CSA Research Artifacts

Whitepapers, Reports and Other Resources

Home
Research Artifacts

Browse Research Artifacts

Requirements for Bodies Providing STAR Certification

Requirements for Bodies Providing STAR Certification
Release Date: 10/28/2019

This document outlines how to conduct a STAR certification assessments to the Cloud Controls Matrix (CCM) as part of an ISO 27001 assessment.

Request to download
Software-Defined Perimeter as a DDoS Prevention Mechanism

Software-Defined Perimeter as a DDoS Prevention Mechanism
Release Date: 10/27/2019

The primary goal of this document is to increase the awareness and understanding of SDP as a tool to prevent DDoS attacks by demonstrating its efficiency and...

Request to download

Guidance v4 Info Sheet
Release Date: 10/10/2019

This version, the first major update since 2011, is the culmination of over a year of dedicated research and public participation from the CSA community, wor...

Request to download
Guidelines for CPAs Providing CSA STAR Attestation v2

Guidelines for CPAs Providing CSA STAR Attestation v2
Release Date: 09/20/2019

Request to download

CAIQ v3.1
Release Date: 09/17/2019

Cloud Security Alliance (CSA) would like to present the next version of the Consensus Assessments Initiative Questionnaire (CAIQ) v3.1. The CAIQ offers a...

Request to download
Gap Analysis Report on Mapping CSA’s Cloud Controls Matrix to ‘Guideline on Effectively Managing Security Service in the Cloud’

Gap Analysis Report on Mapping CSA’s Cloud Controls Matrix to ‘Guideline on Effectively Managing Security Service in the Cloud’
Release Date: 09/05/2019

The report summarizes the mapping of CCM v3.0.1 to 'Guideline on Effectively Managing Security Services in the Cloud' and provides gap analysis on the results.

Request to download

Mapping of 'The Guidelines' Security Recommendations to CCM
Release Date: 09/05/2019

This document contains the additional controls that serves to bridge the gap between CCM V3.0.1 and the controls within 'Guideline on Effectively Managing Se...

Request to download
STAR Level and Scheme Requirements

STAR Level and Scheme Requirements
Release Date: 09/04/2019

Request to download
Six Pillars of DevSecOps

Six Pillars of DevSecOps
Release Date: 08/07/2019

In our current state of cyber security, there has been a large growth of application flaws that bypass the continuing addition of security frameworks to ensu...

Request to download
Top Threats to Cloud Computing: Egregious Eleven

Top Threats to Cloud Computing: Egregious Eleven
Release Date: 08/06/2019

The report provides organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated risk-management deci...

Request to download
Cloud Controls Matrix v3.0.1

Cloud Controls Matrix v3.0.1
Release Date: 08/03/2019

Description: The CCM, the only meta-framework of cloud-specific security controls, mapped to leading standards, best practices and regula...

Request to download

CCM v3.0.1-080319
Release Date: 08/03/2019

The CCM, the only meta-framework of cloud-specific security controls, mapped to leading standards, best practices and regulations. CCM provides organizations...

Request to download

CSA CCM v3.0.1 Addendum - AICPA TSC 2017
Release Date: 08/03/2019

This document is an addendum to the CCM V3.0.1 that contain controls mapping between the CSA CCM and the AICPA TSC 2017. The document aims to help AICPA TSC ...

Request to download

CCM v3.0.1 Addendum - FedRAMP Moderate
Release Date: 08/03/2019

This document is an addendum to the CCM V3.0.1 that contain controls mapping between the CSA CCM and the FedRAMP R4 Moderate Baseline. The document aims t...

Request to download

CSA CCM v3.0.1 Addendum - NIST 800-53 Rev 4 Moderate
Release Date: 08/03/2019

This document is an addendum to the CCM V3.0.1 that contain controls mapping between the CSA CCM and the NIST 800-53 R4 Moderate Baseline. The document aims ...

Request to download
Information Security Management through Reflexive Security

Information Security Management through Reflexive Security
Release Date: 08/01/2019

This document defines “Reflexive Security” as a new security management approach that is built upon the interrelationships between security, development and ...

Request to download
Documentation of Relevant Distributed Ledger Technology and Blockchain Use Cases v2

Documentation of Relevant Distributed Ledger Technology and Blockchain Use Cases v2
Release Date: 07/31/2019

Thanks to the rise in popularity of Bitcoin cryptocurrency, the innovative technologies of Blockchain and other systems of distributed ledger technology (DLT...

Request to download
Best Practices for Implementing a Secure Application Container Architecture

Best Practices for Implementing a Secure Application Container Architecture
Release Date: 07/26/2019

Application containers and a microservices architecture are being used to design, develop and deploy applications leveraging agile software development appro...

Request to download

Takedown Tools and Services
Release Date: 07/25/2019

New Services and Tools for Cyber-Crime The H2020 EU funded project, Takedown, in which CSA participated along with 18 other partners-orga...

Request to download
Challenges in Securing Application Containers and Microservices

Challenges in Securing Application Containers and Microservices
Release Date: 07/16/2019

Application containers and a microservices architecture are being used to design, develop and deploy applications leveraging agile software development appro...

Request to download