CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
CCM v3.0.1 Addendum - BSI Germany C5 v1 This document is an addendum to the Cloud Controls Matrix (CCM) V3.0.1 controls. It contains the additional controls that serves to bridge the gap between CC... Request to download | |
CCM v3.0.1 Addendum - ISO 27002 27017 27018 v1.1 This document is an addendum to the Cloud Controls Matrix (CCM) V3.0.1 controls. It contains the additional controls that serves to bridge the gap between CC... Request to download | |
Enterprise Resource Planning and Cloud Adoption The “Impact of Cloud on ERP” survey report was designed to assess the impact of ERP solutions on organizations and better understand cloud preparation and da... Request to download | |
Guideline on Effectively Managing Security Service in the Cloud - Chinese Translation This initiative aims to develop a research whitepaper, focusing on building up a cloud security services management platform. This whitepaper will serve as a... Request to download | |
Guideline on Effectively Managing Security Service in the Cloud This initiative aims to develop a research whitepaper, focusing on building up a cloud security services management platform. This whitepaper will serve as a... Request to download | |
Streamlining Vendor IT Security and Risk Assessments Cloud computing has rapidly gained traction as a significant and even default IT system for many different organizations. In such a dynamic environment, cybe... Request to download | |
Blockchain DLT Use Cases Thanks to the rise in popularity of Bitcoin cryptocurrency, the innovative technologies of Blockchain and other systems of distributed ledger technology (DLT... Request to download | |
HIM Working Group Charter The use of new technologies, such as cloud services and the Internet of Things (IoT), will disrupt legacy systems and the chain of data processing in the sup... Request to download | |
Security Guidance v4.0 Info Sheet This version, the first major update since 2011, is the culmination of over a year of dedicated research and public participation from the CSA community, wor... Request to download | |
CCM v3.0 - Chinese Translation The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) provides fundamental security principles to guide cloud vendors and cloud customers seeking to ... Request to download | |
Security Guidance for Critical Areas of Focus in Cloud Computing v4.0 (Spanish Translation) Con este documento, nuestro objetivo es proporcionar tanto orientación como inspiración para respaldar los objetivos comerciales, mientras se gestionan y m... Request to download | |
Using BlockChain Technology to Secure the Internet of Things - Japanese Translation 本書「IoT セキュリティのためのブロックチェーン技術の活用」は、Cloud Security Alliance (CSA)が公開して いる「Using Blockchain Technology to Secure the Internet of Things」の日本語訳です。本書は、CSA ジャパ ンが、CS... Request to download | |
IoT Firmware Update Processes The traditional approach to updating software for IT assets involves analysis, staging and distribution of the update—a process that usually occurs during of... Request to download | |
Code of Conduct for GDPR Compliance - Japanese Translation 説明: 本書「GDPR 準拠の為の行動規範」は、Cloud Security Alliance (CSA)が公開している「CODE OF CONDUCT FOR GDPR COMPLIANCE」の日本語訳および一般社団法人日本クラウドセキュリティアライア ンス(CSAジャパン)が解説を加えたものです... Request to download | |
Top Threats to Cloud Computing: Deep Dive This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its foundation. Each... Request to download | |
OWASP Secure Medical Devices Deployment Standard With the explosion of botnets and other malware that now target IoT devices (of which medical devices can be considered a subtype) the need for security-min... Request to download | |
Security Position Paper Network Function Virtualization - Chinese Translation 近五年来,随着云基础设施的能力和复杂性飞速演进,安全风险也相应上升。 虽然虚拟化已不是一个很新的概念,但几乎任何人都可以对计算、存储、网络和应 用程序等资源进行虚拟化的想法会增加安全威胁的影响和速度。同时,全球地缘政 治格局已从由机遇驱动的网络攻击转变为资金充足的国家行动 Request to download | |
Using BlockChain Technology to Secure the Internet of Things - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated c... Request to download | |
Security Guidance v4.0 - Chinese Translation 欢迎来到云安全联盟关于云计算关键领域安全指南的第四个版本。云计算的兴起是一项不 断发展的技术,它带来了许多机遇和挑战。通过这个文档,我们的目标是提供指导和灵感来支 持业务目标,同时管理和减轻采用云计算技术相关的风险。 This localized version of this publication was ... Request to download | |
GEAB State of the Cloud 2018 - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |