ChaptersEventsBlog
Register for DataSecAI 2025 in Dallas – Protect Data, Secure AI, and Drive Innovation

CSA Research

Best practices, guidance, frameworks and tools to help the industry secure the cloud. Read our research to get your questions around cloud security answered.
Research

CSA Research is created by the industry for the industry and is both vendor-neutral and consensus driven. Our research is created by subject matter experts who volunteer for our working groups. Each working group focuses on a unique topic or aspect of cloud security, from IoT, DevSecOps, Serverless and more, we have working groups for over 20 areas of cloud computing. You can view a list of all active research working groups. To find out more about how our research is created and the process we follow you can view the CSA Research Lifecycle.

Contribute to CSA Research

Peer reviews allow security professionals from around the world to collaborate on CSA research. Provide your feedback on the following documents in progress.

Latest Research

2022 Cybersecurity Forecast for Turkey

2022 Cybersecurity Forecast for Turkey

Release Date: 09/26/2025

At the beginning of 2022, The CSA Turkey Chapter published the “Cybersecurity Forecast Report for Turkey”. The report includes predictions regarding major cybersecurity events in 2021, legislation in Turkey, security concerns, and investment priorities for CISOs for 2022. 
SaaS Security Capability Framework (SSCF)

SaaS Security Capability Framework (SSCF)

Release Date: 09/23/2025

The SaaS Security Capability Framework (SSCF) is a new technical framework that defines configurable, consumable, and customer-facing security controls provided by SaaS vendors to their customers. 

The SSCF represents a comprehensive approach to security management in cloud-based software...
Analyzing Log Data with AI Models to Meet Zero Trust Principles

Analyzing Log Data with AI Models to Meet Zero Trust Principles

Release Date: 09/15/2025

Logs are fundamental to Zero Trust. They capture critical details about user activity, device behavior, network traffic, and application access. However, when companies generate massive volumes of log data, manual review becomes unrealistic.

This publication explores how AI/ML can automate log...