Research Artifacts

Streamlining Vendor IT Security and Risk Assessments

Streamlining Vendor IT Security and Risk Assessments

A perspective on standards-based assurance of Cloud Providers.

Release Date: 12/09/2018
Blockchain DLT Use Cases

Blockchain DLT Use Cases

Thanks to the rise in popularity of Bitcoin cryptocurrency, the innovative technologies of Blockchain and other systems of distributed ledger technology (DLT) have proven their ability to increase security of data during transactions and provide immutable long-term data storage.

Release Date: 11/27/2018
Cloud Controls Matrix v3.0.1 (11-12-18 Update)

Cloud Controls Matrix v3.0.1 (11-12-18 Update)

The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) Working Group has released a minor update for the CCM v3.0.1. This update incorporates mappings to IEC 62443-3-3 and BSI Compliance Controls Catalogue (C5). File attached.

Release Date: 11/12/2018
CCM v3.0 - Chinese Translation

CCM v3.0 - Chinese Translation

The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) provides fundamental security principles to guide cloud vendors and cloud customers seeking to assess the overall security risk of a cloud service. The CSA CCM provides a detailed controls framework that is aligned with Cloud Security Alliance’s Security Guidance in 16 domains.

Release Date: 10/19/2018
Security Guidance for Critical Areas of Focus in Cloud Computing v4.0 (Spanish Translation)

Security Guidance for Critical Areas of Focus in Cloud Computing v4.0 (Spanish Translation)

Con este documento, nuestro objetivo es proporcionar tanto orientación como inspiración para respaldar los objetivos comerciales, mientras se gestionan y mitigan los riesgos asociados con la adopción de la tecnología de computación en la nube.

Release Date: 10/19/2018
Guideline on Effectively Managing Security Service in the Cloud

Guideline on Effectively Managing Security Service in the Cloud

This initiative aims to develop a research whitepaper, focusing on building up a cloud security services management platform. This whitepaper will serve as a guideline for cloud service providers to secure its cloud platform and provide cloud security services to cloud users, for cloud users to select security qualified cloud service providers, for security vendors to develop their cloud-based security products and services.

Release Date: 10/19/2018
Using BlockChain Technology to Secure the Internet of Things - Japanese Translation

Using BlockChain Technology to Secure the Internet of Things - Japanese Translation

本書「IoT セキュリティのためのブロックチェーン技術の活用」は、Cloud Security Alliance (CSA)が公開して いる「Using Blockchain Technology to Secure the Internet of Things」の日本語訳です。本書は、CSA ジャパ ンが、CSA の許可を得て翻訳し、公開するものです。原文と日本語版の内容に相違があった場合には、原文が優先 されます。

Release Date: 10/03/2018
IoT Firmware Update Processes

IoT Firmware Update Processes

The traditional approach to updating software for IT assets involves analysis, staging and distribution of the update—a process that usually occurs during off-hours for the business. These updates typically have cryptographic controls (digital signatures) applied to safeguard the integrity and authenticity of the software.

Release Date: 09/20/2018
Code of Conduct for GDPR Compliance - Japanese Translation

Code of Conduct for GDPR Compliance - Japanese Translation

説明: 本書「GDPR 準拠の為の行動規範」は、Cloud Security Alliance (CSA)が公開している「CODE OF CONDUCT FOR GDPR COMPLIANCE」の日本語訳および一般社団法人日本クラウドセキュリティアライア ンス(CSAジャパン)が解説を加えたものです。本書は、CSAジャパンが、CSAの許可を得て翻訳し、公開 するものです。原文と日本語版の内容に相違があった場合には、原文が優先されます。

Release Date: 09/14/2018
CSA Malaysia FSI Report

CSA Malaysia FSI Report

The “Cloud Adoption in the Malaysian Financial Services Industry (FSI) sector” survey was undertaken by CSA to understand and evaluate cloud adoption trends and concerns in the FSI in that country.

Release Date: 08/20/2018
Top Threats to Cloud Computing: Deep Dive

Top Threats to Cloud Computing: Deep Dive

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its foundation. Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor, spanning from threats and vulnerabilities to end controls and mitigations. We encourage architects and engineers to use this information as a starting point for their own analysis and comparisons.

Release Date: 08/08/2018
OWASP Secure Medical Devices Deployment Standard

OWASP Secure Medical Devices Deployment Standard

With the explosion of botnets and other malware that now target IoT devices (of which medical devices can be considered a subtype) the need for security-minded deployments of medical devices is now more essential than ever. This guide is intended to serve as comprehensive guide to the secure deployment of medical devices within a healthcare facility.

Release Date: 08/07/2018
Security Position Paper Network Function Virtualization - Chinese Translation

Security Position Paper Network Function Virtualization - Chinese Translation

近五年来,随着云基础设施的能力和复杂性飞速演进,安全风险也相应上升。 虽然虚拟化已不是一个很新的概念,但几乎任何人都可以对计算、存储、网络和应 用程序等资源进行虚拟化的想法会增加安全威胁的影响和速度。同时,全球地缘政 治格局已从由机遇驱动的网络攻击转变为资金充足的国家行动

Release Date: 08/03/2018
Using BlockChain Technology to Secure the Internet of Things - Chinese Translation

Using BlockChain Technology to Secure the Internet of Things - Chinese Translation

在过去的四年中,技术专家、首席数字官、营销经理、记者、博客作者和研究机构讨论 并 推广了一种新的分布式模型,将区块链技术应用于安全事务处理和存储。国际数据公司 IDC FutureScape 预测,到 2020 年,全球 20%的贸易融资将纳入区块链。

