ChaptersCircleEventsBlog

CSA Research

Best practices, guidance, frameworks and tools to help the industry secure the cloud. Read our research to get your questions around cloud security answered.
Research

CSA Research is created by the industry for the industry and is both vendor-neutral and consensus driven. Our research is created by subject matter experts who volunteer for our working groups. Each working group focuses on a unique topic or aspect of cloud security, from IoT, DevSecOps, Serverless and more, we have working groups for over 20 areas of cloud computing. You can view a list of all active research working groups. To find out more about how our research is created and the process we follow you can view the CSA Research Lifecycle.

Contribute to CSA Research

Peer reviews allow security professionals from around the world to collaborate on CSA research. Provide your feedback on the following documents in progress.

Latest Research

Dynamic Process Landscape: A Strategic Guide to Successful AI Implementation

Dynamic Process Landscape: A Strategic Guide to Successful AI Implementation

Release Date: 06/02/2025

Artificial Intelligence (AI) adoption in business and manufacturing is failing at least twice as often as it succeeds. Companies are trying to integrate AI into outdated process structures that lack transparency, adaptability, and real-time data integration. Without a clear understanding of...
Agentic AI Red Teaming Guide

Agentic AI Red Teaming Guide

Release Date: 05/28/2025

Agentic AI systems represent a significant leap forward for AI. Their ability to plan, reason, act, and adapt autonomously introduces new capabilities and, consequently, new security challenges. Traditional red teaming methods are insufficient for these complex environments.

This publication...
Zero Trust Guidance for IoT

Zero Trust Guidance for IoT

Release Date: 05/27/2025

Traditional security models treat Internet of Things (IoT) security solely as a long-term supply chain concern. This is a significant oversight in today's rapidly evolving threat landscape. IoT security cannot be an afterthought when vulnerabilities introduced by IoT devices and their unique...