CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Top Threats to Cloud Computing: Egregious Eleven - Korean Translation

Top Threats to Cloud Computing: Egregious Eleven - Korean Translation
Release Date: 08/17/2021

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Cloud Threat Modeling

Cloud Threat Modeling
Release Date: 07/29/2021

The purpose of this document is to enable, encourage cloud and security practitioners to apply threat modeling for cloud applications, services, and security...

Request to download
Cloud Penetration Testing Playbook: Korean Translation

Cloud Penetration Testing Playbook: Korean Translation
Release Date: 04/02/2021

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Japanese Translation

Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Japanese Translation
Release Date: 11/30/2020

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated c...

Request to download
Top Threats to Cloud Computing: Egregious Eleven Deep Dive

Top Threats to Cloud Computing: Egregious Eleven Deep Dive
Release Date: 09/23/2020

The purpose of the report is to provide organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated ...

Request to download
Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Chinese Translation

Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Chinese Translation
Release Date: 09/21/2020

The purpose of the report is to provide organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated ...

Request to download
Top Threats to Cloud Computing: Egregious Eleven - Japanese Translation

Top Threats to Cloud Computing: Egregious Eleven - Japanese Translation
Release Date: 11/18/2019

The purpose of the report is to provide organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated ...

Request to download
Top Threats to Cloud Computing: Egregious Eleven

Top Threats to Cloud Computing: Egregious Eleven
Release Date: 08/06/2019

The report provides organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated risk-management deci...

Request to download
Cloud Penetration Testing Playbook

Cloud Penetration Testing Playbook
Release Date: 07/12/2019

As cloud services continue to enable new technologies and see massive adoption there is a need to extend the scope of penetration testing into public cloud s...

Request to download

Cloud Penetration Testing Guidance
Release Date: 06/07/2019

This document aims to be a guide for conducting penetration testing on cloud services. The document outlines important aspects such as the scoping of cloud p...

Request to download
Top Threats to Cloud Computing: Deep Dive

Top Threats to Cloud Computing: Deep Dive
Release Date: 08/08/2018

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its foundation. Each...

Request to download
The Treacherous 12 – Top Threats to Cloud Computing + Industry Insights - Japanese Translation

The Treacherous 12 – Top Threats to Cloud Computing + Industry Insights - Japanese Translation
Release Date: 05/21/2018

誰も予測できなかった速さで、クラウドコンピューティングはビジネスや政府に等しく変容を迫り、そ して新たなセキュリティ課題をもたらしている。クラウドのサービスモデルが開発されることで、ビジ ネスを支える技術はかつてないほど効率性の高いものになった。サーバを保有する発想からサービ ス利用ベースの思考への転換は、IT ...

Request to download
Top Threats to Cloud Computing Plus: Industry Insights

Top Threats to Cloud Computing Plus: Industry Insights
Release Date: 10/20/2017

Abstract: The Top Threats to Cloud Computing Plus: Industry Insights serves as a validation of the relevance of security issues discussed in the earlier docu...

Request to download
Top Threats to Cloud Computing Deep Dive: Chinese Translation

Top Threats to Cloud Computing Deep Dive: Chinese Translation
Release Date: 06/24/2017

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its foundation. Each...

Request to download
‘The Treacherous Twelve’ Cloud Computing Top Threats in 2016

‘The Treacherous Twelve’ Cloud Computing Top Threats in 2016
Release Date: 02/29/2016

“The Treacherous 12 - Cloud Computing Top Threats in 2016” plays a crucial role in the CSA research ecosystem. The purpose of the report is to provide organi...

Request to download
The Notorious Nine: Cloud Computing Top Threats in 2013

The Notorious Nine: Cloud Computing Top Threats in 2013
Release Date: 02/24/2013

Providing organizations with up-to-date, expert-informed understanding of cloud security threats in order to make educated risk-management decisions regardin...

Request to download