CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | CSA Data Lake Threat Modeling As cloud platforms expand further and further into business uses, the need to understand the attack surface to your data becomes much more apparent. With ... Request to download |
![]() | Data Loss Prevention and Data Security Survey Report As the traditional perimeter is reduced or eliminated with the move to remote and hybrid work, and as Zero Trust strategies gain popularity, data security... Request to download |
![]() | Internet of Things (IoT) Working Group Charter 2023 This charter lays out the scope, responsibilities, and roadmap for the Internet of Things Working Group. The Cloud Security Alliance Internet of Things (I... Request to download |
![]() | Quantum-Safe Security Working Group Charter 2023 The focus of the Quantum‐Safe Security Working Group is on cryptographic methods that will remain safe after the widespread availability of the quantum co... Request to download |
![]() | Health Information Management Working Group Charter 2023 The Health Information Management Working Group aims to directly influence how health information service providers deliver secure cloud solutions (servic... Request to download |
![]() | CSA CCM v4.0 Addendum - IBM Cloud Framework for Financial Services v1.1.0 This document is a CSA CCM v4.0 addendum to the IBM Cloud Framework for Financial Services v1.1.0 that contains controls mapping between the CCM and the I... Request to download |
![]() | STAR Enabled Solutions FAQ A STAR Enabled Solution is a product or service that utilizes the CCM framework or the Consensus Assessment Initiative Questionnaire (CAIQ). Their technol... Request to download |
![]() | Telesurgery Tabletop Guide Book The purpose of this guidebook is to assist healthcare providers in planning and facilitating a discussion and evaluation of the procedural response action... Request to download |
![]() | ACSP Training Course Outline | CSA An outline of the topics covered and what you'll be building in the labs each day of the Advanced Cloud Security Practitioner (ACSP) Training. Cloud Secur... Request to download |
![]() | Deconstructing Application Connectivity Challenges in a Complex Cloud Environment The production and use of SaaS applications in organizations has grown exponentially over the past several years. Application Security has become an integ... Request to download |
![]() | The Six Pillars of DevSecOps - Pragmatic Implementation This document provides a high-level overview of the various tools and processes that should be considered when building out a successful DevSecOps program... Request to download |
![]() | Customer Zero Trust Implementation Journey Presentation Recording of the customer Zero Trust Implementation Journey Presentation by Pam Kubiatowski to the CSA ZT workgroup about her global network transformatio... Request to download |
![]() | CSA CCM v4.0 Addendum - Spain National Security Framework (ENS) This document is an addendum to the CCM V4.0 that contains controls mapping between the CSA CCM and Spain's National Security Framework (ENS). The documen... Request to download |
![]() | Top Threats to Cloud Computing - Pandemic Eleven - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Zero Trust as a Security Philosophy When implemented correctly, a Zero Trust architecture/strategy/approach to Information Technology, and the architecture that supports it, has the potentia... Request to download |
![]() | Understanding Cloud Data Security and Priorities BigID commissioned CSA to develop a survey and report to better understand the industry’s knowledge, attitudes, and opinions regarding data security in th... Request to download |
![]() | SaaS Governance Best Practices for Cloud Customers In the context of cloud security, the focus is almost always on securing Infrastructure-as-a-Service (IaaS) environments. This is despite the reality that... Request to download |
![]() | CSA CCM v4.0 Addendum - ISMAP This document is an addendum to the CCM V4.0 that contain controls mapping between the CSA CCM and Japan's Information System Security Management and Asse... Request to download |
![]() | Healthcare Interoperability When Health Information Technology systems seamlessly exchange data with each other, it is referred to as interoperability. Interoperability occurs when i... Request to download |
![]() | Recommendations for using a Customer Controlled Key Store In the latest from the Cloud Key Management working group, this document provides guidance on how to assess and implement cloud key management services co... Request to download |