CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | CSA IoT Security Controls Framework v2 The IoT Security Controls Framework is relevant for enterprise IoT systems that incorporate multiple types of connected devices, cloud services, and networki... Request to download |
![]() | Guide to the Internet of Things (IoT) Security Controls Framework v2 The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework v2 spreadsheet. This guide... Request to download |
![]() | Managing the Risk for Medical Devices Connected to the Cloud With the increased number of Internet of Things devices, Healthcare Delivery Organizations are experiencing a digital transformation bigger than anything in ... Request to download |
![]() | Guide to IoT Framework: Chinese Translation The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework spreadsheet. This guide ex... Request to download |
![]() | IoT Controls Framework: Chinese Translation The Internet of Things (IoT) Security Controls Framework introduces the base-level security controls required to mitigate many of the risks associated with a... Request to download |
![]() | CSA IoT Security Controls Framework The Internet of Things (IoT) Security Controls Framework introduces the base-level security controls required to mitigate many of the risks associated with a... Request to download |
![]() | CSA Guide to the IoT Security Controls Framework The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework spreadsheet. This guide ex... Request to download |
![]() | Future Proofing the Connected World - Korean Translation An IoT system is only as secure as its weakest link, this document is our attempt at providing actionable and useful guidance for securing the individual pro... Request to download |
![]() | IoT Firmware Update Processes The traditional approach to updating software for IT assets involves analysis, staging and distribution of the update—a process that usually occurs during of... Request to download |
![]() | OWASP Secure Medical Devices Deployment Standard With the explosion of botnets and other malware that now target IoT devices (of which medical devices can be considered a subtype) the need for security-min... Request to download |
![]() | Using BlockChain Technology to Secure the Internet of Things - Chinese Translation 在过去的四年中,技术专家、首席数字官、营销经理、记者、博客作者和研究机构讨论 并 推广了一种新的分布式模型,将区块链技术应用于安全事务处理和存储。国际数据公司 IDC FutureScape 预测,到 2020 年,全球 20%的贸易融资将纳入区块链。 Request to download |
![]() | Using Blockchain Technology to Secure the Internet of Things In the last four years, technical experts, chief digital officers, marketing managers, journalists, bloggers and research institutions have discussed and pro... Request to download |
![]() | Security Guidance for Early Adopters of the Internet of Things - Chinese Translation This document provides guidance for the secure implementation of Internet of Things (IoT)-based systems. We have provided the guidance in this document to ... Request to download |
![]() | Observations and Recommendations on Connected Vehicle Security The introduction of Connected Vehicles (CVs) has been discussed for many years. Pilot implementations currently underway are evaluating CV operations in real... Request to download |
![]() | Establishing a Safe and Secure Municipal Drone Program This paper provides guidance on the safe and secure introduction and operation of a municipal “drone” program. This paper will try to analyze the drone’s rol... Request to download |
![]() | Future Proofing the Connected World An IoT system is only as secure as its weakest link, this document is our attempt at providing actionable and useful guidance for securing the individual pr... Request to download |
![]() | Identity and Access Management for the Internet of Things - Japanese Translation This document is the first in a series of summary guidance aimed at providing easily understandable recommendations to information technology staff charged... Request to download |
![]() | Guidelines for Safe Smart Cities Interest in the smart city concept has grown continuously over the past few years, with the top research being done in the Internet of Things (IoT) and urban... Request to download |
![]() | Identity and Access Management for the Internet of Things This document is the first in a series of summary guidance aimed at providing easily understandable recommendations to information technology staff charged w... Request to download |
![]() | New Security Guidance for Early Adopters of the IoT This document provides guidance for the secure implementation of Internet of Things (IoT)-based systems. We have provided the guidance in this document to ai... Request to download |