CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
SDP Hackathon Whitepaper The CSA SDP Hackathon challenged hackers to attack a server defended by a software defined perimeter. Of the billions of packets fired at the server, not one... Request to download | |
Comment on Big Data and the Future of Privacy Responses to questions on the relationship between big data and public policy, government, technology trends, and policy frameworks. Request to download | |
Research Lifecycle A step-by-step guide to producing and distributing research artifacts. From inspiration and conception to publication and distribution, it covers the the pro... Request to download | |
Top Ten Challenges in Cryptography for Big Data | |
The Future of Security Disruption defines the business of information security. New technologies change how businesses work, as well as what risks people take. Attackers shift thei... Request to download | |
The Future of Security: Executive Summary Disruption defines the business of information security. New technologies change how businesses work, as well as what risks people take. Attackers shift thei... Request to download | |
What CISOs Need to Know About Cloud Computing This paper details the critical differences between cloud computing and traditional infrastructure for security professionals, and suggests where to focus se... Request to download | |
What CISOs Need to Know About Cloud Computing | Summary | |
SAFEcode/CSA: Practices for Secure Development of Cloud Applications SAFECode and CSA partnered to determine whether additional software security guidance was needed to address unique threats to the cloud computing, and if so,... Request to download | |
Software Defined Perimeter This document explains the software defined perimeter (SDP) security framework and how it can be deployed to protect application infrastructure from network-... Request to download | |
Net+ Initiative CCM v.3 Candidate Mappings A team of 30 CIOs, CISOs, and other executives from Internet2’s membership (both higher education institutions and industry service providers) developed this... Request to download | |
CCM v3.0 Info Sheet This info sheet is for an old version of the Cloud Controls Matrix (CCM). You learn more about the latest version of the CCM and download it here: https://cl... Request to download | |
Cloud Controls Matrix v3.0 There is a new version of CCM available. The latest version has been combined with the Cloud Controls Matrix. Cloud Controls Matrix (CCM) Version 3.0, is a... Request to download | |
Big Data Analytics for Security Intelligence | |
Publicizing Your STAR Certification The following guidelines will help you to apply good practice in publicizing, communicating and promoting your certification to stakeholders, including staff... Request to download | |
Government Access to Information The survey received almost 500 responses from CSA members around the world. It found that 56% of non-US residents were now less likely to use US-based cloud ... Request to download | |
Mapping the Forensic Standard ISO/IEC 27037 to Cloud Computing The purpose of this document is to survey the issues related to forensic investigation in cloud environments, to describe the international standards for clo... Request to download | |
Expanded Top Ten Big Data Security and Privacy Challenges Big Data remains one of the most talked about technology trends in 2013. But lost among all the excitement about the potential of Big Data are the very real ... Request to download | |
Cloud Computing Vulnerability Incidents: A Statistical Overview In an attempt to ascertain Cloud Computing reliability, 11,491 news articles on cloud computing-related outages from 39 news sources between Jan 2008 and Feb... Request to download | |
Planning for E-Discovery in the Cloud |