Help us improve our website. Provide feedback to [email protected]

CSA Research

Our research is dedicated to defining and advancing best practices in cloud computing and related technologies.


Research Artifacts

SDP Architecture Guide v2
SDP Architecture Guide v2

Software Defined Perimeter (SDP) Architecture Guide is designed to leverage proven, standards-based components to stop network attacks agains...

Top Threats to Cloud Computing: Deep Dive
Top Threats to Cloud Computing: Deep Dive

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its ...

Best Practices for Cyber Incident Exchange
Best Practices for Cyber Incident Exchange

Description: No organization is immune from cyber attack. Malicious actors collaborate with skill and agility, effectively moving from target...

Cloud Controls Matrix v3.0.1
Cloud Controls Matrix v3.0.1

Description: The CCM, the only meta-framework of cloud-specific security controls, mapped to leading standards, best practices and regulation...

Security Guidance for Critical Areas of Focus in Cloud Computing v4.0
Security Guidance for Critical Areas of Focus in Cloud Computing v4.0

The rise of cloud computing as an ever-evolving technology brings with it a number of opportunities and challenges. With this document, we ai...

Future Proofing the Connected World
Future Proofing the Connected World

Research Insights

CSA CloudBytes Webinars

A webinar series to educate the industry on trending topics, new technologies, the latest research, and all other matters related to the cloud.

CSA CloudBytes Figure

Research News

Thought leadership to share, educate and stimulate discussion around the latest topics in cloud and related technologies.

Contribute to CSA Research

Artifact reviews allow security professionals from around the world to collaborate on CSA research. Provide your feedback on the following documents in progress.

Collaborating with CSA

Research Lifecycle Figure

Research Lifecycle

A step-by-step look at the research process, from proposal to publication.


Research Volunteer FAQ

Contributors to research are composed of solution providers, end users, subject matter experts, and key stakeholders in cloud and related technologies. Join the movement!

Research Volunteer FAQ Figure

Thank You Research Contributors!

Research awards recognize individuals who demonstrate significant accomplishments and contribution to CSA research. Annual and long-term achievement awards are bestowed to those who also reflect industry leadership, community participation and passion for volunteerism.

Thank You Research Contributors

Featured Working Groups

The Cloud Controls Matrix (CCM) working group supports CSA’s industry-leading meta-framework for cloud security assurance. The working group conducts controls mapping projects with the aim of identifying and analysing compliance gaps.


Cloud Controls Matrix


Changing the mindset of the industry and establishing fundamental principles to enhance the development, security, and operations during project lifecycles.




As the cloud environment expand to new technologies, the connected world depends on devices to manage, orchestrate, and provision data.


Internet of Things