CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Customer Zero Trust Implementation Journey Presentation Recording of the customer Zero Trust Implementation Journey Presentation by Pam Kubiatowski to the CSA ZT workgroup about her global network transformatio... Request to download |
![]() | Zero Trust as a Security Philosophy When implemented correctly, a Zero Trust architecture/strategy/approach to Information Technology, and the architecture that supports it, has the potentia... Request to download |
![]() | Software-Defined Perimeter (SDP) Specification v2.0 - Korean Translation 소프트웨어 정의 경계(SDP) 아키텍처는 제로 트러스트 원칙을 구현하는 효과적인 방법이다. SDP는 엔터프라이즈 보안 설계자, 네트워크 공급자 및 애플리케이션 소유자에게 동적 "소프트웨어 정의" 경계선을 구축하고, 네트워크와 리소스를 은폐하고, 네트워크 및 리소스에서 실행되는... Request to download |
![]() | CISO Perspectives and Progress in Deploying Zero Trust Some of the areas covered in this survey include where Zero Trust falls as a priority in the organization, the percentage of those who have completed rela... Request to download |
![]() | Software-Defined Perimeter (SDP) Specification v2.0 - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement The purpose of this research article is to explain how DNS and the enterprise-managed DDI system can be combined with a Software-Defined Perimeter to deli... Request to download |
![]() | Toward a Zero Trust Architecture - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Software-Defined Perimeter (SDP) Specification v2.0 The Software-Defined Perimeter (SDP) architecture is an effective way to implement the principles of Zero Trust. SDP aims to give enterprise security arch... Request to download |
![]() | Toward a Zero Trust Architecture - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | CISO Perspectives and Progress in Deploying Zero Trust - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Toward a Zero Trust Architecture Enterprise stakeholders must consider the challenges of increased real-time system complexity, the need for new cybersecurity policy and strong cultural s... Request to download |
![]() | Zero Trust Architecture Expert Group Charter The CSA Zero Trust Architecture Expert Group will review and advise on the scope, curriculum, objectives, structure, go-to-market (GTM) strategy and value pr... Request to download |
![]() | Software Defined Perimeter Architecture Guide: Korean Translation This localized version of this publication was produced from the original source (link to original) material through the efforts of chapters and volunteer... Request to download |
![]() | Software-Defined Perimeter Zero Trust Charter The proposed charter outlines the scope, responsibilities, etc. to align and guide the Software-Defined Perimeter Zero Trust working group through the year 2... Request to download |
![]() | SDP: The Most Advanced Zero Trust Architecture Today’s “Zero Trust” implementations are like putting up a wall with multiple doors and allowing people to come and pick a lock on the door. We are then just... Request to download |
![]() | Software-Defined Perimeter ARCHITECTURE GUIDE - Japanese Translation Software Defined Perimeter (SDP) Architecture Guide is designed to leverage proven, standards-based components to stop network attacks against application in... Request to download |
![]() | Software-Defined Perimeter as a DDoS Prevention Mechanism The primary goal of this document is to increase the awareness and understanding of SDP as a tool to prevent DDoS attacks by demonstrating its efficiency and... Request to download |
![]() | Software Defined Perimeter (SDP): Awareness and Adoption Infographic A majority of organizations recognize the need to change their approach to user access control. SDP is seeing early market adoption and awareness, with under... Request to download |
![]() | Software Defined Perimeter for Infrastructure as a Service: Chinese Translation Obtain a clear sense of the security challenges facing enterprise users of IaaS, understand the problems that arise from combining native IaaS access control... Request to download |