Cloud 101CircleEventsBlog
Save the date for CSA's 2024 Cyber Monday Sale: Get 50% off the exam token bundle!

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Top Concerns With Vulnerability Data

Top Concerns With Vulnerability Data
Release Date: 11/11/2024

The top vulnerability management frameworks used today include the Common Vulnerabilities and Exposures (CVE) program and the Common Vulnerability Scoring...

Request to download
Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives

Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives
Release Date: 11/05/2024

This publication explores the use of asymmetric cryptography in Zero Trust. Asymmetric cryptography provides an industry-standard, secure method to establ...

Request to download
The State of Multi-Cloud Identity Survey

The State of Multi-Cloud Identity Survey
Release Date: 10/29/2024

Enterprises encounter significant obstacles when adopting multi-cloud. Namely, harmonizing hybrid and cloud identity systems for secure integration. Ident...

Request to download
Zero Trust Guidance for Critical Infrastructure

Zero Trust Guidance for Critical Infrastructure
Release Date: 10/28/2024

In most nations, the health of public services relies on secure and resilient Critical Infrastructure. We call these infrastructures "critical" because th...

Request to download
Security Guidance for Critical Areas of Focus in Cloud Computing v5 - Japanese Translation

Security Guidance for Critical Areas of Focus in Cloud Computing v5 - Japanese Translation
Release Date: 10/22/2024

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
AI Organizational Responsibilities - Governance, Risk Management, Compliance and Cultural Aspects

AI Organizational Responsibilities - Governance, Risk Management, Compliance and Cultural Aspects
Release Date: 10/21/2024

Continuing CSA's efforts to address the evolving AI landscape, this latest publication covers AI governance, risk management, and culture. Understand vari...

Request to download
NIST CSF v2 Cloud Community Profile - Based on CCM v4

NIST CSF v2 Cloud Community Profile - Based on CCM v4
Release Date: 10/15/2024

The CSFv2.0 Cloud Community Profile aligns the Cloud Controls Matrix (CCM) version 4.0 with the Cybersecurity Framework (CSF) version 2.0 by mapping equiv...

Request to download
Informative Reference Details for the Mapping of CCM v4 to NIST CSF v2

Informative Reference Details for the Mapping of CCM v4 to NIST CSF v2
Release Date: 10/08/2024

The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices for securing cloud...

Request to download
AI in Medical Research: Applications & Considerations

AI in Medical Research: Applications & Considerations
Release Date: 09/25/2024

The advent of artificial intelligence (AI) has brought about a paradigm shift in numerous fields. AI technologies can process vast amounts of data, recogn...

Request to download
AI Organizational Responsibilities - Core Security Responsibilities - Korean Translation

AI Organizational Responsibilities - Core Security Responsibilities - Korean Translation
Release Date: 09/24/2024

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
AI Resilience: A Revolutionary Benchmarking Model for AI Safety - Japanese Translation

AI Resilience: A Revolutionary Benchmarking Model for AI Safety - Japanese Translation
Release Date: 09/23/2024

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Don’t Panic! Getting Real about AI Governance

Don’t Panic! Getting Real about AI Governance
Release Date: 09/18/2024

The excitement around Generative AI and its potential business value continues to grow. A major factor is AI systems' emerging capability to mimic human-l...

Request to download
The State of Non-Human Identity Security

The State of Non-Human Identity Security
Release Date: 09/11/2024

Non-human identities (NHIs) include bots, API keys, service accounts, OAuth tokens, and secrets. These identities keep today’s organizations running smoot...

Request to download
Confidential Computing Working Group Charter 2024

Confidential Computing Working Group Charter 2024
Release Date: 09/10/2024

The working group is tasked with exploring and implementing Confidential Computing technologies to enhance data security across various industries. This g...

Request to download
Zero Trust Guiding Principles v1.1

Zero Trust Guiding Principles v1.1
Release Date: 09/03/2024

Zero Trust is a strategic mindset that is highly useful for organizations to adopt as part of their digital transformations. Based on the idea of "never t...

Request to download
Data Privacy Engineering Working Group Charter 2024

Data Privacy Engineering Working Group Charter 2024
Release Date: 08/29/2024

The Data Privacy Engineering Working Group (DPE WG) is chartered with the mission to integrate privacy-centric methodologies into development workflows, a...

Request to download
Fully Homomorphic Encryption Working Group Charter 2024

Fully Homomorphic Encryption Working Group Charter 2024
Release Date: 08/29/2024

Through the use and deployment of cryptographic libraries, specialist software toolchains, and dedicated hardware and infrastructure, Fully Homomorphic En...

Request to download
Securing LLM Backed Systems: Essential Authorization Practices

Securing LLM Backed Systems: Essential Authorization Practices
Release Date: 08/13/2024

Organizations are increasingly leveraging Large Language Models (LLMs) to tackle diverse business problems. Both existing companies and a crop of new star...

Request to download
Strengthening Research Integrity with High-Performance Computing (HPC) Security

Strengthening Research Integrity with High-Performance Computing (HPC) Security
Release Date: 08/07/2024

High-Performance Computing (HPC) systems aggregate computing resources to gain performance greater than that of a single workstation. HPC systems have bec...

Request to download
Using AI for Offensive Security

Using AI for Offensive Security
Release Date: 08/06/2024

Offensive security involves proactively simulating an attacker’s behavior by using tactics and techniques similar to those of an adversary to identify sys...

Request to download