CSA Research

Security through innovation.
Innovation through collaboration.

Research

Research Artifacts

Best Practices in Implementing a Secure Microservices Architecture
Best Practices in Implementing a Secure Microservices Architecture

Application containers and a microservices architecture are being used to design, develop, and deploy applications leveraging agile software...

The Six Pillars of DevSecOps: Collective Responsibility
The Six Pillars of DevSecOps: Collective Responsibility

The DevSecOps Working Group identified and defined six focus areas critical to integrating DevSecOps into an organization, in accordance with...

Critical Controls Implementation for SAP
Critical Controls Implementation for SAP

The Critical Controls Implementation for SAP is the first in a series of implementation documents that the CSA ERP Security Working Group aim...

Top Threats to Cloud Computing: Egregious Eleven
Top Threats to Cloud Computing: Egregious Eleven

The report provides organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated risk...

Cloud Controls Matrix v3.0.1
Cloud Controls Matrix v3.0.1

Description: The CCM, the only meta-framework of cloud-specific security controls, mapped to leading standards, best practices and regulation...

SDP Architecture Guide v2
SDP Architecture Guide v2

Software Defined Perimeter (SDP) Architecture Guide is designed to leverage proven, standards-based components to stop network attacks agains...

CSA Guide to the IoT Security Controls Framework
CSA Guide to the IoT Security Controls Framework

The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework spreadshee...

Best Practices for Cyber Incident Exchange
Best Practices for Cyber Incident Exchange

Description: No organization is immune from cyber attack. Malicious actors collaborate with skill and agility, effectively moving from target...

Future Proofing the Connected World
Future Proofing the Connected World

An IoT system is only as secure as its weakest link, this document is our attempt at providing actionable and useful guidance for securing t...

Research Insights

Build a Robust App Control Strategy for your Cloud Workloads

June 2, 2020, Itai Tevet, CEO at Intezer

CSA CloudBytes Figure

Upcoming Meetings

Community
Begins at
Cloud Key Management Working Group
Continuous Audit Metrics Working Group
Enterprise Resource Planning Working Group

Contribute to CSA Research

Artifact reviews allow security professionals from around the world to collaborate on CSA research. Provide your feedback on the following documents in progress.

Collaborating with CSA

Research Lifecycle Figure

Research Lifecycle

A step-by-step look at the research process, from proposal to publication.

 

Research Volunteer FAQ

Contributors to research are composed of solution providers, end users, subject matter experts, and key stakeholders in cloud and related technologies. Join the movement!

Research Volunteer FAQ Figure
 

Thank You Research Contributors!

Research awards recognize individuals who demonstrate significant accomplishments and contribution to CSA research. Annual and long-term achievement awards are bestowed to those who also reflect industry leadership, community participation and passion for volunteerism.

Thank You Research Contributors
 

Featured Working Groups

Artificial intelligence

As we move forward into the future of automation, AI is proving to be playing a critical role in the realm of both cyber and cloud security. The ability to learn at a rate that AI does makes it extremely important...

Blockchain

Blockchain and distributed ledger technology is an innovative and continuously evolving technology that has far reaching security implications beyond the financial services industries.

Cloud Controls Matrix

The Cloud Controls Matrix (CCM) working group supports CSA’s industry-leading meta-framework for cloud security assurance. The working group conducts controls mapping projects with the aim of identifying and analysing compliance gaps.

DevSecOps

Changing the mindset of the industry and establishing fundamental principles to enhance the development, security, and operations during project lifecycles.

Internet of Things

As the cloud environment expand to new technologies, the connected world depends on devices to manage, orchestrate, and provision data.

Software Defined Perimeter

The Software Defined Perimeter working grouped launched with the goal to develop a solution to stop network attacks against application infrastructure.