CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Recommendations for Adopting a Cloud-Native Key Management Service Cloud-native key management services (KMS) offer organizations of any size and complexity a low-cost option for meeting their needs for key management, pa... Request to download | |
Hyperledger Fabric 2.0 Architecture Security Report Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many... Request to download | |
Hyperledger Fabric 2.0 Architecture Security Controls Checklist Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many... Request to download | |
CSA Guide to the IoT Security Controls Framework v2 - Japanese Translation The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework spreadsheet. This guide ex... Request to download | |
Crypto-Asset Exchange Security Guidelines Thanks to the blockchain technology that makes them possible, crypto-assets are becoming massively successful. As with any successful industry, a multitud... Request to download | |
CSA STAR Level 3 Focus Group Charter The CSA STAR Level 3 Focus Group will advise on the scope, objectives, structure, go-to-market (GTM) strategy and value proposition for STAR Level 3... Request to download | |
Software Defined Perimeter Architecture Guide: Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Blockchains in the Quantum Era Digital Ledger Technologies (DLT) such as blockchain are being deployed as part of diverse applications that span multiple market segments. Application devel... Request to download | |
The Six Pillars of DevSecOps: Automation Automation is a critical component of DevSecOps because it enables process efficiency, allowing developers, infrastructure, and information security teams to... Request to download | |
Financial Services Stakeholders Platform Working Group Charter Information security plays an integral role in the regulation and protection of customers in the financial industry. Exploring cloud computing and the underl... Request to download | |
Managing the Risk for Medical Devices Connected to the Cloud With the increased number of Internet of Things devices, Healthcare Delivery Organizations are experiencing a digital transformation bigger than anything in ... Request to download | |
Documentation of Relevant Distributed Ledger Technology and Blockchain Use Cases v2 Thanks to the rise in popularity of Bitcoin cryptocurrency, the innovative technologies of Blockchain and other systems of distributed ledger technology (DLT... Request to download | |
Mitigating the Quantum Threat with Hybrid Cryptography Focus of this document is on four hybrid cryptographic schemes which provide both classical security of classical crypto and the quantum security of a quantu... Request to download | |
SDP Architecture Guide v2 Software Defined Perimeter (SDP) Architecture Guide is designed to leverage proven, standards-based components to stop network attacks against application in... Request to download | |
CSA IoT Security Controls Framework The Internet of Things (IoT) Security Controls Framework introduces the base-level security controls required to mitigate many of the risks associated with a... Request to download | |
CSA Guide to the IoT Security Controls Framework The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework spreadsheet. This guide ex... Request to download | |
Blockchain DLT Use Cases Thanks to the rise in popularity of Bitcoin cryptocurrency, the innovative technologies of Blockchain and other systems of distributed ledger technology (DLT... Request to download | |
Using BlockChain Technology to Secure the Internet of Things - Japanese Translation 本書「IoT セキュリティのためのブロックチェーン技術の活用」は、Cloud Security Alliance (CSA)が公開して いる「Using Blockchain Technology to Secure the Internet of Things」の日本語訳です。本書は、CSA ジャパ ンが、CS... Request to download | |
OWASP Secure Medical Devices Deployment Standard With the explosion of botnets and other malware that now target IoT devices (of which medical devices can be considered a subtype) the need for security-min... Request to download | |
Using BlockChain Technology to Secure the Internet of Things - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated c... Request to download |