Cloud 101CircleEventsBlog
Call for Presentations: Share your expertise at SECtember.ai 2024! Submit your proposals by June 28th.

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

STAR Program Overview

STAR Program Overview
Release Date: 08/31/2023

The CSA Security, Trust, Assurance, and Risk (STAR) program is the most complete and largest cloud assurance program in the world that constitutes an ecos...

Request to download
FaaS Serverless Control Framework (Set) based on NIST 800-53 R5 controls

FaaS Serverless Control Framework (Set) based on NIST 800-53 R5 controls
Release Date: 08/30/2023

This spreadsheet provides a cybersecurity control framework for Function-as-a-Service (FaaS) serverless deployments. The framework is based on the NIST 80...

Request to download
Identity and Access Management Glossary

Identity and Access Management Glossary
Release Date: 08/29/2023

The Identity and Access Management (IAM) Glossary is a reference document that aggregates and summarizes IAM-related terms and definitions. Bringing toget...

Request to download
Data Security Working Group Charter 2023

Data Security Working Group Charter 2023
Release Date: 08/29/2023

The Data Security working group’s goal is to provide a forum for the cybersecurity community on issues related to data security, data governance, privacy,...

Request to download
Cloud Native Application Protection Platform Survey Report

Cloud Native Application Protection Platform Survey Report
Release Date: 08/23/2023

Cloud Native Application Protection Platforms (CNAPPs) have emerged as a critical category of security tooling in recent years due to the complexity of co...

Request to download
International Standardization Council Charter 2023

International Standardization Council Charter 2023
Release Date: 08/23/2023

This charter lays out the scope, responsibilities, and roadmap for the International Standardization Council (ISC). The ISC actively searches mechanisms o...

Request to download
CSA Assurance Education FAQ

CSA Assurance Education FAQ
Release Date: 08/22/2023

Assurance education encompasses training and certification programs that teach individuals how to determine the effectiveness of the cybersecurity practic...

Request to download
STAR Assessment Portfolio FAQ

STAR Assessment Portfolio FAQ
Release Date: 08/22/2023

The STAR Assessment Portfolio is a collection of globally-recognized cloud security and privacy assessments that can be completed by cloud service provide...

Request to download
State of SaaS Security: 2023 Survey Report - Japanese Translation

State of SaaS Security: 2023 Survey Report - Japanese Translation
Release Date: 08/16/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Security Implications of ChatGPT - Korean Translation

Security Implications of ChatGPT - Korean Translation
Release Date: 08/09/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Security Enabled Innovation and Cloud Trends

Security Enabled Innovation and Cloud Trends
Release Date: 08/02/2023

Expel commissioned CSA to develop a survey and report to understand better the industry’s knowledge, attitudes, and opinions regarding security’s relation...

Request to download
Security Implications of ChatGPT

Security Implications of ChatGPT
Release Date: 08/02/2023

This position paper provides analysis across four dimensions: How it can benefit cybersecurity, how it can benefit malicious attackers, how ChatGPT might ...

Request to download
Serverless Working Group Charter 2023

Serverless Working Group Charter 2023
Release Date: 07/24/2023

The Serverless Working Group seeks to develop best practices to help organizations that want to run their business with a serverless computing model. Serv...

Request to download
Zero Trust Guiding Principles

Zero Trust Guiding Principles
Release Date: 07/18/2023

Zero Trust is a strategic mindset that is highly useful for organizations to adopt as part of their digital transformations and other efforts to increase ...

Request to download
Zero Trust Principles and Guidance for Identity and Access Management (IAM)

Zero Trust Principles and Guidance for Identity and Access Management (IAM)
Release Date: 07/13/2023

Identity and the ability to consume information about that identity as well as other Zero Trust (ZT) signals (additional attributes about an identity), is...

Request to download
What is IAM for the Cloud?

What is IAM for the Cloud?
Release Date: 07/12/2023

The threat landscape has materially changed over the years to the point that Identity and Access Management (IAM) is a core component of any digital acces...

Request to download
Cloud and Compromise (C&C): Gamifying of Cloud Security

Cloud and Compromise (C&C): Gamifying of Cloud Security
Release Date: 07/10/2023

CSA’s Top Threats Working Group works to identify the most significant cloud security threats, vulnerabilities, and weaknesses; analyze major incidents; a...

Request to download
CSA Code of Conduct Gap Resolution and Annex 10 to the CSA Code of Conduct for GDPR Compliance

CSA Code of Conduct Gap Resolution and Annex 10 to the CSA Code of Conduct for GDPR Compliance
Release Date: 06/21/2023

This bundle from the CSA Privacy Level Agreement Working Group includes:CSA Code of Conduct Gap Resolution spreadsheetAnnex 10 to the CSA Code of Conduct ...

Request to download
Security Implications of ChatGPT - Japanese Translation

Security Implications of ChatGPT - Japanese Translation
Release Date: 06/20/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Understanding Cloud Attack Vectors

Understanding Cloud Attack Vectors
Release Date: 06/06/2023

The goal of the document is to map the various attack vectors that are actually being used during cloud-based attacks in IaaS/PaaS and to map the vectors ...

Request to download