CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
The 12 Most Critical Risks for Serverless Applications - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Software-Defined Perimeter Zero Trust Charter The proposed charter outlines the scope, responsibilities, etc. to align and guide the Software-Defined Perimeter Zero Trust working group through the year 2... Request to download | |
Cloud Security Initiative for the Financial Sector - Working Group Charter CSA is partnering with the Cyber Risk Institute (CRI) to provide the financial community with new resources to map and integrate CSA’s Cloud Controls Matr... Request to download | |
Enterprise Architecture to CCM Shared Responsibility Model The EA-CCM Shared Responsibility Model is a companion piece with the EA-CCM Mapping. To review the EA-CCM Mapping, follow this link. (https://cloudsecuritya... Request to download | |
Enterprise Architecture to CCM v3.0.1 Mapping The EA-CCM Mapping is a companion piece with the EA-CCM Shared Responsibility Model. To review the Shared Responsibility Model, follow this link. (http://cl... Request to download | |
Cloud-Based, Intelligent Ecosystems This paper proposes a call to action for security executives to break the endless cycle of iterative tool adoption and, instead, move to data-centric securit... Request to download | |
Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
The 2020 State of Identity Security in the Cloud The use of cloud services have continued to increase over the past decade. Particularly in the wake of the COVID-19 public health crisis, many enterprises di... Request to download | |
Best Practices in Implementing a Secure Microservices Architecture - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Key Management in Cloud Services The purpose of this document is to provide guidance for using Key Management Systems (KMS) with cloud services, whether the key management system is native t... Request to download | |
Cloud Controls Matrix v3.0.1 ISO Reverse Mapping This latest expansion to the CCM incorporates the ISO/IEC 27017:2015:2015 and ISO/IEC 27018:20147:2015 and ISO/IEC 27002:2013 controls, introduces a new appr... Request to download | |
Mitigating Hybrid Clouds Risks Hybrid clouds are often the starting point for organizations in their cloud journey. However, any cloud model consists of risks, threats, and vulnerabilitie... Request to download | |
Cloud OS Security Specification v2.0 Currently, most of the standards related to cloud computing security focus on information security management systems (ISMS), and corresponding certification... Request to download | |
Survey Report - Security Practices in HPC & HPC Cloud This survey report aims to provide insights to the level and type of cyber and cloud security adopted by High Performance Computing (HPC) / HPC Cloud infrast... Request to download | |
Critical-Controls-Implementation-for-SAP-(Parts-1-and-2) SAP security documentation can be difficult to navigate and there are currently no frameworks that aligns with standard controls. This document aims to allev... Request to download | |
Top Threats to Cloud Computing: Egregious Eleven Deep Dive The purpose of the report is to provide organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated ... Request to download | |
Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Chinese Translation The purpose of the report is to provide organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated ... Request to download | |
Gap Analysis Report - Mapping of the Association of Banks in Singapore Cloud Computing Implementation Guide 2.0 to Cloud Security Alliance Cloud Controls Matrix v3.0.1 The CCM Addendum (mapping with Association of Banks in Singapore Cloud Computing Implementation Guide 2.9) is a companion piece with the Gap Analysis Report.... Request to download | |
CCM Gap Analysis Report (ABS CCIG) The Gap Analysis Report is a companion piece with the CCM Addendum (mapping with Association of Banks in Singapore Cloud Computing Implementation Guide 2.9).... Request to download | |
CSA's Perspective on Cloud Risk Management The rapid growth in both scope and market share, combined with the inherent complexity of cloud computing, appears to be straining the capabilities of existi... Request to download |