CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Machine Identity in Cybersecurity and IAM Identity management is a crucial aspect of information security, as it ensures that only authorized individuals and entities have access to sensitive data... Request to download |
![]() | Defining Shadow Access: The Emerging IAM Security Challenge Shadow Access is the unmonitored, unauthorized, invisible, unsafe and generally over-permissioned access in your cloud environment. In short, the unintend... Request to download |
![]() | Identity and Access Management Glossary The Identity and Access Management (IAM) Glossary is a reference document that aggregates and summarizes IAM-related terms and definitions. Bringing toget... Request to download |
![]() | Zero Trust Principles and Guidance for Identity and Access Management (IAM) Identity and the ability to consume information about that identity as well as other Zero Trust (ZT) signals (additional attributes about an identity), is... Request to download |
![]() | What is IAM for the Cloud? The purpose of this document is to provide an understanding of the challenges and considerations involved in managing Identity and Access Management (IAM)... Request to download |
![]() | Identity Access Management Working Group Charter Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using Identity Access Management (IAM)... Request to download |
![]() | The 2020 State of Identity Security in the Cloud - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | The 2020 State of Identity Security in the Cloud The use of cloud services have continued to increase over the past decade. Particularly in the wake of the COVID-19 public health crisis, many enterprises di... Request to download |
![]() | Identity Security The goal of the Identity Solutions: Security Beyond the Perimeter survey was to address Insufficient Identity, Credential, and Access Management and gain a b... Request to download |
![]() | Identity and Access Management for the Internet of Things - Japanese Translation This document is the first in a series of summary guidance aimed at providing easily understandable recommendations to information technology staff charged... Request to download |
![]() | Identity and Access Management for the Internet of Things This document is the first in a series of summary guidance aimed at providing easily understandable recommendations to information technology staff charged w... Request to download |
![]() | SecaaS Category 1 // Identity and Access Management Implementation Guidance This document addresses personnel involved in the identification and implementation of the IAM solution in the cloud. It will be of particular interest to th... Request to download |