CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Hyperledger Fabric 2.0 Architecture Security Report Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that man... Request to download |
![]() | Hyperledger Fabric 2.0 Architecture Security Controls Checklist Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that man... Request to download |
![]() | Code of Practice for Implementing STAR Level 2 This Code of Practice shows how you can apply the CCM control set in your organization to reach STAR Level 2 third party certification/attestation and als... Request to download |
![]() | Critical Controls Implementation for Salesforce The Salesforce Platform can be a valuable tool for organizations to build and test applications. However, certain security changes are needed when an orga... Request to download |
![]() | Telehealth Risk Management The recent COVID-19 pandemic has increased the demand for data and accelerated the use of telehealth. The Health Resources and Services Administration (HRSA)... Request to download |
![]() | Cloud Controls Matrix and CAIQ v4 The Cloud Controls Matrix (CCM) is a cybersecurity control framework for cloud computing aligned to the CSA best practices, that is considered the de-facto s... Request to download |
![]() | STAR Level 1: Security Questionnaire (CAIQ v4) The STAR Level 1: Security Questionnaire (CAIQ v4) offers an industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services,... Request to download |
![]() | Cloud Incident Response Framework - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | CSA IoT Security Controls Framework v2 - Japanese Translation The IoT Security Controls Framework is relevant for enterprise IoT systems that incorporate multiple types of connected devices, cloud services, and networki... Request to download |
![]() | CSA Guide to the IoT Security Controls Framework v2 - Japanese Translation The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework spreadsheet. This guide ex... Request to download |
![]() | Cloud Solution Data Science COVID-19 Dashboard Data centers grow annually by about forty percent, and those for industries such as healthcare, energy, and transportation are growing even faster. Howeve... Request to download |
![]() | CSA Enterprise Architecture Reference Guide The Enterprise Architecture Reference Guide v2 is a companion piece with the EA v2 to CCM v3.0.1 Mapping. The peer review for both documents are intended to ... Request to download |
![]() | Enterprise Architecture Reference Diagram The CSA Enterprise Architecture (EA) is both a methodology and a set of tools. It is a framework, a comprehensive approach for the architecture of a secure c... Request to download |
![]() | Enterprise Architecture v2 to CCM v3.01 Mapping Guide The Enterprise Architecture (EA) is the CSA’s standard cloud reference architecture while the Cloud Control Matrix (CCM) is the CSA’s standard control set. T... Request to download |
![]() | Enterprise Architecture to CCM v3.01 Reordered Mapping The EA v2 to CCM v3.0.1 Mapping is a companion piece with the Enterprise Architecture Reference Guide v2. The peer review for both documents are intended to ... Request to download |
![]() | Disaster Recovery as a Service Disaster Recovery as a Service (DRaaS) is a cloud computing service model that allows an organization to back up its data and IT infrastructure in a third... Request to download |
![]() | Top Cloud Priorities for CxOs The Top Cloud Priorities for CxOs was created to equip C-level executives with industry guidance to build pragmatic cloud security projects and strategies... Request to download |
![]() | CSA CxO Trust Working Group Charter The CSA CxO Trust Working Group will conduct research consisting of best practices, metrics, surveys, C-level presentations, and other tools in support of... Request to download |
![]() | STAR Enabled Solution | CAIQ-Lite v3 CSA and Whistic identified the need for a lighter-weight assessment questionnaire in order to accommodate the shift to cloud procurement models, and to enabl... Request to download |
![]() | STAR Enabled Solution | CSA - OneTrust VRM Tool The CSA-OneTrust Vendor Risk Management (VRM) tool automates the entire vendor management lifecycle, including onboarding and offboarding vendors, triaging v... Request to download |