Circle
Events
Blog

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

CSA CCM v4.0 Addendum - UAE IA Regulation

CSA CCM v4.0 Addendum - UAE IA Regulation
Release Date: 07/05/2022

This document is an addendum to the CCM V4.0 that contain controls mapping between the CSA CCM and the UAE Information Assurance (IA) Regulation. The docu...

Request to download
Measuring Risk and Risk Governance

Measuring Risk and Risk Governance
Release Date: 06/21/2022

Adapting to the cloud presents a new challenge to enterprises. The shared responsibility model, used to distinguish responsibilities between cloud provide...

Request to download
Secure Connection Requirements of Hybrid Cloud - Japanese Translation

Secure Connection Requirements of Hybrid Cloud - Japanese Translation
Release Date: 06/14/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
C-Level Guidance to Securing Serverless Architectures - Japanese Translation

C-Level Guidance to Securing Serverless Architectures - Japanese Translation
Release Date: 06/08/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
SaaS Governance Best Practices for Cloud Customers

SaaS Governance Best Practices for Cloud Customers
Release Date: 06/08/2022

In the context of cloud security, the focus is almost always on securing Infrastructure-as-a-Service (IaaS) environments. This is despite the reality that...

Request to download
The Continuous Audit Metrics Catalog: Towards a Machine-Readable Representation

The Continuous Audit Metrics Catalog: Towards a Machine-Readable Representation
Release Date: 06/07/2022

In October 2021, the Cloud Security Alliance released the first version of the Continuous Audit Metrics catalog which provides a standard reference for th...

Request to download
Top Threats to Cloud Computing Pandemic Eleven

Top Threats to Cloud Computing Pandemic Eleven
Release Date: 06/06/2022

The Top Threats reports have traditionally aimed to raise awareness of threats, risks, and vulnerabilities in the cloud. Such issues are often the result ...

Request to download
CISO Perspectives and Progress in Deploying Zero Trust

CISO Perspectives and Progress in Deploying Zero Trust
Release Date: 06/03/2022

Some of the areas covered in this survey include where Zero Trust falls as a priority in the organization, the percentage of those who have completed rela...

Request to download
Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Arabic Translation

Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Arabic Translation
Release Date: 05/27/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Best Practices for Smart Contract Security Hyperledger Fabric

Best Practices for Smart Contract Security Hyperledger Fabric
Release Date: 05/18/2022

The goal is to establish best practices for using smart contract specifically in Hyperledger Fabric 2.0 environment. This document serves as a guide for S...

Request to download
Serverless Computing Working Group Charter

Serverless Computing Working Group Charter
Release Date: 05/17/2022

Serverless working group charter document.  The Serverless WG seeks to develop best practices to help organizations that want to run their business with a...

Request to download
HPC Cloud Services Onboarding Guide

HPC Cloud Services Onboarding Guide
Release Date: 05/16/2022

This paper aims to present an overview of what to consider to ensure the proper selection, design, and implementation of an HPC solution that will satisfy...

Request to download
Healthcare Supply Chain Cybersecurity Risk Management

Healthcare Supply Chain Cybersecurity Risk Management
Release Date: 05/11/2022

It is essential for Healthcare Delivery Organizations to conduct proper risk management practices and risk assessments of suppliers and third-party servic...

Request to download
Cloud Key Management Working Group Charter

Cloud Key Management Working Group Charter
Release Date: 05/04/2022

Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using key management systems with thos...

Request to download
Software-Defined Perimeter (SDP) Specification v2.0 - Japanese Translation

Software-Defined Perimeter (SDP) Specification v2.0 - Japanese Translation
Release Date: 05/04/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
IoT Controls Matrix v3

IoT Controls Matrix v3
Release Date: 04/25/2022

The IoT Security Controls Matrix is relevant for enterprise IoT systems that incorporate multiple types of connected devices, cloud services, and networki...

Request to download
Guide to the IoT Controls Matrix v3

Guide to the IoT Controls Matrix v3
Release Date: 04/25/2022

The Guide to the IoT Security Controls Matrix provides instructions for using the companion CSA IoT Security Controls Matrix v3. This guide explains how t...

Request to download
Identity Access Management Working Group Charter

Identity Access Management Working Group Charter
Release Date: 04/22/2022

Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using Identity Access Management (IAM)...

Request to download
Health Information Management Working Group Charter

Health Information Management Working Group Charter
Release Date: 04/22/2022

The Health Information Management Working Group aims to directly influence how health information service providers deliver secure cloud solutions (servic...

Request to download
Getting Quantum Safe in 5 Slides

Getting Quantum Safe in 5 Slides
Release Date: 04/19/2022

This is a set of 5 high-level slides about how to approach quantum-safe security. The goal is briefly to outline the problem, possible solutions, next ste...

Request to download