CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Third-Party Vendor Risk Management in Healthcare The increased use of third-party vendors for applications and data processing services is a business model that is likely to continue, especially as HDOs ... Request to download | |
Sensitive Data in the Cloud Anjuna commissioned CSA to develop a survey to better understand the industry’s knowledge, attitudes, and opinions regarding sensitive data in the cloud. ... Request to download | |
State of ICS Security in the Age of Cloud The goal of this document hopes to create awareness and share insights on the benefits of leveraging Cloud Computing for ICS/OT. It also attempts to stimu... Request to download | |
Top Threats to Cloud Computing Pandemic Eleven The Top Threats reports have traditionally aimed to raise awareness of threats, risks, and vulnerabilities in the cloud. Such issues are often the result ... Request to download | |
Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Arabic Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Best Practices for Smart Contract Security Hyperledger Fabric The goal is to establish best practices for using smart contract specifically in Hyperledger Fabric 2.0 environment. This document serves as a guide for S... Request to download | |
HPC Cloud Services Onboarding Guide This paper aims to present an overview of what to consider to ensure the proper selection, design, and implementation of an HPC solution that will satisfy... Request to download | |
Cloud Key Management Working Group Charter Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using key management systems with thos... Request to download | |
IoT Controls Matrix v3 The IoT Security Controls Matrix is relevant for enterprise IoT systems that incorporate multiple types of connected devices, cloud services, and networki... Request to download | |
Guide to the IoT Controls Matrix v3 The Guide to the IoT Security Controls Matrix provides instructions for using the companion CSA IoT Security Controls Matrix v3. This guide explains how t... Request to download | |
SaaS Security and Misconfigurations Report Many recent breaches and data leaks have been tied back to misconfigurations causing it to be a top concern for many organizations. Most research related ... Request to download | |
Top Threats to Cloud Computing Pandemic Eleven - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
The 2020 State of Identity Security in the Cloud - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
SaaS Governance Best Practices for Cloud Customers - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Protecting the Privacy of Healthcare Data in the Cloud - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
CSA Enterprise Architecture Reference Guide - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Cloud Incident Response Framework - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
SaaS Security and Misconfigurations Report - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Best Practices for Implementing a Secure Application Container Architecture - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Artificial Intelligence in Healthcare Artificial intelligence (AI) now has the potential to be integrated into all aspects of healthcare, from management to delivery and diagnosis. These advan... Request to download |