CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | IoT Controls Matrix v3 - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Guide to the IoT Controls Matrix v3 - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Third-Party Vendor Risk Management in Healthcare The increased use of third-party vendors for applications and data processing services is a business model that is likely to continue, especially as HDOs ... Request to download |
![]() | CSA CCM v4.0 Addendum - CRI FS Profile v1.2 This document is a CSA CCM v4.0 addendum to the CRI FS Profile v1.2 that contains controls mapping between the CCM and the FS Profile. The document aims t... Request to download |
![]() | Critical Controls Implementation for Oracle Fusion Applications Framed within the context of the Cloud Security Alliance (CSA)’s ERP Twenty Controls, this document presents the essential and optional security features ... Request to download |
![]() | Sensitive Data in the Cloud Anjuna commissioned CSA to develop a survey to better understand the industry’s knowledge, attitudes, and opinions regarding sensitive data in the cloud. ... Request to download |
![]() | State of ICS Security in the Age of Cloud The goal of this document hopes to create awareness and share insights on the benefits of leveraging Cloud Computing for ICS/OT. It also attempts to stimu... Request to download |
![]() | CCPA Addendum - PLA CoC v4.1 This document serves as a mapping exercise between the California Consumer Privacy Act (CCPA), the EU General Data Protection Regulation (GDPR) and the CS... Request to download |
![]() | CSA CCM v4.0 Addendum - UAE IA Regulation This document is an addendum to the CCM V4.0 that contain controls mapping between the CSA CCM and the UAE Information Assurance (IA) Regulation. The docu... Request to download |
![]() | Measuring Risk and Risk Governance Adapting to the cloud presents a new challenge to enterprises. The shared responsibility model, used to distinguish responsibilities between cloud provide... Request to download |
![]() | Secure Connection Requirements of Hybrid Cloud - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | C-Level Guidance to Securing Serverless Architectures - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | The Continuous Audit Metrics Catalog: Towards a Machine-Readable Representation In October 2021, the Cloud Security Alliance released the first version of the Continuous Audit Metrics catalog which provides a standard reference for th... Request to download |
![]() | Top Threats to Cloud Computing Pandemic Eleven The Top Threats reports have traditionally aimed to raise awareness of threats, risks, and vulnerabilities in the cloud. Such issues are often the result ... Request to download |
![]() | CISO Perspectives and Progress in Deploying Zero Trust Some of the areas covered in this survey include where Zero Trust falls as a priority in the organization, the percentage of those who have completed rela... Request to download |
![]() | Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Arabic Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Best Practices for Smart Contract Security Hyperledger Fabric The goal is to establish best practices for using smart contract specifically in Hyperledger Fabric 2.0 environment. This document serves as a guide for S... Request to download |
![]() | Serverless Computing Working Group Charter Serverless working group charter document. The Serverless WG seeks to develop best practices to help organizations that want to run their business with a... Request to download |
![]() | HPC Cloud Services Onboarding Guide This paper aims to present an overview of what to consider to ensure the proper selection, design, and implementation of an HPC solution that will satisfy... Request to download |
![]() | Healthcare Supply Chain Cybersecurity Risk Management It is essential for Healthcare Delivery Organizations to conduct proper risk management practices and risk assessments of suppliers and third-party servic... Request to download |