CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Healthcare Supply Chain Cybersecurity Risk Management It is essential for Healthcare Delivery Organizations to conduct proper risk management practices and risk assessments of suppliers and third-party servic... Request to download |
![]() | Cloud Key Management Working Group Charter Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using key management systems with thos... Request to download |
![]() | Software-Defined Perimeter (SDP) Specification v2.0 - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | IoT Controls Matrix v3 The IoT Security Controls Matrix is relevant for enterprise IoT systems that incorporate multiple types of connected devices, cloud services, and networki... Request to download |
![]() | Guide to the IoT Controls Matrix v3 The Guide to the IoT Security Controls Matrix provides instructions for using the companion CSA IoT Security Controls Matrix v3. This guide explains how t... Request to download |
![]() | Identity Access Management Working Group Charter Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using Identity Access Management (IAM)... Request to download |
![]() | Health Information Management Working Group Charter The Health Information Management Working Group aims to directly influence how health information service providers deliver secure cloud solutions (servic... Request to download |
![]() | Getting Quantum Safe in 5 Slides This is a set of 5 high-level slides about how to approach quantum-safe security. The goal is briefly to outline the problem, possible solutions, next ste... Request to download |
![]() | C-Level Guidance to Securing Serverless Architectures The purpose of this document is to provide a high-level business overview of Serverless architectures, along with the risks and the security concerns when... Request to download |
![]() | Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement The purpose of this research article is to explain how DNS and the enterprise-managed DDI system can be combined with a Software-Defined Perimeter to deli... Request to download |
![]() | SaaS Security and Misconfigurations Report Many recent breaches and data leaks have been tied back to misconfigurations causing it to be a top concern for many organizations. Most research related ... Request to download |
![]() | State of Cloud Security Concerns, Challenges, and Incidents - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Toward a Zero Trust Architecture - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Global Security Database Working Group Charter The scope of this project is to identify and understand the problems around vulnerability discovery, reporting, publication, tracking, and classification.... Request to download |
![]() | Guideline on Effectively Managing Security Service in the Cloud - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | The Importance of STAR Compliance requires a comprehensive review of services and processes related to cloud infrastructure and how it is managed during a data lifecycle. STAR f... Request to download |
![]() | CCM v4 - Indonesian Translation Terjemahan dari publikasi ini ke dalam bahasa Indonesia di lakukan olehChapter dan dukungan sukarelawan, tetapi konten yang di terjemahkan beradadi luar C... Request to download |
![]() | Software-Defined Perimeter (SDP) Specification v2.0 The Software-Defined Perimeter (SDP) architecture is an effective way to implement the principles of Zero Trust. SDP aims to give enterprise security arch... Request to download |
![]() | Blockchain/Distributed Ledger Technology (DLT) Risk and Security Considerations There is no shortage of guidance on how to design, configure and deploy Fabric solutions. This paper provides insights into how the three layers of blockc... Request to download |
![]() | IoT Charter 2022 This charter lays out the scope, responsibilities, and roadmap for the IoT Working Group. The Cloud Security Alliance (CSA) IoT Working Group (IoTWG) plan... Request to download |