Circle
Events
Blog

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Identity and Access Management for the Internet of Things

Identity and Access Management for the Internet of Things
Release Date: 09/28/2015

This document is the first in a series of summary guidance aimed at providing easily understandable recommendations to information technology staff charged w...

Request to download
What is Post-Quantum Cryptography

What is Post-Quantum Cryptography
Release Date: 09/28/2015

Most people pay little attention to the lock icon on their browser address bar that signifies a secure HTTPS connection. They don’t realize that there is an...

Request to download
What is Quantum Key Distribution?

What is Quantum Key Distribution?
Release Date: 08/05/2015

The security of QKD relies on fundamental laws of nature, which are invulnerable to increasing computational power, new attack algorithms or quantum computer...

Request to download
Cloud Computing Market Maturity

Cloud Computing Market Maturity
Release Date: 07/15/2015

This white paper reports the results of a recent study conducted by ISACA and the Cloud Security Alliance to examine cloud market maturity through four lense...

Request to download
Security Considerations for Private vs. Public Clouds

Security Considerations for Private vs. Public Clouds
Release Date: 06/15/2015

The Cloud Security Alliance teamed up with Palo Alto Networks to produce this whitepaper. A public cloud deployment occurs when a cloud’s entire infrastructu...

Request to download
The Mandate for Meaningful Cyber Incident Sharing for the Cloud

The Mandate for Meaningful Cyber Incident Sharing for the Cloud
Release Date: 06/13/2015

New and increasingly significant cybersecurity breaches are reported practically every day. For most companies, it is no longer a matter of whether they will...

Request to download
Privacy Level Agreement - Version 2

Privacy Level Agreement - Version 2
Release Date: 06/02/2015

PLA [V2] is intended to be used as an appendix to a Cloud Services Agreement, and to describe the level of privacy protection that the CSP will provide. Whil...

Request to download
SMB Membership Brochure APAC

SMB Membership Brochure APAC
Release Date: 06/01/2015

Request to download
SME Cloud Security

SME Cloud Security
Release Date: 06/01/2015

This 2015 Hong Kong Small and Medium-sized Enterprises (SME) Cloud Adoption, Security and Privacy Readiness Survey was conducted by the Internet Society Hong...

Request to download
International Standardization Council Charter

International Standardization Council Charter
Release Date: 05/20/2015

Request to download
What is Quantum Safe Security

What is Quantum Safe Security
Release Date: 05/19/2015

An overview of current cryptographic techniques being used, proactive defenses, and the threats and impact of quantum computing.

Request to download
Best Practices for Mitigating Risks in Virtualized Environments

Best Practices for Mitigating Risks in Virtualized Environments
Release Date: 05/05/2015

Request to download

FedRAMP Cloud Controls Matrix v3.0.1 Candidate Mapping
Release Date: 05/05/2015

Request to download
New Security Guidance for Early Adopters of the IoT

New Security Guidance for Early Adopters of the IoT
Release Date: 04/20/2015

This document provides guidance for the secure implementation of Internet of Things (IoT)-based systems. We have provided the guidance in this document to ai...

Request to download
STAR Overview PDF

STAR Overview PDF
Release Date: 04/20/2015

The CSA STAR Program is a publicly accessible registry designed to recognize the varying assurance requirements and maturity levels of providers and consumer...

Request to download
Cloud Adoption In The Financial Services Sector

Cloud Adoption In The Financial Services Sector
Release Date: 03/05/2015

We circulated the “How Cloud is Being Used in the Financial Sector” survey to IT and security professionals in financial services institutions. The goal was ...

Request to download
Mobile Application Security Testing Initiative Charter

Mobile Application Security Testing Initiative Charter
Release Date: 02/16/2015

Mobile applications are becoming an integral part of not just modern enterprises but also of human existence and a huge part of this shift is due to the emer...

Request to download
Cloud Adoption Practices & Priorities

Cloud Adoption Practices & Priorities
Release Date: 01/09/2015

The benefits for enterprises moving to the cloud are clear: greater business agility, data availability, collaboration, and cost savings. The cloud is also c...

Request to download
AOSSL and CCM Technote

AOSSL and CCM Technote
Release Date: 12/18/2014

Cloud computing is the future, and in many cases, the present of information technology. Always On SSL (AOSSL) is rapidly becoming an essential practice to h...

Request to download
Big Data Taxonomy

Big Data Taxonomy
Release Date: 09/18/2014

A research document outlining the six dimensions of big data to help decision makers navigate the myriad choices in compute and storage infrastructures as we...

Request to download