CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Cloud Forensics Capability Maturity Model | |
CloudTrust Protocol Data Model and API The Cloud Trust Protocol (CTP) is designed to be a mechanism by which cloud service customers can ask for and receive information related to the security of ... Request to download | |
Identity and Access Management for the Internet of Things This document is the first in a series of summary guidance aimed at providing easily understandable recommendations to information technology staff charged w... Request to download | |
What is Post-Quantum Cryptography Most people pay little attention to the lock icon on their browser address bar that signifies a secure HTTPS connection. They don’t realize that there is an ... Request to download | |
What is Quantum Key Distribution? The security of QKD relies on fundamental laws of nature, which are invulnerable to increasing computational power, new attack algorithms or quantum computer... Request to download | |
Cloud Computing Market Maturity This white paper reports the results of a recent study conducted by ISACA and the Cloud Security Alliance to examine cloud market maturity through four lense... Request to download | |
Security Considerations for Private vs. Public Clouds The Cloud Security Alliance teamed up with Palo Alto Networks to produce this whitepaper. A public cloud deployment occurs when a cloud’s entire infrastructu... Request to download | |
The Mandate for Meaningful Cyber Incident Sharing for the Cloud New and increasingly significant cybersecurity breaches are reported practically every day. For most companies, it is no longer a matter of whether they will... Request to download | |
Privacy Level Agreement - Version 2 PLA [V2] is intended to be used as an appendix to a Cloud Services Agreement, and to describe the level of privacy protection that the CSP will provide. Whil... Request to download | |
SMB Membership Brochure APAC | |
SME Cloud Security This 2015 Hong Kong Small and Medium-sized Enterprises (SME) Cloud Adoption, Security and Privacy Readiness Survey was conducted by the Internet Society Hong... Request to download | |
International Standardization Council Charter | |
What is Quantum Safe Security An overview of current cryptographic techniques being used, proactive defenses, and the threats and impact of quantum computing. Request to download | |
Best Practices for Mitigating Risks in Virtualized Environments | |
FedRAMP Cloud Controls Matrix v3.0.1 Candidate Mapping | |
New Security Guidance for Early Adopters of the IoT This document provides guidance for the secure implementation of Internet of Things (IoT)-based systems. We have provided the guidance in this document to ai... Request to download | |
STAR Overview PDF The CSA STAR Program is a publicly accessible registry designed to recognize the varying assurance requirements and maturity levels of providers and consumer... Request to download | |
Cloud Adoption In The Financial Services Sector We circulated the “How Cloud is Being Used in the Financial Sector” survey to IT and security professionals in financial services institutions. The goal was ... Request to download | |
Mobile Application Security Testing Initiative Charter Mobile applications are becoming an integral part of not just modern enterprises but also of human existence and a huge part of this shift is due to the emer... Request to download | |
Cloud Adoption Practices & Priorities The benefits for enterprises moving to the cloud are clear: greater business agility, data availability, collaboration, and cost savings. The cloud is also c... Request to download |