Circle
Events
Blog

CSA Research

Best practices, guidance, frameworks and tools to help the industry secure the cloud. Read our research to get your questions around cloud security answered.
Research

CSA Research is created by the industry for the industry and is both vendor-neutral and consensus driven. Our research is created by subject matter experts who volunteer for our working groups. Each working group focuses on a unique topic or aspect of cloud security, from IoT, DevSecOps, Serverless and more, we have working groups for over 20 areas of cloud computing. You can view a list of all active research working groups. To find out more about how our research is created and the process we follow you can view the CSA Research Lifecycle.

Join a Working Group Meeting

Community
Begins at
Enterprise Resource Planning Working Group
Cloud Key Management Working Group
Blockchain/Distributed Ledger Working Group

Contribute to CSA Research

Peer reviews allow security professionals from around the world to collaborate on CSA research. Provide your feedback on the following documents in progress.

Latest Research

Artificial Intelligence in Healthcare

Artificial Intelligence in Healthcare

Release Date: 01/06/2022

Artificial intelligence (AI) now has the potential to be integrated into all aspects of healthcare, from management to delivery and diagnosis. These advancements can help improve clinical outcomes, reduce cost, and improve population health. However, there remain some issues with AI that must be addressed. These include ethical and legal issues, a lack of data exchange, regulatory compliance requirements, and patient and provider adoption. This document from our Health Information Management Working Group provides an overview of the fu...

Corda Enterprise 4.8 - Architecture Security Report

Corda Enterprise 4.8 - Architecture Security Report

Release Date: 12/15/2021

Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many of these workflows involve transactions and custody of value in the form of digital assets or other high-value data, cybersecurity attributes such as privacy, confidentiality, integrity, and availability certainly take center stage in the blockchain space. This report from our Blockchain/Distribu...

Corda Enterprise 4.8 - Security Controls Checklist

Corda Enterprise 4.8 - Security Controls Checklist

Release Date: 12/15/2021

In this spreadsheet, our Blockchain/Distributed Ledger Working Group delivers a fully implementable security controls checklist for the blockchain framework Corda Enterprise 4.8. These controls are aligned with the NIST Cybersecurity Framework’s controls to proactively prevent, detect and respond to the risks of Fabric 2.0, thus mitigating the business impacts downstream caused by loss of trade, trust, and ownership. In the accompanying Corda Enterprises ...