CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Critical Controls Implementation for SAP The Critical Controls Implementation for SAP is the first in a series of implementation documents that the CSA ERP Security Working Group aims to develop. Th... Request to download |
![]() | CSA CCM v3.0.1 Addendum to the Reserve Bank of India (RBI)’s Gopala Krishna Committee (GKC) report This document contains a mapping and gap analysis between the cloud security requirements of CCM V3.0.1 and those of the Reserve Bank of India (RBI)’s Gopala... Request to download |
![]() | Beyond the General Data Protection Regulation (GDPR) Data residency insights from around the world. This study reveals the top data protection concerns and strategies of more than 800 senior business profession... Request to download |
![]() | Code of Conduct (CoC): Statement of Adherence 3rd Party Certification CSA PLA Code of Conduct for GDPR Compliance provides a consistent and comprehensive framework for complying with the EU’s GDPR. The CSA PLA Code of Conduct f... Request to download |
![]() | PLA Code of Conduct (CoC): Statement of Adherence Self-Assessment CSA PLA Code of Conduct for GDPR Compliance provides a consistent and comprehensive framework for complying with the EU’s GDPR. The CSA PLA Code of Conduct f... Request to download |
![]() | Guidance for submitting the CSA Code of Conduct (CoC) for GDPR Compliance Self-Assessment The CSA CoC for GDPR Compliance Self-Assessment is the voluntary publication of a CSP’s self-assessment results based on the requirements specified in the PL... Request to download |
![]() | Guideline on Effectively Managing Security Service in the Cloud - Japanese Translation This initiative aims to develop a research whitepaper, focusing on building up a cloud security services management platform. This whitepaper will serve as a... Request to download |
![]() | Top Threats to Cloud Computing: Egregious Eleven - Japanese Translation The purpose of the report is to provide organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated ... Request to download |
![]() | Software-Defined Perimeter as a DDoS Prevention Mechanism The primary goal of this document is to increase the awareness and understanding of SDP as a tool to prevent DDoS attacks by demonstrating its efficiency and... Request to download |
![]() | Mobile Application Security Testing (MAST) - Charter Mobile Applications are becoming an integral part of not just modern enterprises but also of human existence and a huge part of this shift is due to the emer... Request to download |
![]() | Guidelines for CPAs Providing CSA STAR Attestation v2 This document provides guidance for CPAs in conducting a STAR Attestation. It includes relevant information including: professional requirements, competency ... Request to download |
![]() | CAIQ v3.1 (redirect) Original URL for the v3.1 version of CAIQ. Request to download |
![]() | Mapping of 'The Guidelines' Security Recommendations to CCM This document contains the additional controls that serves to bridge the gap between CCM V3.0.1 and the controls within 'Guideline on Effectively Managing Se... Request to download |
![]() | Gap Analysis Report on Mapping CSA’s Cloud Controls Matrix to ‘Guideline on Effectively Managing Security Service in the Cloud’ The report summarizes the mapping of CCM v3.0.1 to 'Guideline on Effectively Managing Security Services in the Cloud' and provides gap analysis on the results. Request to download |
![]() | Six Pillars of DevSecOps In our current state of cyber security, there has been a large growth of application flaws that bypass the continuing addition of security frameworks to ensu... Request to download |
![]() | Top Threats to Cloud Computing: Egregious Eleven The report provides organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated risk-management deci... Request to download |
![]() | Cloud Controls Matrix v3.0.1 The CCM, the only meta-framework of cloud-specific security controls, mapped to leading standards, best practices and regulations. CCM provides organizations... Request to download |
![]() | CCM v3.0.1 Addendum - FedRAMP Moderate This document is an addendum to the CCM V3.0.1 that contain controls mapping between the CSA CCM and the FedRAMP R4 Moderate Baseline. The document aims to ... Request to download |
![]() | CSA CCM v3.0.1 Addendum - NIST 800-53 Rev 4 Moderate This document is an addendum to the CCM V3.0.1 that contain controls mapping between the CSA CCM and the NIST 800-53 R4 Moderate Baseline. The document aims ... Request to download |
![]() | CSA CCM v3.0.1 Addendum - AICPA TSC 2017 This document is an addendum to the CCM V3.0.1 that contain controls mapping between the CSA CCM and the AICPA TSC 2017. The document aims to help AICPA TSC ... Request to download |