CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Confidence in Post Quantum Algorithms

Confidence in Post Quantum Algorithms
Release Date: 02/25/2021

NIST made the recent announcement of its Round 3 candidates for future post-quantum cryptography or quantum safe standards. As the world prepares to transiti...

Request to download
Cloud Incident Response Working Group Charter

Cloud Incident Response Working Group Charter
Release Date: 02/14/2021

In today’s connected era, a comprehensive incident response strategy is an integral aspect of any organization aiming to manage and lower their risk profile....

Request to download
Blockchains in the Quantum Era

Blockchains in the Quantum Era
Release Date: 02/05/2021

Digital Ledger Technologies (DLT) such as blockchain are being deployed as part of diverse applications that span multiple market segments. Application devel...

Request to download
CSA IoT Security Controls Framework v2

CSA IoT Security Controls Framework v2
Release Date: 01/28/2021

The IoT Security Controls Framework is relevant for enterprise IoT systems that incorporate multiple types of connected devices, cloud services, and networki...

Request to download
Guide to the Internet of Things (IoT) Security Controls Framework v2

Guide to the Internet of Things (IoT) Security Controls Framework v2
Release Date: 01/28/2021

The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework v2 spreadsheet. This guide...

Request to download
Earning Trust in the 21st Century

Earning Trust in the 21st Century
Release Date: 01/26/2021

This paper addresses the technical, social, policy, and regulatory issues associated with creating trust frameworks in a Zero Trust world. Industry and gover...

Request to download
Cloud Controls Matrix v4

Cloud Controls Matrix v4
Release Date: 01/20/2021

The CCM, the only meta-framework of cloud-specific security controls, mapped to leading standards, best practices and regulations. CCM provides organizations...

Request to download
Turkey Cloud Adaptation Survey – Turkey vs EU comparison

Turkey Cloud Adaptation Survey – Turkey vs EU comparison
Release Date: 01/13/2021

In the last quarter of 2020 as a comprehensive CSA Global's done all over the world "Cloud Computing and Cloud Technology Use in Transition Survey" which mad...

Request to download
APAC Data Sovereignty Working Group Charter

APAC Data Sovereignty Working Group Charter
Release Date: 01/12/2021

The proposed charter outlines the scope, responsibilities, issues to address, align and guide the working group.

Request to download
Mitigating Hybrid Clouds Risks - Turkish Translation

Mitigating Hybrid Clouds Risks - Turkish Translation
Release Date: 01/12/2021

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated c...

Request to download
The 12 Most Critical Risks for Serverless Applications - Japanese Translation

The 12 Most Critical Risks for Serverless Applications - Japanese Translation
Release Date: 01/12/2021

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated c...

Request to download
Software-Defined Perimeter Zero Trust Charter

Software-Defined Perimeter Zero Trust Charter
Release Date: 12/29/2020

The proposed charter outlines the scope, responsibilities, etc. to align and guide the working group through the year 2021.

Request to download
Enterprise Architecture to CCM Shared Responsibility Model

Enterprise Architecture to CCM Shared Responsibility Model
Release Date: 12/18/2020

The EA-CCM Shared Responsibility Model is a companion piece with the EA-CCM Mapping. To review the EA-CCM Mapping, follow this link. (https://cloudsecuritya...

Request to download
Enterprise Architecture to CCM v3.0.1 Mapping

Enterprise Architecture to CCM v3.0.1 Mapping
Release Date: 12/18/2020

The EA-CCM Mapping is a companion piece with the EA-CCM Shared Responsibility Model. To review the Shared Responsibility Model, follow this link. (http://cl...

Request to download
Cloud-Based, Intelligent Ecosystems

Cloud-Based, Intelligent Ecosystems
Release Date: 12/10/2020

This paper proposes a call to action for security executives to break the endless cycle of iterative tool adoption and, instead, move to data-centric securit...

Request to download
Requirements for Bodies Providing STAR Certification

Requirements for Bodies Providing STAR Certification
Release Date: 12/03/2020

This document outlines how to conduct a STAR certification assessments to the Cloud Controls Matrix (CCM) as part of an ISO 27001 assessment.

Request to download
Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Japanese Translation

Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Japanese Translation
Release Date: 11/30/2020

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated c...

Request to download
The 2020 State of Identity Security in the Cloud

The 2020 State of Identity Security in the Cloud
Release Date: 11/19/2020

The use of cloud services have continued to increase over the past decade. Particularly in the wake of the COVID-19 public health crisis, many enterprises di...

Request to download
Best Practices in Implementing a Secure Microservices Architecture - Japanese Translation

Best Practices in Implementing a Secure Microservices Architecture - Japanese Translation
Release Date: 11/18/2020

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated c...

Request to download
Key Management when using Cloud Services

Key Management when using Cloud Services
Release Date: 11/09/2020

The purpose of this document is to provide guidance for using Key Management Systems (KMS) with cloud services, whether the key management system is native t...

Request to download