Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

CSA Code of Conduct for GDPR Compliance - Chinese Translation

CSA Code of Conduct for GDPR Compliance - Chinese Translation
Release Date: 08/03/2018

云安全联盟 CSA 近期发布了 CoC for GDPR Compliance(CSA GDPR 合规行为准则),旨 在为云服务提供商(CSP)、云消费者、及相关企业提供 GDPR 合规解决方案,并提供涉及云服 务提供商应提交的关于数据保护级别的透明性准则。这个准则为各种规模的客户提供工具来评 估其个人数据保护水...

Request to download
Building a Foundation for Successful Cyber Threat Intelligence Exchange - Chinese Translation

Building a Foundation for Successful Cyber Threat Intelligence Exchange - Chinese Translation
Release Date: 08/03/2018

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
CCM and CAIQ (Spanish Translations)

CCM and CAIQ (Spanish Translations)
Release Date: 07/10/2018

Cloud Security Alliance (CSA) in the context of an agreement with OneTrust has translated the Cloud Control Matrix (CCM) v3.0.1 and CAIQ into Spanish.

Request to download
CCM Mapping Methodology

CCM Mapping Methodology
Release Date: 07/09/2018

The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) provides fundamental security principles to guide cloud vendors and cloud customers seeking to ...

Request to download
Software Defined Perimeter Architecture Guide: Chinese Translation

Software Defined Perimeter Architecture Guide: Chinese Translation
Release Date: 06/24/2018

Software Defined Perimeter (SDP) Architecture Guide is designed to leverage proven, standards-based components to stop network attacks against application in...

Request to download
Software Defined Perimeter as a DDoS Mechanism: Chinese Translation

Software Defined Perimeter as a DDoS Mechanism: Chinese Translation
Release Date: 06/24/2018

The primary goal of this document is to increase the awareness and understanding of SDP as a tool to prevent DDoS attacks by demonstrating its efficiency and...

Request to download
Software Defined Perimeter Specification: Chinese Translation

Software Defined Perimeter Specification: Chinese Translation
Release Date: 06/24/2018

This document outlines a Cloud Security Alliance (CSA) initiated protocol for the Software Defined Perimeter specification, and requests discussion and sugge...

Request to download
Firmware Integrity in the Cloud Data Center

Firmware Integrity in the Cloud Data Center
Release Date: 06/12/2018

This paper presents the point of view from key stakeholders in datacenter development regarding how to build cloud infrastructure using secure servers and in...

Request to download
Software Defined Perimeter Glossary

Software Defined Perimeter Glossary
Release Date: 06/12/2018

The Software Defined Perimeter (SDP) Glossary is a reference document that brings together SDP related terms and definitions from various professional resour...

Request to download
The State of Post-Quantum Cryptography

The State of Post-Quantum Cryptography
Release Date: 05/23/2018

Most people pay little attention to the lock icon on their browser’s address bar that signifies a secure connection called HTTPS. This connection establishes...

Request to download
The Treacherous 12 – Top Threats to Cloud Computing + Industry Insights - Japanese Translation

The Treacherous 12 – Top Threats to Cloud Computing + Industry Insights - Japanese Translation
Release Date: 05/21/2018

誰も予測できなかった速さで、クラウドコンピューティングはビジネスや政府に等しく変容を迫り、そ して新たなセキュリティ課題をもたらしている。クラウドのサービスモデルが開発されることで、ビジ ネスを支える技術はかつてないほど効率性の高いものになった。サーバを保有する発想からサービ ス利用ベースの思考への転換は、IT ...

Request to download
Justify Your Investment in CCSK Training

Justify Your Investment in CCSK Training
Release Date: 05/02/2018

The Certificate of Cloud Security Knowledge (CCSK) Foundation class provides students a comprehensive review of cloud security fundamentals and a detailed de...

Request to download
A Day Without Safe Cryptography

A Day Without Safe Cryptography
Release Date: 04/19/2018

Over the past fifty years, the digital age has sparked the creation of a remarkable infrastructure through which a nearly infinite variety of digital transac...

Request to download
GDPR Preparation and Awareness Survey Report

GDPR Preparation and Awareness Survey Report
Release Date: 04/17/2018

Cloud computing, the Internet of Things, Artificial Intelligence, and other new technologies allow businesses to have better customer engagement, more access...

Request to download
Best Practices for Cyber Incident Exchange

Best Practices for Cyber Incident Exchange
Release Date: 04/16/2018

No organization is immune from cyber attack. Malicious actors collaborate with skill and agility, effectively moving from target to target at a breakneck pac...

Request to download
State of Cloud Report

State of Cloud Report
Release Date: 04/16/2018

Innovators and early adopters have been using cloud for years taking advantage of the quicker deployment, greater scalability, and cost saving of services. T...

Request to download
Using Blockchain Technology to Secure the Internet of Things

Using Blockchain Technology to Secure the Internet of Things
Release Date: 02/13/2018

In the last four years, technical experts, chief digital officers, marketing managers, journalists, bloggers and research institutions have discussed and pro...

Request to download
The State of Enterprise Resource Planning Security in the Cloud

The State of Enterprise Resource Planning Security in the Cloud
Release Date: 02/07/2018

The State of ERP Security in the Cloud briefly highlights some of the issues and challenges of migrating ERP solutions to the cloud. The document examines co...

Request to download
Quantum-Safe Security Awareness Survey

Quantum-Safe Security Awareness Survey
Release Date: 01/26/2018

Quantum computing threatens the security of public key cryptography, which underlies our global digital communications infrastructure. While many significant...

Request to download
Blockchain/Distributed Ledger Working Group Glossary

Blockchain/Distributed Ledger Working Group Glossary
Release Date: 12/15/2017

Blockchain is a radical, evolving technology and there is little awareness or knowledge regarding security aspects or compliance implications among many t...

Request to download