CSA Research Artifacts

Whitepapers, Reports and Other Resources

Home
Research Artifacts

Browse Research Artifacts

CSA CCM v3.0.1 Addendum - AICPA TSC 2017
Release Date: 08/03/2019

This document is an addendum to the CCM V3.0.1 that contain controls mapping between the CSA CCM and the AICPA TSC 2017. The document aims to help AICPA TSC ...

Request to download

CSA CCM v3.0.1 Addendum - NIST 800-53 Rev 4 Moderate
Release Date: 08/03/2019

This document is an addendum to the CCM V3.0.1 that contain controls mapping between the CSA CCM and the NIST 800-53 R4 Moderate Baseline. The document aims ...

Request to download
Information Security Management through Reflexive Security

Information Security Management through Reflexive Security
Release Date: 08/01/2019

This document defines “Reflexive Security” as a new security management approach that is built upon the interrelationships between security, development and ...

Request to download
Documentation of Relevant Distributed Ledger Technology and Blockchain Use Cases v2

Documentation of Relevant Distributed Ledger Technology and Blockchain Use Cases v2
Release Date: 07/31/2019

Thanks to the rise in popularity of Bitcoin cryptocurrency, the innovative technologies of Blockchain and other systems of distributed ledger technology (DLT...

Request to download
Best Practices for Implementing a Secure Application Container Architecture

Best Practices for Implementing a Secure Application Container Architecture
Release Date: 07/26/2019

Application containers and a microservices architecture are being used to design, develop and deploy applications leveraging agile software development appro...

Request to download

Takedown Tools and Services
Release Date: 07/25/2019

New Services and Tools for Cyber-Crime The H2020 EU funded project, Takedown, in which CSA participated along with 18 other partners-orga...

Request to download
Challenges in Securing Application Containers and Microservices

Challenges in Securing Application Containers and Microservices
Release Date: 07/16/2019

Application containers and a microservices architecture are being used to design, develop and deploy applications leveraging agile software development appro...

Request to download
Cloud Penetration Testing Playbook

Cloud Penetration Testing Playbook
Release Date: 07/12/2019

This work focuses on testing systems and services hosted in public cloud environments. This refers to customer-controlled or customer-managed systems and ser...

Request to download
CCM and CAIQ (Japanese Translations)

CCM and CAIQ (Japanese Translations)
Release Date: 07/10/2019

Cloud Security Alliance (CSA) in the context of an agreement with OneTrust has translated the Cloud Control Matrix (CCM) v3.0.1 and CAIQ in Japanese

Request to download
Software Defined Perimeter (SDP): Awareness and Adoption Infographic

Software Defined Perimeter (SDP): Awareness and Adoption Infographic
Release Date: 07/01/2019

A majority of organizations recognize the need to change their approach to user access control. SDP is seeing early market adoption and awareness, with under...

Request to download
Guide to IoT Framework: Chinese Translation

Guide to IoT Framework: Chinese Translation
Release Date: 06/24/2019

The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework spreadsheet. This guide ex...

Request to download

Software Defined Perimeter for Infrastructure as a Service: Chinese Translation
Release Date: 06/24/2019

Request to download

IoT Controls Framework: Chinese Translation
Release Date: 06/24/2019

Request to download
Cloud Octagon Model

Cloud Octagon Model
Release Date: 06/24/2019

In this document CSA provides an approach to assess risk in SaaS cloud computing. It takes into account the security challenges in a cloud computing environm...

Request to download

Software Defined Perimeter for Infrastructure as a Service: Japanese Translation
Release Date: 06/23/2019

Request to download
Mitigating the Quantum Threat with Hybrid Cryptography

Mitigating the Quantum Threat with Hybrid Cryptography
Release Date: 06/17/2019

Focus of this document is on four hybrid cryptographic schemes which provide both classical security of classical crypto and the quantum security of a quantu...

Request to download
Top 20 Critical Controls for Cloud ERP Customers

Top 20 Critical Controls for Cloud ERP Customers
Release Date: 06/10/2019

This document aims to be a guide for assessing and prioritizing the most critical controls that organizations should take into account when trying to secur...

Request to download

Cloud Penetration Testing Guidance
Release Date: 06/07/2019

This document aims to be a guide for conducting penetration testing on cloud services. The document outlines important aspects such as the scoping of cloud p...

Request to download
Cloud Security Alliance Code of Conduct for GDPR Compliance (Updated - May 2019)

Cloud Security Alliance Code of Conduct for GDPR Compliance (Updated - May 2019)
Release Date: 06/03/2019

The CSA Code of Conduct is designed to offer both a compliance tool for GDPR compliance and transparency guidelines regarding the level of data protection o...

Request to download
Preparing Enterprises for the Quantum Computing Cybersecurity Threats

Preparing Enterprises for the Quantum Computing Cybersecurity Threats
Release Date: 05/23/2019

Quantum computing, while expected to help make many advancements, will also break the existing asymmetric-key cryptosystems, thus endangering our security ...

Request to download