Cloud 101CircleEventsBlog
Our website will be down for scheduled maintenance on February 13th from 4:00 PM to 5:00 PM PST. We apologize for any inconvenience and appreciate your patience!

CSA Research

Best practices, guidance, frameworks and tools to help the industry secure the cloud. Read our research to get your questions around cloud security answered.
Research

CSA Research is created by the industry for the industry and is both vendor-neutral and consensus driven. Our research is created by subject matter experts who volunteer for our working groups. Each working group focuses on a unique topic or aspect of cloud security, from IoT, DevSecOps, Serverless and more, we have working groups for over 20 areas of cloud computing. You can view a list of all active research working groups. To find out more about how our research is created and the process we follow you can view the CSA Research Lifecycle.

Contribute to CSA Research

Peer reviews allow security professionals from around the world to collaborate on CSA research. Provide your feedback on the following documents in progress.

Publications in Review
Open Until
Feb 17, 2025

Latest Research

Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Japanese Translation

Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Japanese Translation

Release Date: 02/11/2025

Cybersecurity for small businesses involves unique and heightened challenges. This makes the adoption of a Zero Trust strategy critical for safeguarding their assets and data. Zero Trust is a security strategy that leverages long-standing principles like least privilege and “never trust, always...
Cloud Security for Startups 2024 - Japanese Translation

Cloud Security for Startups 2024 - Japanese Translation

Release Date: 02/11/2025

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

Volunteers...
Cybersecurity and the Data Lifecycle

Cybersecurity and the Data Lifecycle

Release Date: 02/10/2025

The data lifecycle refers to the comprehensive process that data undergoes, from its creation to its eventual disposal. Understanding and securing each phase of this lifecycle is essential for protecting data's confidentiality, integrity, and availability (also known as the CIA Triad).

Securing...