CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Mitigating the Quantum Threat with Hybrid Cryptography Focus of this document is on four hybrid cryptographic schemes which provide both classical security of classical crypto and the quantum security of a quantu... Request to download | |
Top 20 Critical Controls for Cloud ERP Customers This document aims to be a guide for assessing and prioritizing the most critical controls that organizations should take into account when trying to secure ... Request to download | |
Cloud Penetration Testing Guidance This document aims to be a guide for conducting penetration testing on cloud services. The document outlines important aspects such as the scoping of cloud p... Request to download | |
Cloud Security Alliance Code of Conduct for GDPR Compliance (Updated - September 2020) The CSA Code of Conduct is designed to offer both a compliance tool for GDPR compliance and transparency guidelines regarding the level of data protection o... Request to download | |
Preparing Enterprises for the Quantum Computing Cybersecurity Threats Quantum computing, while expected to help make many advancements, will also break the existing asymmetric-key cryptosystems, thus endangering our security in... Request to download | |
Cloud Security Complexity CSA’s latest survey examines information security concerns in complex cloud environment. The survey of 700 IT and security professionals aims to analyze and ... Request to download | |
Cloud OS Security Specification This document builds on the foundation provided by ISO/IEC 17788, ISO/IEC 19941, ISO/IEC 27000, NIST SP 500-299, and NIST SP 800-144 in the context of cloud ... Request to download | |
SDP Architecture Guide v2 Software Defined Perimeter (SDP) Architecture Guide is designed to leverage proven, standards-based components to stop network attacks against application in... Request to download | |
Hybrid Cloud Security Services Charter This initiative aims to develop a security white paper specifying hybrid cloud security risks and countermeasures, helping users identify and reduce the risk... Request to download | |
Cloud Key Management Charter The Cloud Key Management Working Group will facilitate the standards for seamless integration between CSPs and Key Broker vendor platforms. It will ensure th... Request to download | |
SecaaS Working Group Charter In order to improve understanding, perception, and thus reputation, Security as a Service requires a clear definition and direction to ensure it is understoo... Request to download | |
Lessons From the Cloud Lessons from the Cloud - David Cass, Chief Information Security Officer Cloud and SaaS Operations & Global Partner Cloud Security Services, IBM ... Request to download | |
CSA IoT Security Controls Framework The Internet of Things (IoT) Security Controls Framework introduces the base-level security controls required to mitigate many of the risks associated with a... Request to download | |
CSA Guide to the IoT Security Controls Framework The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework spreadsheet. This guide ex... Request to download | |
STAR Continuous Technical Guidance STAR Continuous specifies the necessary activities and conditions for the continuous auditing of the cloud service over a defined set of security requirement... Request to download | |
Future Proofing the Connected World - Korean Translation An IoT system is only as secure as its weakest link, this document is our attempt at providing actionable and useful guidance for securing the individual pro... Request to download | |
High Performance Computing (HPC) Cloud Security Working Group Charter To develop a holistic security framework for cloud infrastructure architected for High Performance Computing needs, with the aim of securing where the cloud ... Request to download | |
CCM Mapping Workpackage Template This document is the companion document to the Methodology for the Mapping of the Cloud Controls Matrix (CCM). It is a CCM mapping workpackage template that ... Request to download | |
The 12 Most Critical Risks for Serverless Applications The 12 Most Critical Risks for Serverless Applications 2019 document is meant to serve as a security awareness and education guide. This report was curated a... Request to download | |
Cloud Incident Response Charter To develop a holistic Cloud Incident Response (CIR) framework that comprehensively covers key causes of cloud outages (both security and non-security related... Request to download |