CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Guide to the Internet of Things (IoT) Security Controls Framework v2 The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework v2 spreadsheet. This guide... Request to download | |
Earning Trust in the 21st Century This paper addresses the technical, social, policy, and regulatory issues associated with creating trust frameworks in a Zero Trust world. Industry and gover... Request to download | |
Turkey Cloud Adaptation Survey – Turkey vs EU comparison In the last quarter of 2020 as a comprehensive CSA Global's done all over the world "Cloud Computing and Cloud Technology Use in Transition Survey" which mad... Request to download | |
APAC Data Sovereignty Working Group Charter The proposed charter outlines the scope, responsibilities, issues to address, align and guide the working group. Request to download | |
Mitigating Hybrid Clouds Risks - Turkish Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated c... Request to download | |
The 12 Most Critical Risks for Serverless Applications - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Software-Defined Perimeter Zero Trust Charter The proposed charter outlines the scope, responsibilities, etc. to align and guide the Software-Defined Perimeter Zero Trust working group through the year 2... Request to download | |
Cloud Security Initiative for the Financial Sector - Working Group Charter CSA is partnering with the Cyber Risk Institute (CRI) to provide the financial community with new resources to map and integrate CSA’s Cloud Controls Matr... Request to download | |
Enterprise Architecture to CCM Shared Responsibility Model The EA-CCM Shared Responsibility Model is a companion piece with the EA-CCM Mapping. To review the EA-CCM Mapping, follow this link. (https://cloudsecuritya... Request to download | |
Enterprise Architecture to CCM v3.0.1 Mapping The EA-CCM Mapping is a companion piece with the EA-CCM Shared Responsibility Model. To review the Shared Responsibility Model, follow this link. (http://cl... Request to download | |
Cloud-Based, Intelligent Ecosystems This paper proposes a call to action for security executives to break the endless cycle of iterative tool adoption and, instead, move to data-centric securit... Request to download | |
Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
The 2020 State of Identity Security in the Cloud The use of cloud services have continued to increase over the past decade. Particularly in the wake of the COVID-19 public health crisis, many enterprises di... Request to download | |
Best Practices in Implementing a Secure Microservices Architecture - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Key Management in Cloud Services The purpose of this document is to provide guidance for using Key Management Systems (KMS) with cloud services, whether the key management system is native t... Request to download | |
Cloud Controls Matrix v3.0.1 ISO Reverse Mapping This latest expansion to the CCM incorporates the ISO/IEC 27017:2015:2015 and ISO/IEC 27018:20147:2015 and ISO/IEC 27002:2013 controls, introduces a new appr... Request to download | |
Mitigating Hybrid Clouds Risks Hybrid clouds are often the starting point for organizations in their cloud journey. However, any cloud model consists of risks, threats, and vulnerabilitie... Request to download | |
Cloud OS Security Specification v2.0 Currently, most of the standards related to cloud computing security focus on information security management systems (ISMS), and corresponding certification... Request to download | |
Survey Report - Security Practices in HPC & HPC Cloud This survey report aims to provide insights to the level and type of cyber and cloud security adopted by High Performance Computing (HPC) / HPC Cloud infrast... Request to download | |
Critical-Controls-Implementation-for-SAP-(Parts-1-and-2) SAP security documentation can be difficult to navigate and there are currently no frameworks that aligns with standard controls. This document aims to allev... Request to download |