CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | CCM v3.0.1-080319 The CCM, the only meta-framework of cloud-specific security controls, mapped to leading standards, best practices and regulations. CCM provides organizations... Request to download |
![]() | Information Security Management through Reflexive Security This document defines “Reflexive Security” as a new security management approach that is built upon the interrelationships between security, development and ... Request to download |
![]() | Documentation of Relevant Distributed Ledger Technology and Blockchain Use Cases v2 Thanks to the rise in popularity of Bitcoin cryptocurrency, the innovative technologies of Blockchain and other systems of distributed ledger technology (DLT... Request to download |
![]() | Best Practices for Implementing a Secure Application Container Architecture Application containers and a microservices architecture are being used to design, develop and deploy applications leveraging agile software development appro... Request to download |
![]() | Takedown Tools and Services New Services and Tools for Cyber-Crime. The H2020 EU funded project, Takedown, in which CSA participated along with 18 other partners-organisations, deliver... Request to download |
![]() | Challenges in Securing Application Containers and Microservices Application containers and a microservices architecture are being used to design, develop and deploy applications leveraging agile software development appro... Request to download |
![]() | Cloud Penetration Testing Playbook As cloud services continue to enable new technologies and see massive adoption there is a need to extend the scope of penetration testing into public cloud s... Request to download |
![]() | CCM and CAIQ (Japanese Translations) Cloud Security Alliance (CSA) in the context of an agreement with OneTrust has translated the Cloud Control Matrix (CCM) v3.0.1 and CAIQ in Japanese Request to download |
![]() | Software Defined Perimeter (SDP): Awareness and Adoption Infographic A majority of organizations recognize the need to change their approach to user access control. SDP is seeing early market adoption and awareness, with under... Request to download |
![]() | Guide to IoT Framework: Chinese Translation The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework spreadsheet. This guide ex... Request to download |
![]() | Software Defined Perimeter for Infrastructure as a Service: Chinese Translation Obtain a clear sense of the security challenges facing enterprise users of IaaS, understand the problems that arise from combining native IaaS access control... Request to download |
![]() | IoT Controls Framework: Chinese Translation The Internet of Things (IoT) Security Controls Framework introduces the base-level security controls required to mitigate many of the risks associated with a... Request to download |
![]() | Cloud Octagon Model In this document CSA provides an approach to assess risk in SaaS cloud computing. It takes into account the security challenges in a cloud computing environm... Request to download |
![]() | Software Defined Perimeter for Infrastructure as a Service: Japanese Translation Obtain a clear sense of the security challenges facing enterprise users of IaaS, understand the problems that arise from combining native IaaS access control... Request to download |
![]() | Mitigating the Quantum Threat with Hybrid Cryptography Focus of this document is on four hybrid cryptographic schemes which provide both classical security of classical crypto and the quantum security of a quantu... Request to download |
![]() | Top 20 Critical Controls for Cloud ERP Customers This document aims to be a guide for assessing and prioritizing the most critical controls that organizations should take into account when trying to secure ... Request to download |
![]() | Cloud Penetration Testing Guidance This document aims to be a guide for conducting penetration testing on cloud services. The document outlines important aspects such as the scoping of cloud p... Request to download |
![]() | Cloud Security Alliance Code of Conduct for GDPR Compliance (Updated - September 2020) The CSA Code of Conduct is designed to offer both a compliance tool for GDPR compliance and transparency guidelines regarding the level of data protection o... Request to download |
![]() | Preparing Enterprises for the Quantum Computing Cybersecurity Threats Quantum computing, while expected to help make many advancements, will also break the existing asymmetric-key cryptosystems, thus endangering our security in... Request to download |
![]() | Cloud Security Complexity CSA’s latest survey examines information security concerns in complex cloud environment. The survey of 700 IT and security professionals aims to analyze and ... Request to download |