Cloud 101CircleEventsBlog
CSA's Continuous Audit Metrics Working Group is expanding! Help shape the future of cloud assurance.

Defining 12 CSA Research Topics

Defining 12 CSA Research Topics

Blog Article Published: 02/09/2024

Written by Megan Theimer, Content Program Specialist, CSA.

CSA Research is created by the industry, for the industry. Subject matter experts from a wide array of backgrounds and experiences volunteer for our working groups. Each of these working groups focuses on a unique topic or aspect of cloud security, including AI, IoT, DevSecOps, and much more. Then, every month, research publications created by these working groups and reviewed by the industry are released on the CSA website, free for anyone to download and read.

In this article, we’ve defined 12 CSA research topics that you might not be familiar with. But remember - this is just a small sampling of the many domains that CSA covers. Make sure to check out the full list on our website.

1. Application Container

A construct designed to package and run an application or its components running on a shared operating system. Application containers are isolated from other application containers and share the resources of the underlying operating system.

Implement a secure application container architecture.

2. Microservices Architecture

A software development approach and architectural style, consisting of basic elements that result from the architectural decomposition of an application’s components into loosely coupled patterns consisting of self-contained services that use a standard communications protocol and a set of well-defined APIs, independent of any vendor, product, or technology.

Learn best practices for implementing a secure microservices architecture.

3. Artificial Intelligence (AI)

Computer systems simulating human intelligence, allowing them to perform tasks that used to have to be delegated to humans.

Review the security implications of ChatGPT and other generative AI.

4. DevSecOps

Short for development, security, and operations, this model automates the integration of security at every phase of the software development lifecycle, from initial design through integration, testing, deployment, and software delivery.

Understand the six pillars of DevSecOps.

5. Distributed Ledger

A consensus of replicated, shared, and synchronized digital data spread across multiple sites with no central administrator or centralized data storage. A peer-to-peer network and consensus algorithms are needed to ensure replication across nodes.

Deploy distributed ledger solutions that are secure, cost-effective, and compliant.

6. Blockchain

A distributed database that maintains a continuously-growing list of ordered records called blocks. Each block contains a timestamp and a link to a previous block. Once recorded, the data in a block cannot be altered retroactively.

Review ten attacks that provide lessons on how to develop secure blockchain applications.

7. Industrial Control Systems (ICS)

Control systems often found in the industrial sectors, consisting of combinations of control components (e.g., electrical, mechanical) that act together to achieve an industrial objective (e.g., manufacturing, transportation). These systems incorporate digital and networked components to monitor and control the system.

Learn about the benefits of leveraging cloud computing for ICS.

8. Internet of Things (IoT)

The network of physical objects or equipment that are embedded with sensors, software, and other technologies that facilitate communication between devices and the cloud, as well as between the devices themselves.

Evaluate and implement an IoT system for your organization.

9. Post-Quantum Cryptography

The set of cryptographic schemes which will remain secure even in a world where quantum computers exist. This includes, but is not limited to, quantum cryptosystems such as QKD, algorithmic-based cryptosystems such as lattice-based cryptosystems, and symmetric key cryptosystems such as AES.

Prepare for the post-quantum world with these actionable steps.

10. Serverless

An execution model for the cloud that gives users/developers the ability to build and run applications and services without thinking about servers. Applications are built faster, launched only as needed, and the management of the infrastructure is no longer required.

Learn best practices and recommendations for securing serverless architectures.

11. Software Defined Perimeter (SDP)

A network security architecture that is implemented to provide security at Layers 1-7 of the OSI network stack. An SDP implementation hides assets and uses a single packet to establish trust via a separate control and data plane prior to allowing connections to hidden assets.

Understand the architectural components, interactions, and basic security communications protocol for SDP.

12. Telehealth

The use of innovative technologies, such as kiosks, website monitoring applications, mobile phone applications, wearable devices, and videoconferencing, to remotely connect health care providers to patients.

Ensure the privacy and security of telehealth patient information in the cloud.

Check out all CSA research topics and our working groups’ latest publications.