CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
AOSSL and CCM Technote Cloud computing is the future, and in many cases, the present of information technology. Always On SSL (AOSSL) is rapidly becoming an essential practice to h... Request to download | |
Big Data Taxonomy A research document outlining the six dimensions of big data to help decision makers navigate the myriad choices in compute and storage infrastructures as we... Request to download | |
Cloud Usage: Risks and Opportunities This survey was circulated to over 165 IT and security professionals in the U.S. and around the globe representing a variety of industry verticals and enterp... Request to download | |
Data Protection Heat Index The Cloud Security Alliance surveyed a select group of global data privacy experts with the intention to measure attitudes towards data protection areas that... Request to download | |
Consensus Assessments Initiative Questionnaire v3.0.1 Info Sheet | |
Cloud Controls Matrix v3.0.1 Info Sheet Find out how many controls are in the Cloud Controls Matrix v3-0-1 in this info sheet. Request to download | |
Cloud Controls Matrix v3.0.1 (July 2014) New and updated mappings, consolidation of redundant controls, rewritten controls for clarity of intent, STAR enablement, and SDO alignment. Request to download | |
Big Data, Big Concerns, and What the White House Wants to Do about It Big data tools offer astonishing and powerful opportunities to unlock previously inaccessible insights from new and existing data sets. Large amounts of data... Request to download | |
SDP Specification v1.0 This document outlines a Cloud Security Alliance (CSA) initiated protocol for the Software Defined Perimeter specification, and requests discussion and sugge... Request to download | |
SDP Hackathon Whitepaper The CSA SDP Hackathon challenged hackers to attack a server defended by a software defined perimeter. Of the billions of packets fired at the server, not one... Request to download | |
Comment on Big Data and the Future of Privacy Responses to questions on the relationship between big data and public policy, government, technology trends, and policy frameworks. Request to download | |
Research Lifecycle A step-by-step guide to producing and distributing research artifacts. From inspiration and conception to publication and distribution, it covers the the pro... Request to download | |
Top Ten Challenges in Cryptography for Big Data | |
The Future of Security Disruption defines the business of information security. New technologies change how businesses work, as well as what risks people take. Attackers shift thei... Request to download | |
The Future of Security: Executive Summary Disruption defines the business of information security. New technologies change how businesses work, as well as what risks people take. Attackers shift thei... Request to download | |
What CISOs Need to Know About Cloud Computing This paper details the critical differences between cloud computing and traditional infrastructure for security professionals, and suggests where to focus se... Request to download | |
What CISOs Need to Know About Cloud Computing | Summary | |
SAFEcode/CSA: Practices for Secure Development of Cloud Applications SAFECode and CSA partnered to determine whether additional software security guidance was needed to address unique threats to the cloud computing, and if so,... Request to download | |
Software Defined Perimeter This document explains the software defined perimeter (SDP) security framework and how it can be deployed to protect application infrastructure from network-... Request to download | |
Net+ Initiative CCM v.3 Candidate Mappings A team of 30 CIOs, CISOs, and other executives from Internet2’s membership (both higher education institutions and industry service providers) developed this... Request to download |