CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Using Zero Trust to Counter Identity Spoofing & Abuse Release Date: 04/22/2026 Traditional network perimeters are becoming increasingly irrelevant in today’s hybrid environments. Instead, this publication emphasizes the growing impor... Request to download | |
Release Date: 04/20/2026 AI agents are rapidly becoming embedded across enterprise environments. They span cloud platforms, SaaS applications, internal systems, and LLM-driven wor... Request to download | |
Enterprise AI Security Starts with AI Agents Release Date: 04/15/2026 This survey report explores the rise of AI agents in enterprises, as well as the reality of autonomous AI risks. Commissioned by Zenity, the report reveal... Request to download | |
SaaS Security Capability Framework (SSCF) Now includes a security questionnaire, implementation guidelines, and machine-readable versions!The SaaS Security Capability Framework (SSCF) defines conf... Request to download | |
Zero Trust Guidance for Achieving Operational Resilience Release Date: 04/06/2026 Resiliency is an increasingly important global business and compliance priority across different jurisdictions and business sectors, particularly those consi... Request to download | |
The Rise in Unstructured Data and AI Security Risks Release Date: 03/30/2026 As organizations generate increasing volumes of files, documents, communications, and logs across the cloud, they're also pushing traditional security mod... Request to download | |
Identity and Access Gaps in the Age of Autonomous AI Release Date: 03/23/2026 Enterprises are embedding agentic AI across their environments, allowing agents to interact with applications, infrastructure, and data systems. They are ... Request to download | |
Using Zero Trust to Secure Enterprise Information in LLM Environments Release Date: 03/02/2026 The rapid adoption of Generative AI (GenAI) is transforming organizational workflows. However, it's also escalating risks related to data privacy, intelle... Request to download | |
Data Loss Prevention and Data Security Posture Management in Healthcare Release Date: 02/18/2026 Healthcare organizations are rapidly adopting artificial intelligence to improve patient care, operational efficiency, and research innovation. AI in heal... Request to download | |
Release Date: 02/13/2026 This introduction provides foundational context and practical direction for organizations using CSA’s Cloud Controls Matrix (CCM) v4.1. The CCM is a vendo... Request to download | |
Enabling Zero Trust for Cellular Networks Release Date: 02/11/2026 4G/LTE, 5G, and Open Radio Access Network (O-RAN) cellular networks have evolved into highly distributed, hybrid cloud ecosystems. These architectures und... Request to download | |
Release Date: 02/04/2026 Autonomous AI agents are being embedded across cloud, hybrid, and on-prem environments. However, most identity systems were built for humans, not for self... Request to download | |
Stealth Mode SDP for Zero Trust Network Infrastructure Release Date: 02/03/2026 Traditional TCP/IP networking was designed for openness, not adversarial environments. This default visibility has become a critical liability in an era o... Request to download | |
The Continuous Audit Metrics Catalog Release Date: 01/28/2026 Are traditional infosec assurance tools outdated? Many cloud customers think so. They see that technology changes quickly, and products are frequently evo... Request to download | |
Cloud Controls Matrix and CAIQ v4.1 Release Date: 01/27/2026 The Cloud Controls Matrix (CCM) is a cybersecurity control framework made up of 207 controls across 17 security domains. The CCM maps to industry best pra... Request to download | |
Release Date: 01/27/2026 The Cloud Security Alliance, in collaboration with the CCM Working Group, proudly presents the CCM-Lite and CAIQ-Lite File Bundle. These tools offer a str... Request to download | |
The State of Non-Human Identity and AI Security Release Date: 01/26/2026 Based on a comprehensive survey of IT and security professionals, this report explores how rapid AI adoption amplifies long-standing Identity and Access M... Request to download | |
![]() | Security Controls Catalog WG 2026 Charter Release Date: 01/26/2026 This charter establishes the mission, scope and responsibilities, goals, objectives, and operational procedures for the Security Controls Catalog (SCC) WG. ... Request to download |
The State of AI Security and Governance Release Date: 12/17/2025 Organizations are rapidly moving from AI experimentation to operational deployment, yet their abilities to secure this transformation vary widely. Commiss... Request to download | |
Release Date: 12/10/2025 This infographic offers a clear understanding of how cloud service providers and customers share responsibilities for cloud key management.Cloud key manag... Request to download |
