CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | STAR Enabled Solution | CAIQ-Lite CSA and Whistic identified the need for a lighter-weight assessment questionnaire in order to accommodate the shift to cloud procurement models, and to enabl... Request to download |
![]() | STAR Enabled Solution | CSA - OneTrust VRM Tool The CSA-OneTrust Vendor Risk Management (VRM) tool automates the entire vendor management lifecycle, including onboarding and offboarding vendors, triaging v... Request to download |
![]() | Cloud Incident Response Framework This document aims to provide a Cloud Incident Response (CIR) framework that serves as a go-to guide for a CSC to effectively prepare for and manage cloud in... Request to download |
![]() | Security Guidelines for Providing and Consuming APIs In modern application workloads, organizations are often required to integrate their application with other parties such as Software-as-a-Service (SaaS) prov... Request to download |
![]() | Crypto-Asset Exchange Security Guidelines Thanks to the blockchain technology that makes them possible, crypto-assets are becoming massively successful. As with any successful industry, a multitud... Request to download |
![]() | Zero Trust Architecture Expert Group Charter The CSA Zero Trust Architecture Expert Group will review and advise on the scope, curriculum, objectives, structure, go-to-market (GTM) strategy and value pr... Request to download |
![]() | Critical Controls Implementation for Oracle E-Business Suite This paper will help an organization determine what security changes are needed when deploying Oracle E-Business Suite (EBS) in the Cloud. For clarity, this ... Request to download |
![]() | Cloud Penetration Testing Playbook: Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | CSA STAR Level 3 Focus Group Charter The CSA STAR Level 3 Focus Group will advise on the scope, objectives, structure, go-to-market (GTM) strategy and value proposition for STAR Level 3. Thi... Request to download |
![]() | Software Defined Perimeter Architecture Guide: Korean Translation This localized version of this publication was produced from the original source (link to original) material through the efforts of chapters and volunteer... Request to download |
![]() | State of Cloud Security Concerns, Challenges, and Incidents The use of cloud services has continued to increase over the past decade. Particularly in the wake of the COVID-19 public health crisis, many enterprises’... Request to download |
![]() | CCAK Related Study Materials The following resources are frequently referenced in the CCAK study guide and training materials. You can download the unofficial prep-kit with the correc... Request to download |
![]() | Requirements for Bodies Providing STAR Certification This document outlines how to conduct a STAR certification assessments to the Cloud Controls Matrix (CCM) as part of an ISO 27001 assessment. --Cloud Se... Request to download |
![]() | Key Management when using Cloud Services - Japanese Translation The purpose of this document is to provide guidance for using Key Management Systems (KMS) with cloud services, whether the key management system is native t... Request to download |
![]() | Confidence in Post Quantum Algorithms NIST made the recent announcement of its Round 3 candidates for future post-quantum cryptography or quantum safe standards. As the world prepares to transiti... Request to download |
![]() | Cloud Incident Response Working Group Charter In today’s connected era, a comprehensive incident response strategy is an integral aspect of any organization aiming to manage and lower their risk profile.... Request to download |
![]() | Blockchains in the Quantum Era Digital Ledger Technologies (DLT) such as blockchain are being deployed as part of diverse applications that span multiple market segments. Application devel... Request to download |
![]() | CSA IoT Security Controls Framework v2 The IoT Security Controls Framework is relevant for enterprise IoT systems that incorporate multiple types of connected devices, cloud services, and networki... Request to download |
![]() | Guide to the Internet of Things (IoT) Security Controls Framework v2 The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework v2 spreadsheet. This guide... Request to download |
![]() | Earning Trust in the 21st Century This paper addresses the technical, social, policy, and regulatory issues associated with creating trust frameworks in a Zero Trust world. Industry and gover... Request to download |