CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Guideline on Effectively Managing Security Service in the Cloud - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
The Importance of STAR Compliance requires a comprehensive review of services and processes related to cloud infrastructure and how it is managed during a data lifecycle. STAR f... Request to download | |
CCM v4 - Indonesian Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Software-Defined Perimeter (SDP) Specification v2.0 The Software-Defined Perimeter (SDP) architecture is an effective way to implement the principles of Zero Trust. SDP aims to give enterprise security arch... Request to download | |
Blockchain/Distributed Ledger Technology (DLT) Risk and Security Considerations There is no shortage of guidance on how to design, configure and deploy Fabric solutions. This paper provides insights into how the three layers of blockc... Request to download | |
IoT Charter 2022 This charter lays out the scope, responsibilities, and roadmap for the IoT Working Group. The Cloud Security Alliance (CSA) IoT Working Group (IoTWG) plan... Request to download | |
Toward a Zero Trust Architecture - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Cybersecurity Best Practices for the Manufacturing Industry This publication was produced through the efforts of chapters and volunteers but the content development falls outside of the CSA Research Lifecycle. For ... Request to download | |
DevSecOps - Pillar 4 Bridging Compliance and Development Given the rapid evolution of software development paradigms and practices, it has become a challenge to align monolithic security compliance activities wi... Request to download | |
Top Threats to Cloud Computing Pandemic Eleven - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
The 2020 State of Identity Security in the Cloud - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
SaaS Governance Best Practices for Cloud Customers - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Guide to the Internet of Things (IoT) Security Controls Framework v2 - Chinese Translation The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework v2 spreadsheet. This guide... Request to download | |
Protecting the Privacy of Healthcare Data in the Cloud - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
How to Design a Secure Serverless Architecture - Chinese Translation Like any solution, serverless computing brings with it a variety of cyber risks. This paper covers security for serverless applications, focusing on best pra... Request to download | |
CSA Enterprise Architecture Reference Guide - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Blockchains in the Quantum Era - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Cloud Incident Response Framework - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
CISO Perspectives and Progress in Deploying Zero Trust - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |