CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

CCM v4 - Chinese Translation

CCM v4 - Chinese Translation
Release Date: 10/26/2021

该中文版本的出版物是根据[原文](https://cloudsecurityalliance.org/artifacts/cloud-controls-matrix-v4/)进行汉化,由CSA大中华区及其志愿者翻译完成,但翻译的内容不属于[CSA研究院生命周期](https://cloudsecuritya...

Request to download
Software-Defined Perimeter (SDP) and Zero Trust - Chinese Translation

Software-Defined Perimeter (SDP) and Zero Trust - Chinese Translation
Release Date: 09/21/2020

A Zero Trust implementation using Software-Defined Perimeter enables organizations to defend new variations of old attack methods that are constantly surfaci...

Request to download
Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Chinese Translation

Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Chinese Translation
Release Date: 09/21/2020

The purpose of the report is to provide organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated ...

Request to download
Guide to IoT Framework: Chinese Translation

Guide to IoT Framework: Chinese Translation
Release Date: 06/24/2019

The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework spreadsheet. This guide ex...

Request to download
Software Defined Perimeter for Infrastructure as a Service: Chinese Translation

Software Defined Perimeter for Infrastructure as a Service: Chinese Translation
Release Date: 06/24/2019

Obtain a clear sense of the security challenges facing enterprise users of IaaS, understand the problems that arise from combining native IaaS access control...

Request to download

IoT Controls Framework: Chinese Translation
Release Date: 06/24/2019

The Internet of Things (IoT) Security Controls Framework introduces the base-level security controls required to mitigate many of the risks associated with a...

Request to download
Guideline on Effectively Managing Security Service in the Cloud - Chinese Translation

Guideline on Effectively Managing Security Service in the Cloud - Chinese Translation
Release Date: 01/09/2019

This initiative aims to develop a research whitepaper, focusing on building up a cloud security services management platform. This whitepaper will serve as a...

Request to download

CCM v3.0 - Chinese Translation
Release Date: 10/19/2018

The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) provides fundamental security principles to guide cloud vendors and cloud customers seeking to ...

Request to download
Security Position Paper Network Function Virtualization - Chinese Translation

Security Position Paper Network Function Virtualization - Chinese Translation
Release Date: 08/03/2018

近五年来,随着云基础设施的能力和复杂性飞速演进,安全风险也相应上升。 虽然虚拟化已不是一个很新的概念,但几乎任何人都可以对计算、存储、网络和应 用程序等资源进行虚拟化的想法会增加安全威胁的影响和速度。同时,全球地缘政 治格局已从由机遇驱动的网络攻击转变为资金充足的国家行动

Request to download
Using BlockChain Technology to Secure the Internet of Things - Chinese Translation

Using BlockChain Technology to Secure the Internet of Things - Chinese Translation
Release Date: 08/03/2018

在过去的四年中,技术专家、首席数字官、营销经理、记者、博客作者和研究机构讨论 并 推广了一种新的分布式模型,将区块链技术应用于安全事务处理和存储。国际数据公司 IDC FutureScape 预测,到 2020 年,全球 20%的贸易融资将纳入区块链。

Request to download
Security Guidance v4.0 - Chinese Translation

Security Guidance v4.0 - Chinese Translation
Release Date: 08/03/2018

欢迎来到云安全联盟关于云计算关键领域安全指南的第四个版本。云计算的兴起是一项不 断发展的技术,它带来了许多机遇和挑战。通过这个文档,我们的目标是提供指导和灵感来支 持业务目标,同时管理和减轻采用云计算技术相关的风险。

Request to download
GEAB State of the Cloud 2018 - Chinese Translation

GEAB State of the Cloud 2018 - Chinese Translation
Release Date: 08/03/2018

云安全联盟全球企业顾问委员会成立于2016年,是由十多位行业的大型跨国公 司的顶尖专家组成的代表团队。该委员会的成立是为了表达大型IT终端用户的观点, 并融合云计算使用者信息安全相关的观点。

Request to download
CSA Code of Conduct for GDPR Compliance - Chinese Translation

CSA Code of Conduct for GDPR Compliance - Chinese Translation
Release Date: 08/03/2018

云安全联盟 CSA 近期发布了 CoC for GDPR Compliance(CSA GDPR 合规行为准则),旨 在为云服务提供商(CSP)、云消费者、及相关企业提供 GDPR 合规解决方案,并提供涉及云服 务提供商应提交的关于数据保护级别的透明性准则。这个准则为各种规模的客户提供工具来评 估其个人数据保护水...

Request to download
Building a Foundation for Successful Cyber Threat Intelligence Exchange - Chinese Translation

Building a Foundation for Successful Cyber Threat Intelligence Exchange - Chinese Translation
Release Date: 08/03/2018

描述: 当前网络攻击的频率和复杂程度在不断提高。攻击者可能是个人,也可能是资源丰富、 组织严密的团伙。面对这样的威胁,企业如果只关注内部防护措施,可能建成最后被绕过 “马其顿防线”;如果只依赖自身的情报能力,可能面临攻防不对等的窘境。为了解决上述问 题,网络威胁情报(CTI, Cyber Threat Intel...

Request to download
Software Defined Perimeter Architecture Guide: Chinese Translation

Software Defined Perimeter Architecture Guide: Chinese Translation
Release Date: 06/24/2018

Software Defined Perimeter (SDP) Architecture Guide is designed to leverage proven, standards-based components to stop network attacks against application in...

Request to download
Software Definied Perimeter as a DDoS Mechanism: Chinese Translation

Software Definied Perimeter as a DDoS Mechanism: Chinese Translation
Release Date: 06/24/2018

The primary goal of this document is to increase the awareness and understanding of SDP as a tool to prevent DDoS attacks by demonstrating its efficiency and...

Request to download
Software Definied Perimeter Specification: Chinese Translation

Software Definied Perimeter Specification: Chinese Translation
Release Date: 06/24/2018

This document outlines a Cloud Security Alliance (CSA) initiated protocol for the Software Defined Perimeter specification, and requests discussion and sugge...

Request to download
Security Guidance for Early Adopters of the Internet of Things - Chinese Translation

Security Guidance for Early Adopters of the Internet of Things - Chinese Translation
Release Date: 08/03/2017

This document provides guidance for the secure implementation of Internet of Things (IoT)-based systems. We have provided the guidance in this document to ...

Request to download
Top Threats to Cloud Computing Deep Dive: Chinese Translation

Top Threats to Cloud Computing Deep Dive: Chinese Translation
Release Date: 06/24/2017

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its foundation. Each...

Request to download