Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Zero Trust Guiding Principles - Korean Translation

Zero Trust Guiding Principles - Korean Translation
Release Date: 01/02/2024

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Zero Trust Guiding Principles - Japanese Translation

Zero Trust Guiding Principles - Japanese Translation
Release Date: 12/22/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Key Management Lifecycle Best Practices

Key Management Lifecycle Best Practices
Release Date: 12/19/2023

Cryptographic keys are essential for securing digital assets, yet managing these keys can be challenging for organizations that run applications in the cl...

Request to download
Communicating the Business Value of Zero Trust

Communicating the Business Value of Zero Trust
Release Date: 12/18/2023

Zero Trust is a major industry trend that is being adopted and promoted by security teams around the globe, and for good reason - it delivers improved sec...

Request to download
Recommendations for Adopting a Cloud-Native Key Management Service - Korean Translation

Recommendations for Adopting a Cloud-Native Key Management Service - Korean Translation
Release Date: 12/07/2023

Cloud-native key management services (KMS) offer organizations of any size and complexity a low-cost option for meeting their needs for key management, pa...

Request to download
Cloud Adversarial Vectors, Exploits, and Threats (CAVEaT™): An Emerging Threat Matrix for Industry Collaboration

Cloud Adversarial Vectors, Exploits, and Threats (CAVEaT™): An Emerging Threat Matrix for Industry Collaboration
Release Date: 11/20/2023

An array of threat-based cybersecurity models and associated knowledge bases exist to inform cloud security practitioners. However, the rapid development ...

Request to download
What is IAM for the Cloud? - Chinese Translation

What is IAM for the Cloud? - Chinese Translation
Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Data Loss Prevention and Data Security Survey Report - Chinese Translation

Data Loss Prevention and Data Security Survey Report - Chinese Translation
Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
High Performance Computing Tabletop Guide - Chinese Translation

High Performance Computing Tabletop Guide - Chinese Translation
Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Medical Devices in A Zero Trust Architecture - Chinese Translation

Medical Devices in A Zero Trust Architecture - Chinese Translation
Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Security Implications of ChatGPT - Chinese Translation

Security Implications of ChatGPT - Chinese Translation
Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
State of Financial Services in Cloud - Chinese Translation

State of Financial Services in Cloud - Chinese Translation
Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
The Six Pillars of DevSecOps: Automation - Chinese Translation

The Six Pillars of DevSecOps: Automation - Chinese Translation
Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Understanding Cloud Attack Vectors - Chinese Translation

Understanding Cloud Attack Vectors - Chinese Translation
Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Understanding Cloud Data Security and Priorities - Chinese Translation

Understanding Cloud Data Security and Priorities - Chinese Translation
Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
An Agile Data Doctrine for a Secure Data Lake - Chinese Translation

An Agile Data Doctrine for a Secure Data Lake - Chinese Translation
Release Date: 11/13/2023

Request to download
DevSecOps - Pillar 4 Bridging Compliance and Development - Chinese Translation

DevSecOps - Pillar 4 Bridging Compliance and Development - Chinese Translation
Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Beyond Passwords: The Role of Passkeys in Modern Web Security

Beyond Passwords: The Role of Passkeys in Modern Web Security
Release Date: 11/12/2023

Web authentication methods have evolved significantly over the years to improve security and the user experience. In the early days of the internet, usern...

Request to download
How to Design a Secure Serverless Architecture

How to Design a Secure Serverless Architecture
Release Date: 10/23/2023

As businesses work to bring technology value to market faster, serverless computing is gaining adoption with developers. Serverless platforms enable devel...

Request to download
Top Threats to Cloud Computing: Pandemic 11 Deep Dive

Top Threats to Cloud Computing: Pandemic 11 Deep Dive
Release Date: 10/17/2023

This publication reflects on eight recent cloud breach cases, presented as both a detailed narrative and a threat model. The threat model format provides ...

Request to download