Cloud 101
Circle
Events
Blog
Sign in or Sign Up
Membership
Join as an Organization
Enterprises
Solution Providers
Contact Us
Current Members
Initiatives & Partnerships
CxO Trust
Zero Trust Advancement Center
Trusted Cloud Providers
Trusted Cloud Consultant
Other Opportunities
Event Sponsorships
Join as Individual
Chapters
Circle Community Forum
Research Working Groups
Volunteer Opportunities
STAR Program
STAR Home
STAR Registry
Submit to Registry
Provide Feedback
Certified STAR Auditors
STAR Enabled Solutions
Stay compliant in the cloud
CCAK Training
STAR Lead Auditor Training
Governance, Risk & Compliance Tools
Cloud Controls Matrix (CCM)
Consensus Assessment Initiative Questionnaire (CAIQ)
GDPR Code of Conduct
STAR Level 1
At level one organizations submit a self-assessment.
View companies at level one
Learn about level one
STAR Level 2
At level two organizations earn a certification or third-party attestation.
View companies at level two
Learn about level two
Certificates & Training
Online Platform
Knowledge Center
CSA Exams
Events
Learn and network while you earn CPE credits.
Virtual Events & Webinars
Event Sponsorships
Certificates
Certificate of Cloud Security Knowledge (CCSK)
Certificate of Cloud Auditing Knowledge (CCAK)
Certificate of Competence in Zero Trust (CCZT)
Train my entire team
Trainings
Zero Trust Training (ZTT)
Cloud Infrastructure Security Training
STAR Lead Auditor Training
Advanced Cloud Security Practitioner (ACSP) Training
CCSK Train the Trainer
Training Network
Become an Instructor
Become a Training Partner
Research
CSA Research
Latest Research
Working Groups
Open Peer Reviews
Research Topics
Strategic Initiatives
Zero Trust Advancement Center
CxO Trust
Trusted Cloud Consultant
FinCloud Security
Thought Leadership
CloudBytes Webinars
Blog
Getting Started with CSA Research
Cloud security best practices
Assess your cloud compliance
Security questionnaire for vendors
Top threats to cloud computing
Awards & Recognition
Juanita Koilpillai Awards
Research Fellows
Architectures and Components
Enterprise Architecture
Hybrid Cloud Security
Emerging Technologies
Blockchain/Distributed Ledger
Quantum-safe Security
Artificial Intelligence
Securing DevOps
Application Containers and Microservices
DevSecOps
Security Services
Enterprise Resource Planning
Software-Defined Perimeter
Zero Trust
Threat Intelligence
Vulnerability Data
Top Threats
View all topics
Search for:
Membership
Join as an Organization
Enterprises
Solution Providers
Contact Us
Current Members
Initiatives & Partnerships
CxO Trust
Zero Trust Advancement Center
Trusted Cloud Providers
Trusted Cloud Consultant
Other Opportunities
Event Sponsorships
Join as Individual
Chapters
Circle Community Forum
Research Working Groups
Volunteer Opportunities
STAR Program
STAR Home
STAR Registry
Submit to Registry
Provide Feedback
Certified STAR Auditors
STAR Enabled Solutions
Stay compliant in the cloud
CCAK Training
STAR Lead Auditor Training
Governance, Risk & Compliance Tools
Cloud Controls Matrix (CCM)
Consensus Assessment Initiative Questionnaire (CAIQ)
GDPR Code of Conduct
STAR Level 1
At level one organizations submit a self-assessment.
View companies at level one
Learn about level one
STAR Level 2
At level two organizations earn a certification or third-party attestation.
View companies at level two
Learn about level two
Certificates & Training
Online Platform
Knowledge Center
CSA Exams
Events
Learn and network while you earn CPE credits.
Virtual Events & Webinars
Event Sponsorships
Certificates
Certificate of Cloud Security Knowledge (CCSK)
Certificate of Cloud Auditing Knowledge (CCAK)
Certificate of Competence in Zero Trust (CCZT)
Train my entire team
Trainings
Zero Trust Training (ZTT)
Cloud Infrastructure Security Training
STAR Lead Auditor Training
Advanced Cloud Security Practitioner (ACSP) Training
CCSK Train the Trainer
Training Network
Become an Instructor
Become a Training Partner
Research
CSA Research
Latest Research
Working Groups
Open Peer Reviews
Research Topics
Strategic Initiatives
Zero Trust Advancement Center
CxO Trust
Trusted Cloud Consultant
FinCloud Security
Thought Leadership
CloudBytes Webinars
Blog
Getting Started with CSA Research
Cloud security best practices
Assess your cloud compliance
Security questionnaire for vendors
Top threats to cloud computing
Awards & Recognition
Juanita Koilpillai Awards
Research Fellows
Architectures and Components
Enterprise Architecture
Hybrid Cloud Security
Emerging Technologies
Blockchain/Distributed Ledger
Quantum-safe Security
Artificial Intelligence
Securing DevOps
Application Containers and Microservices
DevSecOps
Security Services
Enterprise Resource Planning
Software-Defined Perimeter
Zero Trust
Threat Intelligence
Vulnerability Data
Top Threats
View all topics
Cloud 101
Circle
Events
Blog
Sign In
CSA Research Publications
Whitepapers, Reports and Other Resources
Research Home
Publications
Working Groups
Peer Reviews
Upcoming Meetings
Home
Research
Publications
Browse Publications
Search for:
Filter Results
Reset all filters
- By Cloud Experience -
Enhancing cloud security strategy
Innovating from the cloud
Transitioning to the cloud
- By Industry -
Financial Services
Health Information Management
- By Topics -
Application Containers and Microservices (8)
Artificial Intelligence (5)
Big Data (9)
Blockchain/Distributed Ledger (15)
CAIQ (8)
CASB (1)
CCAK (4)
CCSK (3)
C-Level (4)
Cloud Component Specifications (3)
Cloud Controls Matrix (49)
Cloud Experience (1)
Cloud Incident Response (7)
Cloud Key Management (8)
Cloud Security Services Management (7)
Cloud Trust Protocol (5)
Compliance (19)
Consensus Assessments (12)
Continuous Assurance Metrics (2)
CxO (2)
Cyber Incident Sharing (2)
DevSecOps (10)
Enhancing cloud security strategy (117)
Enterprise Architecture (13)
Enterprise Authority to Operate (EATO) (1)
Enterprise Resource Planning (9)
Financial Services (11)
GDPR (6)
Health Information Management (23)
High Performance Computing (4)
Hybrid Cloud Security (5)
Identity and Access Management (13)
Industrial Control Systems (6)
Innovating from the cloud (46)
Internet of Things (32)
Misconfiguration (5)
Mobile Application Security Testing (8)
Open Certification Framework (11)
Penetration Testing (3)
Privacy (11)
Privacy Level Agreement (9)
Quantum-Safe Security (18)
Ransomware (1)
Risk Management (14)
SaaS Governance (7)
Security as a Service (20)
Security Guidance (12)
Serverless (11)
Shared Responsibility Model (1)
Software Defined Perimeter (36)
Standards (2)
STAR (40)
Startups (1)
Strategic (1)
Surveys (34)
Threat Intelligence (11)
Top Threats (26)
Training (1)
Transitioning to the cloud (36)
Virtualization (1)
Vulnerability Data (1)
Working Group (8)
Zero Trust (37)
- By language -
Chinese
English
Hungarian
Indonesian
Japanese
Korean
Spanish
Turkish
No publications found matching that criteria, please broaden your search criteria.