CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
High Performance Computing Tabletop Guide This guide lays out the framework necessary to host a High Performance Computing (HPC)-focused cyberattack tabletop exercise (TTX) so that organizations c... Request to download | |
Medical Devices in A Zero Trust Architecture - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
How to Design a Secure Serverless Architecture (2023 Version) - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Enterprise Authority to Operate Working Group Charter 2023 The mission of the Enterprise Authority to Operate (EATO) Working Group is to develop, maintain, review, update, support and deploy of a concentrated assessm... Request to download | |
Medical Devices in A Zero Trust Architecture Today’s medical devices often connect to the cloud, which increases the risk by expanding the attack surface. This presents the Healthcare Delivery Organi... Request to download | |
An Agile Data Doctrine for a Secure Data Lake Data is now a significant asset in most organizations around the globe, whether government, business, or not-for-profit; the inevitable shift toward its u... Request to download | |
The Six Pillars of DevSecOps: Automation - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
CCM and CAIQ FAQ The Cloud Controls Matrix (CCM) is a framework of controls (policies and procedures) that are essential for cloud computing security. It is created and up... Request to download | |
Agile Data Lake Threat Modeling As cloud platforms expand further and further into business uses, the need to understand the attack surface to your data becomes much more apparent. With ... Request to download | |
Data Loss Prevention and Data Security Survey Report As the traditional perimeter is reduced or eliminated with the move to remote and hybrid work, and as Zero Trust strategies gain popularity, data security... Request to download | |
Internet of Things (IoT) Working Group Charter 2023 This charter lays out the scope, responsibilities, and roadmap for the Internet of Things Working Group. The Cloud Security Alliance Internet of Things (I... Request to download | |
Quantum-Safe Security Working Group Charter 2023 The focus of the Quantum‐Safe Security Working Group is on cryptographic methods that will remain safe after the widespread availability of the quantum co... Request to download | |
Health Information Management Working Group Charter 2023 The Health Information Management Working Group aims to directly influence how health information service providers deliver secure cloud solutions (servic... Request to download | |
Auditors Guidance Document STAR Certification: Auditing the Cloud Controls Matrix The download file also contains the following: Illustrative Type 2 SOC 2® Report: With the Additional Criteria in the Cloud Security Alliance (CSA) Cloud ... Request to download | |
CSA CCM v4.0 Addendum - IBM Cloud Framework for Financial Services v1.1.0 This document is a CSA CCM v4.0 addendum to the IBM Cloud Framework for Financial Services v1.1.0 that contains controls mapping between the CCM and the I... Request to download | |
STAR Enabled Solutions FAQ A STAR Enabled Solution is a product or service that utilizes the CCM framework or the Consensus Assessment Initiative Questionnaire (CAIQ). Their technol... Request to download | |
Top Threats Working Group Charter 2023 The Top Threats Working Group aims to provide up-to-date, industry-informed expert insights on cloud security risks, threats, and vulnerabilities to help ... Request to download | |
Telesurgery Tabletop Guide Book The purpose of this guidebook is to assist healthcare providers in planning and facilitating a discussion and evaluation of the procedural response action... Request to download | |
ACSP Training Course Outline | CSA An outline of the topics covered and what you'll be building in the labs each day of the Advanced Cloud Security Practitioner (ACSP) Training. Cloud ... Request to download | |
Illustrative Type 2 SOC 2® Report: With the Additional Criteria in the Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) In the following illustrative type 2 SOC 2 report, the service auditor is reporting on:The fairness of the presentation of the service organization’s desc... Request to download |