CSA Research Artifacts

Whitepapers, Reports and Other Resources

Home
Research Artifacts

Browse Research Artifacts

CCM Mapping Workpackage Template
Release Date: 02/14/2019

This document is the companion document to the Methodology for the Mapping of the Cloud Controls Matrix (CCM). It is a CCM mapping workpackage template that ...

Request to download
The 12 Most Critical Risks for Serverless Applications

The 12 Most Critical Risks for Serverless Applications
Release Date: 02/11/2019

The 12 Most Critical Risks for Serverless Applications 2019 document is meant to serve as a security awareness and education guide. This report was curated ...

Request to download
The Future of Healthcare

The Future of Healthcare
Release Date: 02/04/2019

Globally the Healthcare Industry is a significant component of any country’s infrastructure. In sheer market size, the health care market in the United State...

Request to download

Cloud Incident Response Charter
Release Date: 01/21/2019

To develop a holistic Cloud Incident Response (CIR) framework that comprehensively covers key causes of cloud outages (both security and non-security related...

Request to download

CCM v3.0.1 Addendum - BSI Germany C5 v1
Release Date: 01/18/2019

This document is an addendum to the Cloud Controls Matrix (CCM) V3.0.1 controls. It contains the additional controls that serves to bridge the gap between ...

Request to download

CCM v3.0.1 Addendum - ISO 27002 27017 27018 v1.1
Release Date: 01/18/2019

This document is an addendum to the Cloud Controls Matrix (CCM) V3.0.1 controls. It contains the additional controls that serves to bridge the gap between ...

Request to download
Enterprise Resource Planning and Cloud Adoption

Enterprise Resource Planning and Cloud Adoption
Release Date: 01/11/2019

The “Impact of Cloud on ERP” survey report was designed to assess the impact of ERP solutions on organizations and better understand cloud preparation and da...

Request to download
Guideline on Effectively Managing Security Service in the Cloud - Chinese Translation

Guideline on Effectively Managing Security Service in the Cloud - Chinese Translation
Release Date: 01/09/2019

Request to download
Guideline on Effectively Managing Security Service in the Cloud

Guideline on Effectively Managing Security Service in the Cloud
Release Date: 01/04/2019

This initiative aims to develop a research whitepaper, focusing on building up a cloud security services management platform. This whitepaper will serve as a...

Request to download
Streamlining Vendor IT Security and Risk Assessments

Streamlining Vendor IT Security and Risk Assessments
Release Date: 12/09/2018

A perspective on standards-based assurance of Cloud Providers.

Request to download
Blockchain DLT Use Cases

Blockchain DLT Use Cases
Release Date: 11/27/2018

Thanks to the rise in popularity of Bitcoin cryptocurrency, the innovative technologies of Blockchain and other systems of distributed ledger technology (DLT...

Request to download

Security Guidance v4.0 Info Sheet
Release Date: 11/09/2018

This version, the first major update since 2011, is the culmination of over a year of dedicated research and public participation from the CSA community, wor...

Request to download

CCM v3.0 - Chinese Translation
Release Date: 10/19/2018

The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) provides fundamental security principles to guide cloud vendors and cloud customers seeking to ...

Request to download
Security Guidance for Critical Areas of Focus in Cloud Computing v4.0 (Spanish Translation)

Security Guidance for Critical Areas of Focus in Cloud Computing v4.0 (Spanish Translation)
Release Date: 10/19/2018

Con este documento, nuestro objetivo es proporcionar tanto orientación como inspiración para respaldar los objetivos comerciales, mientras se gestionan y m...

Request to download
Using BlockChain Technology to Secure the Internet of Things - Japanese Translation

Using BlockChain Technology to Secure the Internet of Things - Japanese Translation
Release Date: 10/03/2018

本書「IoT セキュリティのためのブロックチェーン技術の活用」は、Cloud Security Alliance (CSA)が公開して いる「Using Blockchain Technology to Secure the Internet of Things」の日本語訳です。本書は、CSA ジャパ ンが、CS...

Request to download
IoT Firmware Update Processes

IoT Firmware Update Processes
Release Date: 09/20/2018

The traditional approach to updating software for IT assets involves analysis, staging and distribution of the update—a process that usually occurs during of...

Request to download
Code of Conduct for GDPR Compliance - Japanese Translation

Code of Conduct for GDPR Compliance - Japanese Translation
Release Date: 09/14/2018

説明: 本書「GDPR 準拠の為の行動規範」は、Cloud Security Alliance (CSA)が公開している「CODE OF CONDUCT FOR GDPR COMPLIANCE」の日本語訳および一般社団法人日本クラウドセキュリティアライア ンス(CSAジャパン)が解説を加えたも...

Request to download
Top Threats to Cloud Computing: Deep Dive

Top Threats to Cloud Computing: Deep Dive
Release Date: 08/08/2018

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its foundation. Each...

Request to download
OWASP Secure Medical Devices Deployment Standard

OWASP Secure Medical Devices Deployment Standard
Release Date: 08/07/2018

With the explosion of botnets and other malware that now target IoT devices (of which medical devices can be considered a subtype) the need for security-min...

Request to download
Security Position Paper Network Function Virtualization - Chinese Translation

Security Position Paper Network Function Virtualization - Chinese Translation
Release Date: 08/03/2018

近五年来,随着云基础设施的能力和复杂性飞速演进,安全风险也相应上升。 虽然虚拟化已不是一个很新的概念,但几乎任何人都可以对计算、存储、网络和应 用程序等资源进行虚拟化的想法会增加安全威胁的影响和速度。同时,全球地缘政 治格局已从由机遇驱动的网络攻击转变为资金充足的国家行动

Request to download