CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Cloud Incident Response Framework This document aims to provide a Cloud Incident Response (CIR) framework that serves as a go-to guide for a CSC to effectively prepare for and manage cloud in... Request to download | |
Security Guidelines for Providing and Consuming APIs In modern application workloads, organizations are often required to integrate their application with other parties such as Software-as-a-Service (SaaS) prov... Request to download | |
Crypto-Asset Exchange Security Guidelines Thanks to the blockchain technology that makes them possible, crypto-assets are becoming massively successful. As with any successful industry, a multitud... Request to download | |
Zero Trust Architecture Expert Group Charter The CSA Zero Trust Architecture Expert Group will review and advise on the scope, curriculum, objectives, structure, go-to-market (GTM) strategy and value pr... Request to download | |
Critical Controls Implementation for Oracle E-Business Suite This paper will help an organization determine what security changes are needed when deploying Oracle E-Business Suite (EBS) in the Cloud. For clarity, this ... Request to download | |
Cloud Penetration Testing Playbook: Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
CSA STAR Level 3 Focus Group Charter The CSA STAR Level 3 Focus Group will advise on the scope, objectives, structure, go-to-market (GTM) strategy and value proposition for STAR Level 3... Request to download | |
Software Defined Perimeter Architecture Guide: Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
State of Cloud Security Concerns, Challenges, and Incidents The use of cloud services has continued to increase over the past decade. Particularly in the wake of the COVID-19 public health crisis, many enterprises’... Request to download | |
CCAK Related Study Materials The following resources are frequently referenced in the CCAK study guide and training materials. You can download the unofficial prep-kit with the correc... Request to download | |
Key Management when using Cloud Services - Japanese Translation The purpose of this document is to provide guidance for using Key Management Systems (KMS) with cloud services, whether the key management system is native t... Request to download | |
Confidence in Post Quantum Algorithms NIST made the recent announcement of its Round 3 candidates for future post-quantum cryptography or quantum safe standards. As the world prepares to transiti... Request to download | |
Cloud Incident Response Working Group Charter In today’s connected era, a comprehensive incident response strategy is an integral aspect of any organization aiming to manage and lower their risk profile.... Request to download | |
Blockchains in the Quantum Era Digital Ledger Technologies (DLT) such as blockchain are being deployed as part of diverse applications that span multiple market segments. Application devel... Request to download | |
CSA IoT Security Controls Framework v2 The IoT Security Controls Framework is relevant for enterprise IoT systems that incorporate multiple types of connected devices, cloud services, and networki... Request to download | |
Guide to the Internet of Things (IoT) Security Controls Framework v2 The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework v2 spreadsheet. This guide... Request to download | |
Earning Trust in the 21st Century This paper addresses the technical, social, policy, and regulatory issues associated with creating trust frameworks in a Zero Trust world. Industry and gover... Request to download | |
Turkey Cloud Adaptation Survey – Turkey vs EU comparison In the last quarter of 2020 as a comprehensive CSA Global's done all over the world "Cloud Computing and Cloud Technology Use in Transition Survey" which mad... Request to download | |
APAC Data Sovereignty Working Group Charter The proposed charter outlines the scope, responsibilities, issues to address, align and guide the working group. Request to download | |
Mitigating Hybrid Clouds Risks - Turkish Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated c... Request to download |