CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
PLA Code of Practice Template Annex 1 (Updated - March 2020) CSA PLA Code of Conduct for GDPR Compliance provides a consistent and comprehensive framework for complying with the EU’s GDPR. The CSA PLA Code of Conduct f... Request to download | |
Software-Defined Perimeter ARCHITECTURE GUIDE - Japanese Translation Software Defined Perimeter (SDP) Architecture Guide is designed to leverage proven, standards-based components to stop network attacks against application in... Request to download | |
Best Practices for Implementing a Secure Application Container Architecture - Japanese Translation Application containers and a microservices architecture are being used to design, develop and deploy applications leveraging agile software development appro... Request to download | |
Best Practices in Implementing a Secure Microservices Architecture Application containers and a microservices architecture are being used to design, develop, and deploy applications leveraging agile software development appr... Request to download | |
The Six Pillars of DevSecOps: Collective Responsibility The DevSecOps Working Group identified and defined six focus areas critical to integrating DevSecOps into an organization, in accordance with the six pillars... Request to download | |
Cloud Usage in the Financial Services Sector This survey was created and completed by members of the the Financial Services Stakeholders Platform, a CSA working group whose main objective is to identify... Request to download | |
CSA CCM v3.0.1 Addendum - Cloud OS Security Specifications This document is an addendum to the CCM V3.0.1 and contains a controls mapping and gap analysis between the CSA CCM and CSA's research artifact "Cloud OS Sec... Request to download | |
Critical Controls Implementation for SAP The Critical Controls Implementation for SAP is the first in a series of implementation documents that the CSA ERP Security Working Group aims to develop. Th... Request to download | |
Privacy Level Agreement Working Group Charter The Cloud Security Alliance would like to invite you to review and comment on the updated Privacy Level Agreement Working Group Charter. The Privacy Level A... Request to download | |
CSA CCM v3.0.1 Addendum to the Reserve Bank of India (RBI)’s Gopala Krishna Committee (GKC) report This document contains a mapping and gap analysis between the cloud security requirements of CCM V3.0.1 and those of the Reserve Bank of India (RBI)’s Gopala... Request to download | |
Beyond the General Data Protection Regulation (GDPR) Data residency insights from around the world. This study reveals the top data protection concerns and strategies of more than 800 senior business profession... Request to download | |
Code of Conduct (CoC): Statement of Adherence 3rd Party Certification CSA PLA Code of Conduct for GDPR Compliance provides a consistent and comprehensive framework for complying with the EU’s GDPR. The CSA PLA Code of Conduct f... Request to download | |
PLA Code of Conduct (CoC): Statement of Adherence Self-Assessment CSA PLA Code of Conduct for GDPR Compliance provides a consistent and comprehensive framework for complying with the EU’s GDPR. The CSA PLA Code of Conduct f... Request to download | |
Guidance for submitting the CSA Code of Conduct (CoC) for GDPR Compliance Self-Assessment The CSA CoC for GDPR Compliance Self-Assessment is the voluntary publication of a CSP’s self-assessment results based on the requirements specified in the PL... Request to download | |
Guideline on Effectively Managing Security Service in the Cloud - Japanese Translation This initiative aims to develop a research whitepaper, focusing on building up a cloud security services management platform. This whitepaper will serve as a... Request to download | |
Top Threats to Cloud Computing: Egregious Eleven - Japanese Translation The purpose of the report is to provide organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated ... Request to download | |
Software-Defined Perimeter as a DDoS Prevention Mechanism The primary goal of this document is to increase the awareness and understanding of SDP as a tool to prevent DDoS attacks by demonstrating its efficiency and... Request to download | |
Mobile Application Security Testing (MAST) - Charter Mobile Applications are becoming an integral part of not just modern enterprises but also of human existence and a huge part of this shift is due to the emer... Request to download | |
Mapping of 'The Guidelines' Security Recommendations to CCM This document contains the additional controls that serves to bridge the gap between CCM V3.0.1 and the controls within 'Guideline on Effectively Managing Se... Request to download | |
Gap Analysis Report on Mapping CSA’s Cloud Controls Matrix to ‘Guideline on Effectively Managing Security Service in the Cloud’ The report summarizes the mapping of CCM v3.0.1 to 'Guideline on Effectively Managing Security Services in the Cloud' and provides gap analysis on the result... Request to download |