Cloud 101CircleEventsBlog
Help shape the future of cloud security! Take our quick survey on SaaS Security and AI.

CSA Research

Best practices, guidance, frameworks and tools to help the industry secure the cloud. Read our research to get your questions around cloud security answered.
Research

CSA Research is created by the industry for the industry and is both vendor-neutral and consensus driven. Our research is created by subject matter experts who volunteer for our working groups. Each working group focuses on a unique topic or aspect of cloud security, from IoT, DevSecOps, Serverless and more, we have working groups for over 20 areas of cloud computing. You can view a list of all active research working groups. To find out more about how our research is created and the process we follow you can view the CSA Research Lifecycle.

Contribute to CSA Research

Peer reviews allow security professionals from around the world to collaborate on CSA research. Provide your feedback on the following documents in progress.

Publications in Review
Open Until

Latest Research

Don’t Panic! Getting Real about AI Governance

Don’t Panic! Getting Real about AI Governance

Release Date: 09/18/2024

The excitement around Generative AI and its potential business value continues to grow. A major factor is AI systems' emerging capability to mimic human-level (non-deterministic) judgment. Although these advancements do present significant opportunities, they also come with a wide range of new...
The State of Non-Human Identity Security

The State of Non-Human Identity Security

Release Date: 09/11/2024

Non-human identities (NHIs) include bots, API keys, service accounts, OAuth tokens, and secrets. These identities keep today’s organizations running smoothly by automating tasks, boosting efficiency, and driving innovation. However, NHIs also operate 24/7, handle sensitive information, and...
Confidential Computing Working Group Charter 2024

Confidential Computing Working Group Charter 2024

Release Date: 09/10/2024

The working group is tasked with exploring and implementing Confidential Computing technologies to enhance data security across various industries. This group's scope encompasses developing and promoting standards and best practices for the deployment and management of Trusted Execution...