Cloud 101CircleEventsBlog
Have a chance to win a free CCSK v5 token by taking the Non-Human Identity Security Survey!

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Medical Devices in A Zero Trust Architecture - Chinese Translation

Medical Devices in A Zero Trust Architecture - Chinese Translation
Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Security Implications of ChatGPT - Chinese Translation

Security Implications of ChatGPT - Chinese Translation
Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
State of Financial Services in Cloud - Chinese Translation

State of Financial Services in Cloud - Chinese Translation
Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
The Six Pillars of DevSecOps: Automation - Chinese Translation

The Six Pillars of DevSecOps: Automation - Chinese Translation
Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Understanding Cloud Attack Vectors - Chinese Translation

Understanding Cloud Attack Vectors - Chinese Translation
Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Understanding Cloud Data Security and Priorities - Chinese Translation

Understanding Cloud Data Security and Priorities - Chinese Translation
Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
An Agile Data Doctrine for a Secure Data Lake - Chinese Translation

An Agile Data Doctrine for a Secure Data Lake - Chinese Translation
Release Date: 11/13/2023

Request to download
DevSecOps - Pillar 4 Bridging Compliance and Development - Chinese Translation

DevSecOps - Pillar 4 Bridging Compliance and Development - Chinese Translation
Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Beyond Passwords: The Role of Passkeys in Modern Web Security

Beyond Passwords: The Role of Passkeys in Modern Web Security
Release Date: 11/12/2023

Web authentication methods have evolved significantly over the years to improve security and user experience. In the early days of the internet, usernames...

Request to download
How to Design a Secure Serverless Architecture

How to Design a Secure Serverless Architecture
Release Date: 10/23/2023

As businesses work to bring technology value to market faster, serverless computing is gaining adoption with developers. Serverless platforms enable devel...

Request to download
Top Threats to Cloud Computing: Pandemic 11 Deep Dive

Top Threats to Cloud Computing: Pandemic 11 Deep Dive
Release Date: 10/17/2023

This publication reflects on eight recent cloud breach cases, presented as both a detailed narrative and a threat model. The threat model format provides ...

Request to download
Medical Devices In A Zero Trust Architecture - Korean Translation

Medical Devices In A Zero Trust Architecture - Korean Translation
Release Date: 10/05/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Data Loss Prevention in Healthcare

Data Loss Prevention in Healthcare
Release Date: 10/04/2023

The rise of digital services in healthcare has made protecting medical data an ongoing challenge. Data loss may occur in several forms, including informat...

Request to download
STAR Attestation Value Proposition

STAR Attestation Value Proposition
Release Date: 10/03/2023

Request to download
Machine Identity in Cybersecurity and IAM

Machine Identity in Cybersecurity and IAM
Release Date: 09/19/2023

Identity management is a crucial aspect of information security, as it ensures that only authorized individuals and entities have access to sensitive data...

Request to download
Defining Shadow Access: The Emerging IAM Security Challenge

Defining Shadow Access: The Emerging IAM Security Challenge
Release Date: 09/12/2023

Shadow Access is unmonitored, unauthorized, invisible, unsafe, and generally over-permissioned cloud access. This emerging Identity and Access Management ...

Request to download
Guidelines for CPAs Providing CSA STAR Attestation v4

Guidelines for CPAs Providing CSA STAR Attestation v4
Release Date: 09/07/2023

This document provides guidance for CPAs in conducting a STAR Attestation. It includes relevant information including professional requirements, competenc...

Request to download
STAR Program Overview

STAR Program Overview
Release Date: 08/31/2023

The CSA Security, Trust, Assurance, and Risk (STAR) program is the most complete and largest cloud assurance program in the world that constitutes an ecos...

Request to download
FaaS Serverless Control Framework (Set) based on NIST 800-53 R5 controls

FaaS Serverless Control Framework (Set) based on NIST 800-53 R5 controls
Release Date: 08/30/2023

This spreadsheet provides a cybersecurity control framework for Function-as-a-Service (FaaS) serverless deployments. The framework is based on the NIST 80...

Request to download
Identity and Access Management Glossary

Identity and Access Management Glossary
Release Date: 08/29/2023

The Identity and Access Management (IAM) Glossary is a reference document that aggregates and summarizes IAM-related terms and definitions. Bringing toget...

Request to download