CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Cloud Threat Modeling The purpose of this document is to enable, encourage cloud and security practitioners to apply threat modeling for cloud applications, services, and security... Request to download | |
Cloud Key Management Working Group Charter 2021 Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using key management systems with thos... Request to download | |
The Use of Blockchain in Healthcare Healthcare is a large and heavily regulated industry. US and EU privacy and security laws require healthcare organizations to protect personal information... Request to download | |
Healthcare Cybersecurity Playbook - An Evolving Landscape One aspect of healthcare that has increased significantly during the COVID-19 pandemic is the use of telehealth. Telehealth is used for everything from re... Request to download | |
SecaaS Working Group Charter 2021 This charter lays out the scope, responsibilities, and roadmap for the Security as a Service (SecaaS) Working Group. The SecaaS Working Group has been cre... Request to download | |
Critical Controls Implementation for Salesforce - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Hyperledger Fabric 2.0 Architecture Security Report Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many... Request to download | |
Hyperledger Fabric 2.0 Architecture Security Controls Checklist Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many... Request to download | |
Code of Practice for Implementing STAR Level 2 This Code of Practice shows how you can apply the CCM control set in your organization to reach STAR Level 2 third party certification/attestation and als... Request to download | |
Critical Controls Implementation for Salesforce The Salesforce Platform can be a valuable tool for organizations to build and test applications. However, certain security changes are needed when an orga... Request to download | |
Telehealth Risk Management The recent COVID-19 pandemic has increased the demand for data and accelerated the use of telehealth. The Health Resources and Services Administration (HRSA)... Request to download | |
STAR Level 1: Security Questionnaire (CAIQ v4) The STAR Level 1: Security Questionnaire (CAIQ v4) offers an industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services,... Request to download | |
Cloud Incident Response Framework - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
CSA IoT Security Controls Framework v2 - Japanese Translation The IoT Security Controls Framework is relevant for enterprise IoT systems that incorporate multiple types of connected devices, cloud services, and networki... Request to download | |
CSA Guide to the IoT Security Controls Framework v2 - Japanese Translation The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework spreadsheet. This guide ex... Request to download | |
Cloud Solution Data Science COVID-19 Dashboard Data centers grow annually by about forty percent, and those for industries such as healthcare, energy, and transportation are growing even faster. Howeve... Request to download | |
CSA Enterprise Architecture Reference Guide The Enterprise Architecture Reference Guide v2 is a companion piece with the EA v2 to CCM v3.0.1 Mapping. The peer review for both documents are intended to ... Request to download | |
Enterprise Architecture Reference Diagram The CSA Enterprise Architecture (EA) is both a methodology and a set of tools. It is a framework, a comprehensive approach for the architecture of a secure c... Request to download | |
Enterprise Architecture v2 to CCM v3.01 Mapping Guide The Enterprise Architecture (EA) is the CSA’s standard cloud reference architecture while the Cloud Control Matrix (CCM) is the CSA’s standard control set. T... Request to download | |
Enterprise Architecture to CCM v3.01 Reordered Mapping The EA v2 to CCM v3.0.1 Mapping is a companion piece with the Enterprise Architecture Reference Guide v2. The peer review for both documents are intended to ... Request to download |