CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Corda Enterprise 4.8 - Architecture Security Report Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many... Request to download | |
Cloud Incident Response Framework - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Cloud Key Management System with External Origin Key The purpose of this document is to provide general guidance for choosing, planning, and deploying cloud-native key management systems (KMS) where there is... Request to download | |
Roles and Responsibilities of Third Party Security Services As we witness the broader adoption of cloud services, it is no surprise that third-party outsourced services are also on the rise. The security responsibi... Request to download | |
Cloud Threat Modeling - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Information Technology Governance, Risk and Compliance in Healthcare Information Technology (IT) Governance, Risk, and Compliance (GRC), are three words that have a significant impact on organizations. While each term seems... Request to download | |
Top 10 Blockchain Attacks, Vulnerabilities & Weaknesses Cryptocurrencies and other blockchain virtual assets have been the target of the majority of Distributed Ledger Technology (DLT) attacks and a variety of ... Request to download | |
Ransomware in the Healthcare Cloud Ransomware is the fastest-growing malware threat today. Over the last few years, it has risen to epidemic proportions, quickly becoming a significant reve... Request to download | |
Microservices Architecture Pattern This document provides a repeatable approach to architecting, developing, and deploying microservices as Microservices Architecture Patterns (MAPs). The p... Request to download | |
Top Threats to Cloud Computing: Egregious Eleven - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Protecting the Privacy of Healthcare Data in the Cloud The Health Delivery Organization (HDO) needs to understand the relationship between privacy and security, particularly the differences. This understanding... Request to download | |
Cloud Threat Modeling The purpose of this document is to enable, encourage cloud and security practitioners to apply threat modeling for cloud applications, services, and security... Request to download | |
Cloud Key Management Working Group Charter 2021 Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using key management systems with thos... Request to download | |
The Use of Blockchain in Healthcare Healthcare is a large and heavily regulated industry. US and EU privacy and security laws require healthcare organizations to protect personal information... Request to download | |
Healthcare Cybersecurity Playbook - An Evolving Landscape One aspect of healthcare that has increased significantly during the COVID-19 pandemic is the use of telehealth. Telehealth is used for everything from re... Request to download | |
SecaaS Working Group Charter 2021 This charter lays out the scope, responsibilities, and roadmap for the Security as a Service (SecaaS) Working Group. The SecaaS Working Group has been cre... Request to download | |
Critical Controls Implementation for Salesforce - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Critical Controls Implementation for Salesforce The Salesforce Platform can be a valuable tool for organizations to build and test applications. However, certain security changes are needed when an orga... Request to download | |
Telehealth Risk Management The recent COVID-19 pandemic has increased the demand for data and accelerated the use of telehealth. The Health Resources and Services Administration (HRSA)... Request to download | |
Cloud Incident Response Framework - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |