are com-
pliant with the controls defined in a specific security
framework. Category II pilot will also target com-
pliance to the level ‘high’ for continuous certifica-
tion with the EUCS. The specificity of Category II
is that the EMERALD approach can provide a plat-
form to exchange real-time information on the certifi-
cation states for services within the datacenter-cloud-
edge continuum used in the financial sector. More
specifically, it offers a secure-by-design application
that monitors compliance of services with the same
technology on-prem, on the cloud, or at the edge (pub-
lic or private). This ensures the secure integration of
third-party services, guaranteeing their validation of
fit-for-purposes in the light of the Digital Operational
Resilience Act (DORA).
Expected Benefits from the Pilots. The main goal
of the pilots in both categories is to validate the con-
cepts for a CaaS framework approach of EMERALD
and propose direct insights and valuable feedback
along the technical implementation phase of EMER-
ALD.
5 RELATED WORK
This section provides a short overview of related
works in the field of certification automation.
(Stephanow et al., 2016; Kunz and Stephanow,
2017; Stephanow and Banse, 2017) as well as
(Anisetti et al., 2020) laid the groundwork for au-
tomation of certifications by describing the necessary
processes and terminology. (Anisetti et al., 2023)
later extended their framework to also include the
5
https://medina-project.eu
notion of continuous. All the aforementioned ap-
proaches heavily rely on a tight coupling between ev-
idences and test cases that generate them. Often a
particular test case needs to be generate to collect one
specific (type of) evidence.
The EU2020 project MEDINA (Orue-Echevarria
et al., 2021) established a common framework for
continuous auditing, but left several challenges un-
solved, including the harmonization of evidence col-
lection across the complete service layer. Similarly,
(Banse et al., 2023) formulated the idea of so-called
“semantic evidence”, which can potentially span all
the layers of a cloud service. However, in their works
they only focus on the infrastructure and not on the
complete service including documentation and data.
(Deimling and Fazzolari, 2023) presented re-
search on how evidence of organisational processes
can be gathered from documents, but did not harmo-
nize their approach with evidence gathered from tech-
nical layers. Other approaches tried to integrate inter-
active elements, such as chat bots into the approach
of continuous monitoring (Ohagen et al., 2022).
6 CONCLUSIONS AND FUTURE
WORK
This paper presented the proposed EMERALD ap-
proach to support current challenges in the contin-
uous security certification of Cloud Computing ser-
vices and realize the concept of certification as a ser-
vice. With EMERALD, we expect to significantly de-
crease the time needed to (re-)certify, select and eval-
uate new cloud-based services and to facilitate the in-
tegration of new services that are not on premise, but
offered by different and also smaller providers.
The EMERALD audit suite for Certification as
a Service (CaaS) will contribute to build a strength-
ened ecosystem of European certification stakehold-
ers enhancing the ability of cloud services providers
to maintain regulatory compliance towards the latest
security schemes and the upcoming ones and boosting
users of cloud services to adopt of European secure
solutions, increasing European digital sovereignty in
the field of the secure cloud continuum.
The EMERALD project
6
started in November
2023 and will last 36 months. At the time of writing
this paper, the reference architecture for the EMER-
ALD CaaS framework has been designed, and the first
versions of the components are available. These ini-
tial versions will be integrated into the EMERALD
6
https://www.emerald-he.eu
CLOSER 2025 - 15th International Conference on Cloud Computing and Services Science
196
CaaS solution and validated in the four described pi-
lots during 2025.
ACKNOWLEDGEMENTS
This work has received funding from the European
Union’s Horizon Europe Innovation programme un-
der grant no. 101120688.
REFERENCES
Anisetti, M., Ardagna, C. A., and Bena, N. (2023). Contin-
uous certification of non-functional properties across
system changes. In Monti, F., Rinderle-Ma, S.,
Ruiz Cort
´
es, A., Zheng, Z., and Mecella, M., edi-
tors, Service-Oriented Computing, pages 3–18, Cham.
Springer Nature Switzerland.
Anisetti, M., Ardagna, C. A., Damiani, E., and Gaudenzi, F.
(2020). A semi-automatic and trustworthy scheme for
continuous cloud service certification. IEEE Transac-
tions on Services Computing, 13(1):30–43.
Banse, C., Kunz, I., Haas, N., and Schneider, A. (2023).
A semantic evidence-based approach to continuous
cloud service certification. In Proceedings of the
38th ACM/SIGAPP Symposium on Applied Comput-
ing, SAC ’23, page 24–33, New York, NY, USA. As-
sociation for Computing Machinery.
Cloud Security Alliance (2021). Cloud Controls Matrix and
CAIQ v4. Technical report, Cloud Security Alliance.
Commission, E. (2019). Cybersecurity act, regulation (eu)
2019/881.
Deimling, F. and Fazzolari, M. (2023). Amoe: A tool to au-
tomatically extract and assess organizational evidence
for continuous cloud audit. In Atluri, V. and Fer-
rara, A. L., editors, Data and Applications Security
and Privacy XXXVII, pages 369–385, Cham. Springer
Nature Switzerland.
ENISA (2020). EUCS CLOUD SERVICES SCHEME.
Technical report, ENISA.
Kunz, I. and Stephanow, P. (2017). A process model
to support continuous certification of cloud services.
In 2017 IEEE 31st International Conference on
Advanced Information Networking and Applications
(AINA), pages 986–993.
Martinez, C., Etxaniz, I., Molinuevo, A., and Alonso, J.
(2024). Medina catalogue of cloud security controls
and metrics: Towards continuous cloud security com-
pliance. In Open research Europe.
Ohagen, P., Lins, S., Thiebes, S., and Sunyaev, A. (2022).
Using chatops to achieve continuous certification of
cloud services. In 55th Hawaii International Confer-
ence on System Sciences (HICSS).
Orue-Echevarria, L., Garcia, J., Banse, C., and Alonso, J.
(2021). Medina: Improving cloud services trustwor-
thiness through continuous audit-based certification.
Piez, W. (2019). The open security controls assessment lan-
guage (oscal): schema and metaschema. In Balisage:
The Markup Conference.
Sch
¨
oberl, S., Banse, C., Geist, V., Kunz, I., and Pinzger, M.
(2024). Certgraph: Towards a comprehensive knowl-
edge graph for cloud security certifications. In Pro-
ceedings of the ACM/IEEE 27th International Con-
ference on Model Driven Engineering Languages and
Systems, MODELS Companion ’24, page 76–77, New
York, NY, USA. Association for Computing Machin-
ery.
Stephanow, P. and Banse, C. (2017). Evaluating the perfor-
mance of continuous test-based cloud service certifi-
cation. In 2017 17th IEEE/ACM International Sym-
posium on Cluster, Cloud and Grid Computing (CC-
GRID), pages 1117–1126.
Stephanow, P., Srivastava, G., and Sch
¨
utte, J. (2016).
Test-based cloud service certification of opportunistic
providers. In 9th International Conference on Cloud
Computing (CLOUD), pages 843–848.
Weiss, K. and Banse, C. (2022). A language-independent
analysis platform for source code.
Yamaguchi, F., Golde, N., Arp, D., and Rieck, K. (2014).
Modeling and discovering vulnerabilities with code
property graphs. In 2014 IEEE Symposium on Secu-
rity and Privacy, pages 590–604.
EMERALD: Evidence Management for Continuous Certification as a Service in the Cloud
197