CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Top Threats to Cloud Computing Plus: Industry Insights Abstract: The Top Threats to Cloud Computing Plus: Industry Insights serves as a validation of the relevance of security issues discussed in the earlier docu... Request to download | |
Consensus Assessments Initiative Questionnaire v3.0.1 [NO LONGER SUPPORTED] The 3.0.1 version of the CAIQ is no longer supported. To get the new CAIQ 3.1 version, please visit this link: https://cloudsecurityalliance.org/artifacts/co... Request to download | |
Improving Metrics in Cyber Resiliency Cyber resiliency is important as it gives us “the ability to prepare and plan for, absorb, recover from, or more successfully adapt to actual or potential ad... Request to download | |
Security Guidance for Early Adopters of the Internet of Things - Chinese Translation This document provides guidance for the secure implementation of Internet of Things (IoT)-based systems. We have provided the guidance in this document to a... Request to download | |
Security Guidance for Critical Areas of Focus in Cloud Computing v4.0 The rise of cloud computing as an ever-evolving technology brings with it a number of opportunities and challenges. With this document, we aim to provide bot... Request to download | |
Top Threats to Cloud Computing Deep Dive: Chinese Translation This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its foundation. Each... Request to download | |
A Repeatable Cloud-first Deployment Process Model By now the benefits of cloud computing are generally understood at high level. What is not necessarily clear are the details of the potential security, legal... Request to download | |
Observations and Recommendations on Connected Vehicle Security The introduction of Connected Vehicles (CVs) has been discussed for many years. Pilot implementations currently underway are evaluating CV operations in real... Request to download | |
State of Cloud Adoption in APAC 2017 | |
Custom Applications and IaaS Trends 2017 Despite the wide range of commercial off-the-shelf applications, both on-premises and cloud-based, enterprises continue to develop their own custom applicati... Request to download | |
Applied Quantum Safe Security Over the last year or so, the perceived threat of the quantum computer to modern cryptographic standards in widespread use has increased dramatically. Govern... Request to download | |
SDP for IaaS Obtain a clear sense of the security challenges facing enterprise users of IaaS, understand the problems that arise from combining native IaaS access control... Request to download | |
Establishing a Safe and Secure Municipal Drone Program This paper provides guidance on the safe and secure introduction and operation of a municipal “drone” program. This paper will try to analyze the drone’s rol... Request to download | |
Quantum Safe Security Glossary The Quantum-Safe Security (QSS) Working Group was formed to address key generation and transmission methods and to help the industry understand quantum-safe ... Request to download | |
Cloud Adoption and Security in India The “State on Cloud Adoption and Security in 2016: India” survey was circulated in an effort to understand and evaluate cloud computing trends in India. We h... Request to download | |
Cloud Adoption Practices & Priorities in the Chinese Financial Sector We circulated the “Financial Services Industry Cloud Adoption Survey: China” survey to IT and security professionals in the Financial Services Institutions (... Request to download | |
CloudWatch2 Risk Based Decision Making Mechanisms For Cloud Service In The Public Sector Despite the undisputed advantages of cloud computing, customers (in particular Public Administrations or PAs, and Small and Medium-sized Enterprises or SMEs)... Request to download | |
Defeating Insider Threats As a follow up to the Top Threats in Cloud Computing and from the months of May to July 2016 we surveyed approximately 100 professionals on the extent of the... Request to download | |
Future Proofing the Connected World An IoT system is only as secure as its weakest link, this document is our attempt at providing actionable and useful guidance for securing the individual pro... Request to download | |
Big Data Security and Privacy Handbook The term “big data” refers to the massive amounts of digital information companies and governments collect about human beings and our environment. This Cloud... Request to download |