Release Date: 08/03/2018
Security Guidance v4.0 - Chinese Translation

Security Guidance v4.0 - Chinese Translation

欢迎来到云安全联盟关于云计算关键领域安全指南的第四个版本。云计算的兴起是一项不 断发展的技术,它带来了许多机遇和挑战。通过这个文档,我们的目标是提供指导和灵感来支 持业务目标,同时管理和减轻采用云计算技术相关的风险。

Release Date: 08/03/2018
GEAB State of the Cloud 2018 - Chinese Translation

GEAB State of the Cloud 2018 - Chinese Translation

云安全联盟全球企业顾问委员会成立于2016年,是由十多位行业的大型跨国公 司的顶尖专家组成的代表团队。该委员会的成立是为了表达大型IT终端用户的观点, 并融合云计算使用者信息安全相关的观点。

Release Date: 08/03/2018
CSA Code of Conduct for GDPR Compliance - Chinese Translation

CSA Code of Conduct for GDPR Compliance - Chinese Translation

云安全联盟 CSA 近期发布了 CoC for GDPR Compliance(CSA GDPR 合规行为准则),旨 在为云服务提供商(CSP)、云消费者、及相关企业提供 GDPR 合规解决方案,并提供涉及云服 务提供商应提交的关于数据保护级别的透明性准则。这个准则为各种规模的客户提供工具来评 估其个人数据保护水平从而支持决策。它也指导任何规模和地点的云服务提供商,遵守欧盟 (EU)个人数据保护法规,并以结构化的方式披露其提供给客户的个人数据保护级别。

Release Date: 08/03/2018
Building a Foundation for Successful Cyber Threat Intelligence Exchange - Chinese Translation

Building a Foundation for Successful Cyber Threat Intelligence Exchange - Chinese Translation

描述: 当前网络攻击的频率和复杂程度在不断提高。攻击者可能是个人,也可能是资源丰富、 组织严密的团伙。面对这样的威胁,企业如果只关注内部防护措施,可能建成最后被绕过 “马其顿防线”;如果只依赖自身的情报能力,可能面临攻防不对等的窘境。为了解决上述问 题,网络威胁情报(CTI, Cyber Threat Intelligence)

Release Date: 08/03/2018
Cloud Security Alliance Code of Conduct for GDPR Compliance

Cloud Security Alliance Code of Conduct for GDPR Compliance

The CSA Code of Conduct is designed to offer both a compliance tool for GDPR compliance and transparency guidelines regarding the level of data protection offered by the Cloud Service Provider.

Release Date: 07/10/2018
CCM Mapping Methodology

CCM Mapping Methodology

Description: The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) provides fundamental security principles to guide cloud vendors and cloud customers seeking to assess the overall security risk of a cloud service. The CSA CCM provides a detailed controls framework that is aligned with Cloud Security Alliance’s Security Guidance in 16 domains.

Release Date: 07/09/2018
Firmware Integrity in the Cloud Data Center

Firmware Integrity in the Cloud Data Center

Description: This paper presents the point of view from key stakeholders in datacenter development regarding how to build cloud infrastructure using secure servers and in order to enable customers to trust the cloud provider’s infrastructure at the hardware/firmware level. In general, security of a cloud server at the firmware level is comprised of two equally important aspects – integrity and quality of the firmware code.

Release Date: 06/12/2018
Software Defined Perimeter Glossary

Software Defined Perimeter Glossary

Description: The Software Defined Perimeter (SDP) Glossary is a reference document that brings together SDP related terms and definitions from various professional resources. The terms and supporting information in the SDP glossary cover a broad range of areas, including the components of SDP and common supporting technologies.

Release Date: 06/12/2018
The State of Post-Quantum Cryptography

The State of Post-Quantum Cryptography

Description: Most people pay little attention to the lock icon on their browser’s address bar that signifies a secure connection called HTTPS. This connection establishes secure communications by providing authentication of the website and web server as well as encryption of communications between the client and server. If the connection is not secure, then a user may be vulnerable to malicious exploits such as malware injection, hijacking of financial transactions or stealing the user’s private information.

Release Date: 05/23/2018
The Treacherous 12 – Top Threats to Cloud Computing + Industry Insights - Japanese Translation

The Treacherous 12 – Top Threats to Cloud Computing + Industry Insights - Japanese Translation

誰も予測できなかった速さで、クラウドコンピューティングはビジネスや政府に等しく変容を迫り、そ して新たなセキュリティ課題をもたらしている。クラウドのサービスモデルが開発されることで、ビジ ネスを支える技術はかつてないほど効率性の高いものになった。サーバを保有する発想からサービ ス利用ベースの思考への転換は、IT 部門にコンピューティングとアプリケーションの企画 ・設計 ・提供 に関する考え方の刷新を迫っている。一方でこうした進化は新たなセキュリティ上の脆弱性を生み、

Release Date: 05/21/2018
A Day Without Safe Cryptography

A Day Without Safe Cryptography

Description: Over the past fifty years, the digital age has sparked the creation of a remarkable infrastructure through which a nearly infinite variety of digital transactions and communications are executed, enabling businesses, education, governments, and communities to thrive and prosper. Millions of new devices are connecting to the Internet, creating, processing, and transferring digital information in greater volumes and with greater velocity than ever imagined.

Release Date: 04/19/2018