Circle
Events
Blog

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Cloud Threat Modeling - Japanese Translation

Cloud Threat Modeling - Japanese Translation
Release Date: 11/01/2021

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Toward a Zero Trust Architecture

Toward a Zero Trust Architecture
Release Date: 10/27/2021

Enterprise stakeholders must consider the challenges of increased real-time system complexity, the need for new cybersecurity policy and strong cultural s...

Request to download
CCM v4 - Turkish Translation

CCM v4 - Turkish Translation
Release Date: 10/26/2021

Bu yayının bu yerel dile çevrilmiş versiyonu, bölümlerin ve gönüllülerin çabalarıyla [orijinal kaynak](https://cloudsecurityalliance.org/artifacts/cloud-c...

Request to download
CCM and CAIQ v4 -Japanese Translations

CCM and CAIQ v4 -Japanese Translations
Release Date: 10/26/2021

This localized version of this publication was produced from the original source material (CCM, CAIQ) through the efforts of chapters and volunteers but t...

Request to download
CCM v4 - Spanish Translation

CCM v4 - Spanish Translation
Release Date: 10/26/2021

Esta versión traducida de esta publicación se produjo a partir de la fuente original del material gracias al esfuerzo de los capítulos y voluntarios, pero...

Request to download
CCM v4 - Chinese Translation

CCM v4 - Chinese Translation
Release Date: 10/26/2021

该中文版本的出版物是根据[原文](https://cloudsecurityalliance.org/artifacts/cloud-controls-matrix-v4/)进行汉化,由CSA大中华区及其志愿者翻译完成,但翻译的内容不属于[CSA研究院生命周期](https://cloudsecuritya...

Request to download
Software-Defined Perimeter (SDP) and Zero Trust - Korean Translation

Software-Defined Perimeter (SDP) and Zero Trust - Korean Translation
Release Date: 10/25/2021

소프트웨어 정의 경계(Software-Defined Perimeter)로 구현한 제로 트러스트는 조직이 기존 네트워크 및 인프라 경계 중심의 네트워크 모델에서 지속적으로 등장하는 기존 공격 방법의 새로운 유형을 방어할 수 있도록 지원한다. SDP를 구현할 경우 점점 더 복잡해...

Request to download
The Continuous Audit Metrics Catalog

The Continuous Audit Metrics Catalog
Release Date: 10/19/2021

Are traditional infosec assurance tools outdated? Many cloud customers think so. They see that technology changes quickly, and products are frequently evo...

Request to download
CCM v4 - Hungarian Translation

CCM v4 - Hungarian Translation
Release Date: 10/19/2021

A kiadvány e honosított változata az eredeti forrásanyagból készült, helyi szervezetek és önkéntesek erőfeszítései révén, de a lefordított tartalom kívül ...

Request to download
Practical Preparations for the Post-Quantum World

Practical Preparations for the Post-Quantum World
Release Date: 10/19/2021

This document discusses the cybersecurity challenges and recommended steps to reduce likely new risks due to quantum information sciences. This paper was ...

Request to download
Information Technology Governance, Risk and Compliance in Healthcare

Information Technology Governance, Risk and Compliance in Healthcare
Release Date: 10/15/2021

Information Technology (IT) Governance, Risk, and Compliance (GRC), are three words that have a significant impact on organizations. While each term seems...

Request to download
Top 10 Blockchain Attacks, Vulnerabilities & Weaknesses

Top 10 Blockchain Attacks, Vulnerabilities & Weaknesses
Release Date: 09/27/2021

Cryptocurrencies and other blockchain virtual assets have been the target of the majority of Distributed Ledger Technology (DLT) attacks and a variety of ...

Request to download
State of Cloud Security Risk, Compliance, and Misconfigurations

State of Cloud Security Risk, Compliance, and Misconfigurations
Release Date: 09/17/2021

Cloud misconfigurations consistently are a top concern for organizations utilizing public cloud. Such errors lead to data breaches, allow the deletion or ...

Request to download
Ransomware in the Healthcare Cloud

Ransomware in the Healthcare Cloud
Release Date: 09/15/2021

Ransomware is the fastest-growing malware threat today. Over the last few years, it has risen to epidemic proportions, quickly becoming a significant reve...

Request to download
How to Design a Secure Serverless Architecture

How to Design a Secure Serverless Architecture
Release Date: 09/14/2021

Like any solution, serverless computing brings with it a variety of cyber risks. This paper covers security for serverless applications, focusing on best pra...

Request to download
Recommendations for Adopting a Cloud-Native Key Management Service

Recommendations for Adopting a Cloud-Native Key Management Service
Release Date: 09/14/2021

The purpose of this document is to provide general guidance for choosing, planning, and deploying cloud-native Key Management Systems (KMS). The guidance ...

Request to download
The Evolution of STAR: Introducing Continuous Auditing

The Evolution of STAR: Introducing Continuous Auditing
Release Date: 09/14/2021

The CSA Continuous Auditing Certification (aka STAR Level 3) is the most rigorous assurance tier in the STAR program. Level 3 certified services providers...

Request to download
CCM v4.0 Implementation Guidelines

CCM v4.0 Implementation Guidelines
Release Date: 09/13/2021

This document will help you understand how to navigate through the Cloud Controls Matrix v4 to use it effectively and interpret and implement the CCM cont...

Request to download
Microservices Architecture Pattern

Microservices Architecture Pattern
Release Date: 08/31/2021

This document serves to propose a repeatable approach to architecting, developing and deploying Microservices as a “MAP” (Microservices Architecture Patte...

Request to download
Process for CSA International Standardization Council (ISC) Standards Liaison Officer

Process for CSA International Standardization Council (ISC) Standards Liaison Officer
Release Date: 08/18/2021

The Cloud Security Alliance (CSA) has designated a council to coordinate all aspects of standardization efforts within the CSA. The role of the council is...

Request to download