Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Recommendations for Adopting a Cloud-Native Key Management Service

Recommendations for Adopting a Cloud-Native Key Management Service
Release Date: 09/14/2021

Cloud-native key management services (KMS) offer organizations of any size and complexity a low-cost option for meeting their needs for key management, pa...

Request to download
Hyperledger Fabric 2.0 Architecture Security Report

Hyperledger Fabric 2.0 Architecture Security Report
Release Date: 06/28/2021

Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many...

Request to download
Hyperledger Fabric 2.0 Architecture Security Controls Checklist

Hyperledger Fabric 2.0 Architecture Security Controls Checklist
Release Date: 06/28/2021

Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many...

Request to download
CSA Guide to the IoT Security Controls Framework v2 - Japanese Translation

CSA Guide to the IoT Security Controls Framework v2 - Japanese Translation
Release Date: 05/28/2021

The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework spreadsheet. This guide ex...

Request to download
Crypto-Asset Exchange Security Guidelines

Crypto-Asset Exchange Security Guidelines
Release Date: 04/13/2021

Thanks to the blockchain technology that makes them possible, crypto-assets are becoming massively successful. As with any successful industry, a multitud...

Request to download
CSA STAR Level 3 Focus Group Charter

CSA STAR Level 3 Focus Group Charter
Release Date: 04/02/2021

The CSA STAR Level 3 Focus Group  will advise on the scope, objectives, structure, go-to-market (GTM) strategy and value proposition for STAR Level 3...

Request to download
Software Defined Perimeter Architecture Guide: Korean Translation

Software Defined Perimeter Architecture Guide: Korean Translation
Release Date: 04/01/2021

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Blockchains in the Quantum Era

Blockchains in the Quantum Era
Release Date: 02/05/2021

Digital Ledger Technologies (DLT) such as blockchain are being deployed as part of diverse applications that span multiple market segments. Application devel...

Request to download
The Six Pillars of DevSecOps: Automation

The Six Pillars of DevSecOps: Automation
Release Date: 07/06/2020

Automation is a critical component of DevSecOps because it enables process efficiency, allowing developers, infrastructure, and information security teams to...

Request to download
Financial Services Stakeholders Platform Working Group Charter

Financial Services Stakeholders Platform Working Group Charter
Release Date: 06/09/2020

Information security plays an integral role in the regulation and protection of customers in the financial industry. Exploring cloud computing and the underl...

Request to download
Managing the Risk for Medical Devices Connected to the Cloud

Managing the Risk for Medical Devices Connected to the Cloud
Release Date: 03/16/2020

With the increased number of Internet of Things devices, Healthcare Delivery Organizations are experiencing a digital transformation bigger than anything in ...

Request to download
Documentation of Relevant Distributed Ledger Technology and Blockchain Use Cases v2

Documentation of Relevant Distributed Ledger Technology and Blockchain Use Cases v2
Release Date: 07/31/2019

Thanks to the rise in popularity of Bitcoin cryptocurrency, the innovative technologies of Blockchain and other systems of distributed ledger technology (DLT...

Request to download
Mitigating the Quantum Threat with Hybrid Cryptography

Mitigating the Quantum Threat with Hybrid Cryptography
Release Date: 06/17/2019

Focus of this document is on four hybrid cryptographic schemes which provide both classical security of classical crypto and the quantum security of a quantu...

Request to download
SDP Architecture Guide v2

SDP Architecture Guide v2
Release Date: 05/07/2019

Software Defined Perimeter (SDP) Architecture Guide is designed to leverage proven, standards-based components to stop network attacks against application in...

Request to download
CSA IoT Security Controls Framework

CSA IoT Security Controls Framework
Release Date: 03/05/2019

The Internet of Things (IoT) Security Controls Framework introduces the base-level security controls required to mitigate many of the risks associated with a...

Request to download
CSA Guide to the IoT Security Controls Framework

CSA Guide to the IoT Security Controls Framework
Release Date: 03/05/2019

The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework spreadsheet. This guide ex...

Request to download
Blockchain DLT Use Cases

Blockchain DLT Use Cases
Release Date: 11/27/2018

Thanks to the rise in popularity of Bitcoin cryptocurrency, the innovative technologies of Blockchain and other systems of distributed ledger technology (DLT...

Request to download
Using BlockChain Technology to Secure the Internet of Things - Japanese Translation

Using BlockChain Technology to Secure the Internet of Things - Japanese Translation
Release Date: 10/03/2018

本書「IoT セキュリティのためのブロックチェーン技術の活用」は、Cloud Security Alliance (CSA)が公開して いる「Using Blockchain Technology to Secure the Internet of Things」の日本語訳です。本書は、CSA ジャパ ンが、CS...

Request to download
OWASP Secure Medical Devices Deployment Standard

OWASP Secure Medical Devices Deployment Standard
Release Date: 08/07/2018

With the explosion of botnets and other malware that now target IoT devices (of which medical devices can be considered a subtype) the need for security-min...

Request to download
Using BlockChain Technology to Secure the Internet of Things - Chinese Translation

Using BlockChain Technology to Secure the Internet of Things - Chinese Translation
Release Date: 08/03/2018

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated c...

Request to download