Circle
Events
Blog

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

C-Level Guidance to Securing Serverless Architectures

C-Level Guidance to Securing Serverless Architectures
Release Date: 04/19/2022

The purpose of this document is to provide a high-level business overview of Serverless architectures, along with the risks and the security concerns when...

Request to download
Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement

Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement
Release Date: 04/12/2022

The purpose of this research article is to explain how DNS and the enterprise-managed DDI system can be combined with a Software-Defined Perimeter to deli...

Request to download
SaaS Security and Misconfigurations Report

SaaS Security and Misconfigurations Report
Release Date: 04/11/2022

Many recent breaches and data leaks have been tied back to misconfigurations causing it to be a top concern for many organizations. Most research related ...

Request to download
Toward a Zero Trust Architecture - Korean Translation

Toward a Zero Trust Architecture - Korean Translation
Release Date: 04/05/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Global Security Database Working Group Charter

Global Security Database Working Group Charter
Release Date: 04/01/2022

The scope of this project is to identify and understand the problems around vulnerability discovery, reporting, publication, tracking, and classification....

Request to download
Guideline on Effectively Managing Security Service in the Cloud - Korean Translation

Guideline on Effectively Managing Security Service in the Cloud - Korean Translation
Release Date: 03/21/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
The Importance of STAR

The Importance of STAR
Release Date: 03/17/2022

Compliance requires a comprehensive review of services and processes related to cloud infrastructure and how it is managed during a data lifecycle. STAR f...

Request to download
CCM v4 - Indonesian Translation

CCM v4 - Indonesian Translation
Release Date: 03/14/2022

Terjemahan dari publikasi ini ke dalam bahasa Indonesia di lakukan olehChapter dan dukungan sukarelawan, tetapi konten yang di terjemahkan beradadi luar C...

Request to download
Software-Defined Perimeter (SDP) Specification v2.0

Software-Defined Perimeter (SDP) Specification v2.0
Release Date: 03/10/2022

The Software-Defined Perimeter (SDP) architecture is an effective way to implement the principles of Zero Trust. SDP aims to give enterprise security arch...

Request to download
Blockchain/Distributed Ledger Technology (DLT) Risk and Security Considerations

Blockchain/Distributed Ledger Technology (DLT) Risk and Security Considerations
Release Date: 02/16/2022

There is no shortage of guidance on how to design, configure and deploy Fabric solutions. This paper provides insights into how the three layers of blockc...

Request to download
IoT Charter 2022

IoT Charter 2022
Release Date: 02/15/2022

This charter lays out the scope, responsibilities, and roadmap for the IoT Working Group. The Cloud Security Alliance (CSA) IoT Working Group (IoTWG) plan...

Request to download
Toward a Zero Trust Architecture - Japanese Translation

Toward a Zero Trust Architecture - Japanese Translation
Release Date: 02/10/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Cybersecurity Best Practices for the Manufacturing Industry

Cybersecurity Best Practices for the Manufacturing Industry
Release Date: 02/09/2022

The manufacturing and industrial sectors have evolved with the introduction of technologies over the past many decades. Progress in improving processes, t...

Request to download
DevSecOps - Pillar 4 Bridging Compliance and Development

DevSecOps - Pillar 4 Bridging Compliance and Development
Release Date: 02/08/2022

OverviewThis document provides guidance to ensure the gap between compliance and development is addressed by recognizing compliance objectives, translatin...

Request to download
Cloud Security and Technology Maturity Survey

Cloud Security and Technology Maturity Survey
Release Date: 02/03/2022

The goal of this survey is to better understand the maturity levels of organizations for the cloud and technology both currently and in the near future. K...

Request to download
How to Design a Secure Serverless Architecture - Japanese Translation

How to Design a Secure Serverless Architecture - Japanese Translation
Release Date: 02/01/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Open Certification Framework Working Group Charter

Open Certification Framework Working Group Charter
Release Date: 02/01/2022

The CSA Open Certification Framework (OCF) is an industry initiative to allow global, trusted independent evaluation of cloud providers. It is a program for ...

Request to download
Artificial Intelligence in Healthcare

Artificial Intelligence in Healthcare
Release Date: 01/06/2022

Artificial intelligence (AI) now has the potential to be integrated into all aspects of healthcare, from management to delivery and diagnosis. These advan...

Request to download
Corda Enterprise 4.8 - Architecture Security Report

Corda Enterprise 4.8 - Architecture Security Report
Release Date: 12/15/2021

Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many...

Request to download
Corda Enterprise 4.8 - Security Controls Checklist

Corda Enterprise 4.8 - Security Controls Checklist
Release Date: 12/15/2021

In this spreadsheet, our Blockchain/Distributed Ledger Working Group delivers a fully implementable security controls checklist for the blockchain framewo...

Request to download