CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
OWASP Secure Medical Devices Deployment Standard With the explosion of botnets and other malware that now target IoT devices (of which medical devices can be considered a subtype) the need for security-min... Request to download | |
Security Position Paper Network Function Virtualization - Chinese Translation 近五年来,随着云基础设施的能力和复杂性飞速演进,安全风险也相应上升。 虽然虚拟化已不是一个很新的概念,但几乎任何人都可以对计算、存储、网络和应 用程序等资源进行虚拟化的想法会增加安全威胁的影响和速度。同时,全球地缘政 治格局已从由机遇驱动的网络攻击转变为资金充足的国家行动 Request to download | |
Using BlockChain Technology to Secure the Internet of Things - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated c... Request to download | |
Security Guidance v4.0 - Chinese Translation 欢迎来到云安全联盟关于云计算关键领域安全指南的第四个版本。云计算的兴起是一项不 断发展的技术,它带来了许多机遇和挑战。通过这个文档,我们的目标是提供指导和灵感来支 持业务目标,同时管理和减轻采用云计算技术相关的风险。 This localized version of this publication was ... Request to download | |
GEAB State of the Cloud 2018 - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
CSA Code of Conduct for GDPR Compliance - Chinese Translation 云安全联盟 CSA 近期发布了 CoC for GDPR Compliance(CSA GDPR 合规行为准则),旨 在为云服务提供商(CSP)、云消费者、及相关企业提供 GDPR 合规解决方案,并提供涉及云服 务提供商应提交的关于数据保护级别的透明性准则。这个准则为各种规模的客户提供工具来评 估其个人数据保护水... Request to download | |
Building a Foundation for Successful Cyber Threat Intelligence Exchange - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
CCM and CAIQ (Spanish Translations) Cloud Security Alliance (CSA) in the context of an agreement with OneTrust has translated the Cloud Control Matrix (CCM) v3.0.1 and CAIQ into Spanish. Request to download | |
CCM Mapping Methodology The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) provides fundamental security principles to guide cloud vendors and cloud customers seeking to ... Request to download | |
Software Defined Perimeter Architecture Guide: Chinese Translation Software Defined Perimeter (SDP) Architecture Guide is designed to leverage proven, standards-based components to stop network attacks against application in... Request to download | |
Software Defined Perimeter as a DDoS Mechanism: Chinese Translation The primary goal of this document is to increase the awareness and understanding of SDP as a tool to prevent DDoS attacks by demonstrating its efficiency and... Request to download | |
Software Defined Perimeter Specification: Chinese Translation This document outlines a Cloud Security Alliance (CSA) initiated protocol for the Software Defined Perimeter specification, and requests discussion and sugge... Request to download | |
Firmware Integrity in the Cloud Data Center This paper presents the point of view from key stakeholders in datacenter development regarding how to build cloud infrastructure using secure servers and in... Request to download | |
Software Defined Perimeter Glossary The Software Defined Perimeter (SDP) Glossary is a reference document that brings together SDP related terms and definitions from various professional resour... Request to download | |
The State of Post-Quantum Cryptography Most people pay little attention to the lock icon on their browser’s address bar that signifies a secure connection called HTTPS. This connection establishes... Request to download | |
The Treacherous 12 – Top Threats to Cloud Computing + Industry Insights - Japanese Translation 誰も予測できなかった速さで、クラウドコンピューティングはビジネスや政府に等しく変容を迫り、そ して新たなセキュリティ課題をもたらしている。クラウドのサービスモデルが開発されることで、ビジ ネスを支える技術はかつてないほど効率性の高いものになった。サーバを保有する発想からサービ ス利用ベースの思考への転換は、IT ... Request to download | |
Justify Your Investment in CCSK Training The Certificate of Cloud Security Knowledge (CCSK) Foundation class provides students a comprehensive review of cloud security fundamentals and a detailed de... Request to download | |
A Day Without Safe Cryptography Over the past fifty years, the digital age has sparked the creation of a remarkable infrastructure through which a nearly infinite variety of digital transac... Request to download | |
GDPR Preparation and Awareness Survey Report Cloud computing, the Internet of Things, Artificial Intelligence, and other new technologies allow businesses to have better customer engagement, more access... Request to download | |
Best Practices for Cyber Incident Exchange No organization is immune from cyber attack. Malicious actors collaborate with skill and agility, effectively moving from target to target at a breakneck pac... Request to download |