Circle
Events
Blog

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Applied Quantum Safe Security

Applied Quantum Safe Security
Release Date: 03/13/2017

Over the last year or so, the perceived threat of the quantum computer to modern cryptographic standards in widespread use has increased dramatically. Govern...

Request to download
SDP for IaaS

SDP for IaaS
Release Date: 02/13/2017

Obtain a clear sense of the security challenges facing enterprise users of IaaS, understand the problems that arise from combining native IaaS access control...

Request to download
Establishing a Safe and Secure Municipal Drone Program

Establishing a Safe and Secure Municipal Drone Program
Release Date: 02/02/2017

This paper provides guidance on the safe and secure introduction and operation of a municipal “drone” program. This paper will try to analyze the drone’s rol...

Request to download
Quantum Safe Security Glossary

Quantum Safe Security Glossary
Release Date: 01/24/2017

The Quantum-Safe Security (QSS) Working Group was formed to address key generation and transmission methods and to help the industry understand quantum-safe ...

Request to download
Cloud Adoption and Security in India

Cloud Adoption and Security in India
Release Date: 11/22/2016

The “State on Cloud Adoption and Security in 2016: India” survey was circulated in an effort to understand and evaluate cloud computing trends in India. We h...

Request to download
Cloud Adoption Practices & Priorities in the Chinese Financial Sector

Cloud Adoption Practices & Priorities in the Chinese Financial Sector
Release Date: 10/28/2016

We circulated the “Financial Services Industry Cloud Adoption Survey: China” survey to IT and security professionals in the Financial Services Institutions (...

Request to download
CloudWatch2 Risk Based Decision Making Mechanisms For Cloud Service In The Public Sector

CloudWatch2 Risk Based Decision Making Mechanisms For Cloud Service In The Public Sector
Release Date: 10/27/2016

Despite the undisputed advantages of cloud computing, customers (in particular Public Administrations or PAs, and Small and Medium-sized Enterprises or SMEs...

Request to download
Defeating Insider Threats

Defeating Insider Threats
Release Date: 10/19/2016

As a follow up to the Top Threats in Cloud Computing and from the months of May to July 2016 we surveyed approximately 100 professionals on the extent of the...

Request to download
Future Proofing the Connected World

Future Proofing the Connected World
Release Date: 10/07/2016

An IoT system is only as secure as its weakest link, this document is our attempt at providing actionable and useful guidance for securing the individual pro...

Request to download
Big Data Security and Privacy Handbook

Big Data Security and Privacy Handbook
Release Date: 08/26/2016

The term “big data” refers to the massive amounts of digital information companies and governments collect about human beings and our environment. This Cloud...

Request to download
Mitigating Risk

Mitigating Risk
Release Date: 08/17/2016

With several years of cloud adoption in organizations, approaches to security have been evolving rapidly. To dig deeper into these concerns and the controls ...

Request to download
Re-Think Security

Re-Think Security
Release Date: 07/15/2016

Request to download
Mobile Application Security Testing

Mobile Application Security Testing
Release Date: 06/30/2016

The Mobile Application Security Testing (MAST) Initiative is a research which aims to help organizations and individuals reduce the possible risk exposures a...

Request to download
Quantum Random Number Generators

Quantum Random Number Generators
Release Date: 06/09/2016

A random number is generated by a process whose outcome is unpredictable, and which cannot be reliably reproduced. Randomness, quantitatively measured by ent...

Request to download
Identity Security

Identity Security
Release Date: 04/19/2016

The goal of the Identity Solutions: Security Beyond the Perimeter survey was to address Insufficient Identity, Credential, and Access Management and gain a b...

Request to download
CSA STAR Program & Open Certification Framework in 2016 and Beyond

CSA STAR Program & Open Certification Framework in 2016 and Beyond
Release Date: 04/12/2016

The Cloud Security Alliance (CSA) Security, Trust and Assurance Registry (STAR) program is the industry’s leading trust mark for cloud security. The CSA Open...

Request to download
Identity and Access Management for the Internet of Things - Japanese Translation

Identity and Access Management for the Internet of Things - Japanese Translation
Release Date: 04/05/2016

This document is the first in a series of summary guidance aimed at providing easily understandable recommendations to information technology staff charged...

Request to download
Mobile Application Security Testing Initiative Revised Charter

Mobile Application Security Testing Initiative Revised Charter
Release Date: 03/14/2016

Mobile applications are becoming an integral part of not just modern enterprises but also of human existence and a huge part of this shift is due to the emer...

Request to download

Security as a Service Implementation Guidance (Categories 1-10)
Release Date: 03/01/2016

In order to improve the understanding of Security as a Service and accelerate market acceptance, clear categorization and definitions of security services...

Request to download