Cloud 101CircleEventsBlog
Save the date for CSA's 2024 Cyber Monday Sale: Get 50% off the exam token bundle!

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Top Threats to Cloud Computing Plus: Industry Insights

Top Threats to Cloud Computing Plus: Industry Insights
Release Date: 10/20/2017

Abstract: The Top Threats to Cloud Computing Plus: Industry Insights serves as a validation of the relevance of security issues discussed in the earlier docu...

Request to download
Consensus Assessments Initiative Questionnaire v3.0.1 [NO LONGER SUPPORTED]

Consensus Assessments Initiative Questionnaire v3.0.1 [NO LONGER SUPPORTED]
Release Date: 10/12/2017

The 3.0.1 version of the CAIQ is no longer supported. To get the new CAIQ 3.1 version, please visit this link: https://cloudsecurityalliance.org/artifacts/co...

Request to download
Improving Metrics in Cyber Resiliency

Improving Metrics in Cyber Resiliency
Release Date: 08/30/2017

Cyber resiliency is important as it gives us “the ability to prepare and plan for, absorb, recover from, or more successfully adapt to actual or potential ad...

Request to download
Security Guidance for Early Adopters of the Internet of Things - Chinese Translation

Security Guidance for Early Adopters of the Internet of Things - Chinese Translation
Release Date: 08/03/2017

This document provides guidance for the secure implementation of Internet of Things (IoT)-based systems. We have provided the guidance in this document to a...

Request to download
Security Guidance for Critical Areas of Focus in Cloud Computing v4.0

Security Guidance for Critical Areas of Focus in Cloud Computing v4.0
Release Date: 07/26/2017

The rise of cloud computing as an ever-evolving technology brings with it a number of opportunities and challenges. With this document, we aim to provide bot...

Request to download
Top Threats to Cloud Computing Deep Dive: Chinese Translation

Top Threats to Cloud Computing Deep Dive: Chinese Translation
Release Date: 06/24/2017

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its foundation. Each...

Request to download
A Repeatable Cloud-first Deployment Process Model

A Repeatable Cloud-first Deployment Process Model
Release Date: 06/06/2017

By now the benefits of cloud computing are generally understood at high level. What is not necessarily clear are the details of the potential security, legal...

Request to download
Observations and Recommendations on Connected Vehicle Security

Observations and Recommendations on Connected Vehicle Security
Release Date: 05/25/2017

The introduction of Connected Vehicles (CVs) has been discussed for many years. Pilot implementations currently underway are evaluating CV operations in real...

Request to download
State of Cloud Adoption in APAC 2017

State of Cloud Adoption in APAC 2017
Release Date: 04/23/2017

Request to download
Applied Quantum Safe Security

Applied Quantum Safe Security
Release Date: 03/13/2017

Over the last year or so, the perceived threat of the quantum computer to modern cryptographic standards in widespread use has increased dramatically. Govern...

Request to download
SDP for IaaS

SDP for IaaS
Release Date: 02/13/2017

Obtain a clear sense of the security challenges facing enterprise users of IaaS, understand the problems that arise from combining native IaaS access control...

Request to download
Establishing a Safe and Secure Municipal Drone Program

Establishing a Safe and Secure Municipal Drone Program
Release Date: 02/02/2017

This paper provides guidance on the safe and secure introduction and operation of a municipal “drone” program. This paper will try to analyze the drone’s rol...

Request to download
Quantum Safe Security Glossary

Quantum Safe Security Glossary
Release Date: 01/24/2017

The Quantum-Safe Security (QSS) Working Group was formed to address key generation and transmission methods and to help the industry understand quantum-safe ...

Request to download
Cloud Adoption and Security in India

Cloud Adoption and Security in India
Release Date: 11/22/2016

The “State on Cloud Adoption and Security in 2016: India” survey was circulated in an effort to understand and evaluate cloud computing trends in India. We h...

Request to download
Cloud Adoption Practices & Priorities in the Chinese Financial Sector

Cloud Adoption Practices & Priorities in the Chinese Financial Sector
Release Date: 10/28/2016

We circulated the “Financial Services Industry Cloud Adoption Survey: China” survey to IT and security professionals in the Financial Services Institutions (...

Request to download
CloudWatch2 Risk Based Decision Making Mechanisms For Cloud Service In The Public Sector

CloudWatch2 Risk Based Decision Making Mechanisms For Cloud Service In The Public Sector
Release Date: 10/27/2016

Despite the undisputed advantages of cloud computing, customers (in particular Public Administrations or PAs, and Small and Medium-sized Enterprises or SMEs)...

Request to download
Defeating Insider Threats

Defeating Insider Threats
Release Date: 10/19/2016

As a follow up to the Top Threats in Cloud Computing and from the months of May to July 2016 we surveyed approximately 100 professionals on the extent of the...

Request to download
Future Proofing the Connected World

Future Proofing the Connected World
Release Date: 10/07/2016

An IoT system is only as secure as its weakest link, this document is our attempt at providing actionable and useful guidance for securing the individual pro...

Request to download
Big Data Security and Privacy Handbook

Big Data Security and Privacy Handbook
Release Date: 08/26/2016

The term “big data” refers to the massive amounts of digital information companies and governments collect about human beings and our environment. This Cloud...

Request to download