CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated c... Request to download |
![]() | Top Threats to Cloud Computing: Egregious Eleven Deep Dive The purpose of the report is to provide organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated ... Request to download |
![]() | Top Threats to Cloud Computing: Egregious Eleven The report provides organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated risk-management deci... Request to download |
![]() | Cloud Penetration Testing Playbook As cloud services continue to enable new technologies and see massive adoption there is a need to extend the scope of penetration testing into public cloud s... Request to download |
![]() | Cloud Penetration Testing Guidance This document aims to be a guide for conducting penetration testing on cloud services. The document outlines important aspects such as the scoping of cloud p... Request to download |
![]() | Top Threats to Cloud Computing: Deep Dive This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its foundation. Each... Request to download |
![]() | Top Threats to Cloud Computing Plus: Industry Insights Abstract: The Top Threats to Cloud Computing Plus: Industry Insights serves as a validation of the relevance of security issues discussed in the earlier docu... Request to download |
![]() | ‘The Treacherous Twelve’ Cloud Computing Top Threats in 2016 “The Treacherous 12 - Cloud Computing Top Threats in 2016” plays a crucial role in the CSA research ecosystem. The purpose of the report is to provide organi... Request to download |
![]() | The Notorious Nine: Cloud Computing Top Threats in 2013 Providing organizations with up-to-date, expert-informed understanding of cloud security threats in order to make educated risk-management decisions regardin... Request to download |