Cloud 101CircleEventsBlog

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Cloud and Compromise (C&C): Gamifying of Cloud Security

Cloud and Compromise (C&C): Gamifying of Cloud Security
Release Date: 07/10/2023

CSA’s Top Threats Working Group works to identify the most significant cloud security threats, vulnerabilities, and weaknesses; analyze major incidents; a...

Request to download
CSA Code of Conduct Gap Resolution and Annex 10 to the CSA Code of Conduct for GDPR Compliance

CSA Code of Conduct Gap Resolution and Annex 10 to the CSA Code of Conduct for GDPR Compliance
Release Date: 06/21/2023

This bundle from the CSA Privacy Level Agreement Working Group includes:CSA Code of Conduct Gap Resolution spreadsheetAnnex 10 to the CSA Code of Conduct ...

Request to download
Security Implications of ChatGPT - Japanese Translation

Security Implications of ChatGPT - Japanese Translation
Release Date: 06/20/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Understanding Cloud Attack Vectors

Understanding Cloud Attack Vectors
Release Date: 06/06/2023

The goal of the document is to map the various attack vectors that are actually being used during cloud-based attacks in IaaS/PaaS and to map the vectors ...

Request to download
State of Financial Services in Cloud

State of Financial Services in Cloud
Release Date: 06/05/2023

In recent years, the financial services industry has increasingly adopted cloud services. This trend is expected to continue with the further adoption and...

Request to download
State of SaaS Security: 2023 Survey Report

State of SaaS Security: 2023 Survey Report
Release Date: 06/02/2023

In today’s digital landscape, SaaS has emerged as a vital lifeline for operations in organizations big and small. As businesses entrust the cloud with the...

Request to download
High Performance Computing Tabletop Guide

High Performance Computing Tabletop Guide
Release Date: 05/31/2023

This guide lays out the framework necessary to host a High Performance Computing (HPC)-focused cyberattack tabletop exercise (TTX) so that organizations c...

Request to download
Medical Devices in A Zero Trust Architecture - Japanese Translation

Medical Devices in A Zero Trust Architecture - Japanese Translation
Release Date: 05/31/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
CCM Machine Readable Bundle (JSON/YAML/OSCAL)

CCM Machine Readable Bundle (JSON/YAML/OSCAL)
Release Date: 05/19/2023

CSA provides in a machine-readable format the CCM Controls, CAIQ Security Questionnaire, Implementation Guidelines (both JSON/YAML and OSCAL) and Mappings...

Request to download
How to Design a Secure Serverless Architecture (2023 Version) - Japanese Translation

How to Design a Secure Serverless Architecture (2023 Version) - Japanese Translation
Release Date: 05/12/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Enterprise Authority to Operate Working Group Charter 2023

Enterprise Authority to Operate Working Group Charter 2023
Release Date: 05/10/2023

The mission of the Enterprise Authority to Operate (EATO) Working Group is to develop, maintain, review, update, support and deploy of a concentrated assessm...

Request to download
Medical Devices in A Zero Trust Architecture

Medical Devices in A Zero Trust Architecture
Release Date: 05/08/2023

Today’s medical devices often connect to the cloud, which increases the risk by expanding the attack surface. This presents the Healthcare Delivery Organi...

Request to download
An Agile Data Doctrine for a Secure Data Lake

An Agile Data Doctrine for a Secure Data Lake
Release Date: 04/25/2023

Data is now a significant asset in most organizations around the globe, whether government, business, or not-for-profit; the inevitable shift toward its u...

Request to download
The Six Pillars of DevSecOps: Automation - Japanese Translation

The Six Pillars of DevSecOps: Automation - Japanese Translation
Release Date: 04/05/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
CCM and CAIQ FAQ

CCM and CAIQ FAQ
Release Date: 04/05/2023

The Cloud Controls Matrix (CCM) is a framework of controls (policies and procedures) that are essential for cloud computing security. It is created and up...

Request to download
Open Certification Framework Working Group Charter

Open Certification Framework Working Group Charter
Release Date: 03/31/2023

The CSA Open Certification Framework (OCF) is an industry initiative to allow global, trusted independent evaluation of cloud providers. It is a program for ...

Request to download
Agile Data Lake Threat Modeling

Agile Data Lake Threat Modeling
Release Date: 03/28/2023

As cloud platforms expand further and further into business uses, the need to understand the attack surface to your data becomes much more apparent. With ...

Request to download
Data Loss Prevention and Data Security Survey Report

Data Loss Prevention and Data Security Survey Report
Release Date: 03/14/2023

As the traditional perimeter is reduced or eliminated with the move to remote and hybrid work, and as Zero Trust strategies gain popularity, data security...

Request to download
 Internet of Things (IoT) Working Group Charter 2023

Internet of Things (IoT) Working Group Charter 2023
Release Date: 03/12/2023

This charter lays out the scope, responsibilities, and roadmap for the Internet of Things Working Group. The Cloud Security Alliance Internet of Things (I...

Request to download
Quantum-Safe Security Working Group Charter 2023

Quantum-Safe Security Working Group Charter 2023
Release Date: 03/10/2023

The focus of the Quantum‐Safe Security Working Group is on cryptographic methods that will remain safe after the widespread availability of the quantum co...

Request to download