Cloud 101CircleEventsBlog
Download Presentations from the CSA AI Summit at RSAC Now

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Corda Enterprise 4.8 - Architecture Security Report

Corda Enterprise 4.8 - Architecture Security Report
Release Date: 12/15/2021

Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many...

Request to download
Cloud Incident Response Framework - Korean Translation

Cloud Incident Response Framework - Korean Translation
Release Date: 12/09/2021

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Cloud Key Management System with External Origin Key

Cloud Key Management System with External Origin Key
Release Date: 12/02/2021

The purpose of this document is to provide general guidance for choosing, planning, and deploying cloud-native key management systems (KMS) where there is...

Request to download
Roles and Responsibilities of Third Party Security Services

Roles and Responsibilities of Third Party Security Services
Release Date: 11/30/2021

As we witness the broader adoption of cloud services, it is no surprise that third-party outsourced services are also on the rise. The security responsibi...

Request to download
Cloud Threat Modeling - Japanese Translation

Cloud Threat Modeling - Japanese Translation
Release Date: 11/01/2021

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Information Technology Governance, Risk and Compliance in Healthcare

Information Technology Governance, Risk and Compliance in Healthcare
Release Date: 10/15/2021

Information Technology (IT) Governance, Risk, and Compliance (GRC), are three words that have a significant impact on organizations. While each term seems...

Request to download
Top 10 Blockchain Attacks, Vulnerabilities & Weaknesses

Top 10 Blockchain Attacks, Vulnerabilities & Weaknesses
Release Date: 09/27/2021

Cryptocurrencies and other blockchain virtual assets have been the target of the majority of Distributed Ledger Technology (DLT) attacks and a variety of ...

Request to download
Ransomware in the Healthcare Cloud

Ransomware in the Healthcare Cloud
Release Date: 09/15/2021

Ransomware is the fastest-growing malware threat today. Over the last few years, it has risen to epidemic proportions, quickly becoming a significant reve...

Request to download
CCM v4.0 Implementation Guidelines

CCM v4.0 Implementation Guidelines
Release Date: 09/13/2021

This document will help you understand how to navigate through the Cloud Controls Matrix v4 to use it effectively and interpret and implement the CCM cont...

Request to download
Microservices Architecture Pattern

Microservices Architecture Pattern
Release Date: 08/31/2021

This document provides a repeatable approach to architecting, developing, and deploying microservices as Microservices Architecture Patterns (MAPs). The p...

Request to download
Top Threats to Cloud Computing: Egregious Eleven - Korean Translation

Top Threats to Cloud Computing: Egregious Eleven - Korean Translation
Release Date: 08/17/2021

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Protecting the Privacy of Healthcare Data in the Cloud

Protecting the Privacy of Healthcare Data in the Cloud
Release Date: 08/10/2021

The Health Delivery Organization (HDO) needs to understand the relationship between privacy and security, particularly the differences. This understanding...

Request to download
Cloud Threat Modeling

Cloud Threat Modeling
Release Date: 07/29/2021

The purpose of this document is to enable, encourage cloud and security practitioners to apply threat modeling for cloud applications, services, and security...

Request to download
Cloud Key Management Working Group Charter 2021

Cloud Key Management Working Group Charter 2021
Release Date: 07/20/2021

Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using key management systems with thos...

Request to download
The Use of Blockchain in Healthcare

The Use of Blockchain in Healthcare
Release Date: 07/15/2021

Healthcare is a large and heavily regulated industry. US and EU privacy and security laws require healthcare organizations to protect personal information...

Request to download
Healthcare Cybersecurity Playbook - An Evolving Landscape

Healthcare Cybersecurity Playbook - An Evolving Landscape
Release Date: 07/14/2021

One aspect of healthcare that has increased significantly during the COVID-19 pandemic is the use of telehealth. Telehealth is used for everything from re...

Request to download
SecaaS Working Group Charter 2021

SecaaS Working Group Charter 2021
Release Date: 07/09/2021

This charter lays out the scope, responsibilities, and roadmap for the Security as a Service (SecaaS) Working Group. The SecaaS Working Group has been cre...

Request to download
Critical Controls Implementation for Salesforce - Japanese Translation

Critical Controls Implementation for Salesforce - Japanese Translation
Release Date: 07/09/2021

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Critical Controls Implementation for Salesforce

Critical Controls Implementation for Salesforce
Release Date: 06/15/2021

The Salesforce Platform can be a valuable tool for organizations to build and test applications. However, certain security changes are needed when an orga...

Request to download
Telehealth Risk Management

Telehealth Risk Management
Release Date: 06/10/2021

The recent COVID-19 pandemic has increased the demand for data and accelerated the use of telehealth. The Health Resources and Services Administration (HRSA)...

Request to download