CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Understanding Cloud Attack Vectors This publication was produced through the efforts of chapters and volunteers but the content development falls outside of the CSA Research Lifecycle. For ... Request to download | |
State of Financial Services in Cloud In recent years, the financial services industry has increasingly adopted cloud services. This trend is expected to continue with the further adoption and... Request to download | |
High Performance Computing Tabletop Guide This guide lays out the framework necessary to host a High Performance Computing (HPC)-focused cyberattack tabletop exercise (TTX) so that organizations c... Request to download | |
Enterprise Authority to Operate Working Group Charter 2023 The mission of the Enterprise Authority to Operate (EATO) Working Group is to develop, maintain, review, update, support and deploy of a concentrated assessm... Request to download | |
Medical Devices in A Zero Trust Architecture Today’s medical devices often connect to the cloud, which increases the risk by expanding the attack surface. This presents the Healthcare Delivery Organi... Request to download | |
The Six Pillars of DevSecOps: Automation - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Agile Data Lake Threat Modeling As cloud platforms expand further and further into business uses, the need to understand the attack surface to your data becomes much more apparent. With ... Request to download | |
Internet of Things (IoT) Working Group Charter 2023 This charter lays out the scope, responsibilities, and roadmap for the Internet of Things Working Group. The Cloud Security Alliance Internet of Things (I... Request to download | |
Quantum-Safe Security Working Group Charter 2023 The focus of the Quantum‐Safe Security Working Group is on cryptographic methods that will remain safe after the widespread availability of the quantum co... Request to download | |
Health Information Management Working Group Charter 2023 The Health Information Management Working Group aims to directly influence how health information service providers deliver secure cloud solutions (servic... Request to download | |
Top Threats Working Group Charter 2023 The Top Threats Working Group aims to provide up-to-date, industry-informed expert insights on cloud security risks, threats, and vulnerabilities to help ... Request to download | |
Telesurgery Tabletop Guide Book The purpose of this guidebook is to assist healthcare providers in planning and facilitating a discussion and evaluation of the procedural response action... Request to download | |
The Six Pillars of DevSecOps - Pragmatic Implementation Organizations have a wide array of tools and solutions to choose from when implementing security into the software development process. They often end up ... Request to download | |
SaaS Governance Best Practices for Cloud Customers In the context of cloud security, the focus is almost always on securing Infrastructure-as-a-Service (IaaS) environments. This is despite the reality that... Request to download | |
Healthcare Interoperability When Health Information Technology systems seamlessly exchange data with each other, it is referred to as interoperability. Interoperability occurs when i... Request to download | |
Recommendations for using a Customer Controlled Key Store In the latest from the Cloud Key Management working group, this document provides guidance on how to assess and implement cloud key management services co... Request to download | |
Top Threats Working Group Charter 2022 The Top Threats Working Group aims to provide up-to-date, industry-informed expert insights on cloud security risks, threats, and vulnerabilities to help ... Request to download | |
Enterprise Architecture Working Group Charter 2022 This is the 2022 Charter for the Enterprise Architecture Working Group to promote research, development, and education of best practices and methodologies... Request to download | |
IoT Controls Matrix v3 - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Guide to the IoT Controls Matrix v3 - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |