CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | CSA IoT Security Controls Framework v2 The IoT Security Controls Framework is relevant for enterprise IoT systems that incorporate multiple types of connected devices, cloud services, and networki... Request to download |
![]() | Guide to the Internet of Things (IoT) Security Controls Framework v2 The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework v2 spreadsheet. This guide... Request to download |
![]() | Earning Trust in the 21st Century This paper addresses the technical, social, policy, and regulatory issues associated with creating trust frameworks in a Zero Trust world. Industry and gover... Request to download |
![]() | Cloud Controls Matrix v4 The CCM, the only meta-framework of cloud-specific security controls, mapped to leading standards, best practices and regulations. CCM provides organizations... Request to download |
![]() | Turkey Cloud Adaptation Survey – Turkey vs EU comparison In the last quarter of 2020 as a comprehensive CSA Global's done all over the world "Cloud Computing and Cloud Technology Use in Transition Survey" which mad... Request to download |
![]() | APAC Data Sovereignty Working Group Charter The proposed charter outlines the scope, responsibilities, issues to address, align and guide the working group. Request to download |
![]() | Mitigating Hybrid Clouds Risks - Turkish Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated c... Request to download |
![]() | The 12 Most Critical Risks for Serverless Applications - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated c... Request to download |
![]() | Software-Defined Perimeter Zero Trust Charter The proposed charter outlines the scope, responsibilities, etc. to align and guide the working group through the year 2021. Request to download |
![]() | Enterprise Architecture to CCM Shared Responsibility Model The EA-CCM Shared Responsibility Model is a companion piece with the EA-CCM Mapping. The peer review for both documents are intended to be done in parallel. ... Request to download |
![]() | Enterprise Architecture to CCM v3.0.1 Mapping The EA-CCM Mapping is a companion piece with the EA-CCM Shared Responsibility Model. The peer review for both documents are intended to be done in parallel. ... Request to download |
![]() | Cloud-Based, Intelligent Ecosystems This paper proposes a call to action for security executives to break the endless cycle of iterative tool adoption and, instead, move to data-centric securit... Request to download |
![]() | Requirements for Bodies Providing STAR Certification This document outlines how to conduct a STAR certification assessments to the Cloud Controls Matrix (CCM) as part of an ISO 27001 assessment. Request to download |
![]() | Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated c... Request to download |
![]() | The 2020 State of Identity Security in the Cloud The use of cloud services have continued to increase over the past decade. Particularly in the wake of the COVID-19 public health crisis, many enterprises di... Request to download |
![]() | Best Practices in Implementing a Secure Microservices Architecture - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated c... Request to download |
![]() | Key Management when using Cloud Services The purpose of this document is to provide guidance for using Key Management Systems (KMS) with cloud services, whether the key management system is native t... Request to download |
![]() | Cloud Controls Matrix v3.0.1 ISO Reverse Mapping This latest expansion to the CCM incorporates the ISO/IEC 27017:2015:2015 and ISO/IEC 27018:20147:2015 and ISO/IEC 27002:2013 controls, introduces a new appr... Request to download |
![]() | Mitigating Hybrid Clouds Risks The purpose of this document is to provide guidance for the countermeasures to the risks, threats, and vulnerabilities in hybrid cloud environments. Request to download |
![]() | Cloud OS Security Specification v2.0 Currently, most of the standards related to cloud computing security focus on information security management systems (ISMS), and corresponding certification... Request to download |