Cloud 101CircleEventsBlog
Help shape the CCSK by participating in the peer reviews for the upcoming CCSK v5 by February 22nd!

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

The Six Pillars of DevSecOps: Automation - Chinese Translation

The Six Pillars of DevSecOps: Automation - Chinese Translation
Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Understanding Cloud Attack Vectors - Chinese Translation

Understanding Cloud Attack Vectors - Chinese Translation
Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Understanding Cloud Data Security and Priorities - Chinese Translation

Understanding Cloud Data Security and Priorities - Chinese Translation
Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
An Agile Data Doctrine for a Secure Data Lake - Chinese Translation

An Agile Data Doctrine for a Secure Data Lake - Chinese Translation
Release Date: 11/13/2023

Request to download
DevSecOps - Pillar 4 Bridging Compliance and Development - Chinese Translation

DevSecOps - Pillar 4 Bridging Compliance and Development - Chinese Translation
Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Beyond Passwords: The Role of Passkeys in Modern Web Security

Beyond Passwords: The Role of Passkeys in Modern Web Security
Release Date: 11/12/2023

Web authentication methods have evolved significantly over the years to improve security and user experience. In the early days of the internet, usernames...

Request to download
How to Design a Secure Serverless Architecture

How to Design a Secure Serverless Architecture
Release Date: 10/23/2023

As businesses work to bring technology value to market faster, serverless computing is gaining adoption with developers. Serverless platforms enable devel...

Request to download
Top Threats to Cloud Computing: Pandemic 11 Deep Dive

Top Threats to Cloud Computing: Pandemic 11 Deep Dive
Release Date: 10/17/2023

This publication reflects on eight recent cloud breach cases, presented as both a detailed narrative and a threat model. The threat model format provides ...

Request to download
Medical Devices In A Zero Trust Architecture - Korean Translation

Medical Devices In A Zero Trust Architecture - Korean Translation
Release Date: 10/05/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Data Loss Prevention in Healthcare

Data Loss Prevention in Healthcare
Release Date: 10/04/2023

The rise of digital services in healthcare has made protecting medical data an ongoing challenge. Data loss may occur in several forms, including informat...

Request to download
STAR Attestation Value Proposition

STAR Attestation Value Proposition
Release Date: 10/03/2023

Request to download
CCM-Lite and CAIQ-Lite

CCM-Lite and CAIQ-Lite
Release Date: 09/25/2023

The Cloud Security Alliance, in collaboration with the CCM Working Group, proudly presents the CCM-Lite and CAIQ-Lite File Bundle. These tools offer a str...

Request to download
Machine Identity in Cybersecurity and IAM

Machine Identity in Cybersecurity and IAM
Release Date: 09/19/2023

Identity management is a crucial aspect of information security, as it ensures that only authorized individuals and entities have access to sensitive data...

Request to download
Defining Shadow Access: The Emerging IAM Security Challenge

Defining Shadow Access: The Emerging IAM Security Challenge
Release Date: 09/12/2023

Shadow Access is the unmonitored, unauthorized, invisible, unsafe and generally over-permissioned access in your cloud environment. In short, the unintend...

Request to download
Guidelines for CPAs Providing CSA STAR Attestation v4

Guidelines for CPAs Providing CSA STAR Attestation v4
Release Date: 09/07/2023

This document provides guidance for CPAs in conducting a STAR Attestation. It includes relevant information including professional requirements, competenc...

Request to download
STAR Program Overview

STAR Program Overview
Release Date: 08/31/2023

The CSA Security, Trust, Assurance, and Risk (STAR) program is the most complete and largest cloud assurance program in the world that constitutes an ecos...

Request to download
FaaS Serverless Control Framework (Set) based on NIST 800-53 R5 controls

FaaS Serverless Control Framework (Set) based on NIST 800-53 R5 controls
Release Date: 08/30/2023

This spreadsheet provides a cybersecurity control framework for Function-as-a-Service (FaaS) serverless deployments. The framework is based on the NIST 80...

Request to download
Identity and Access Management Glossary

Identity and Access Management Glossary
Release Date: 08/29/2023

The Identity and Access Management (IAM) Glossary is a reference document that aggregates and summarizes IAM-related terms and definitions. Bringing toget...

Request to download
Data Security Working Group Charter 2023

Data Security Working Group Charter 2023
Release Date: 08/29/2023

The Data Security working group’s goal is to provide a forum for the cybersecurity community on issues related to data security, data governance, privacy,...

Request to download
Cloud Native Application Protection Platform Survey Report

Cloud Native Application Protection Platform Survey Report
Release Date: 08/23/2023

Cloud Native Application Protection Platforms (CNAPPs) have emerged as a critical category of security tooling in recent years due to the complexity of co...

Request to download