CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
CSA Guide to the IoT Security Controls Framework v2 - Japanese Translation The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework spreadsheet. This guide ex... Request to download | |
Cloud Solution Data Science COVID-19 Dashboard This publication was produced through the efforts of chapters and volunteers but the content development falls outside of the CSA Research Lifecycle. For ... Request to download | |
CSA Enterprise Architecture Reference Guide The Enterprise Architecture Reference Guide v2 is a companion piece with the EA v2 to CCM v3.0.1 Mapping. The peer review for both documents are intended to ... Request to download | |
Enterprise Architecture Reference Diagram The CSA Enterprise Architecture (EA) is both a methodology and a set of tools. It is a framework, a comprehensive approach for the architecture of a secure c... Request to download | |
Enterprise Architecture v2 to CCM v3.01 Mapping Guide The Enterprise Architecture (EA) is the CSA’s standard cloud reference architecture while the Cloud Control Matrix (CCM) is the CSA’s standard control set. T... Request to download | |
Enterprise Architecture to CCM v3.01 Reordered Mapping The EA v2 to CCM v3.0.1 Mapping is a companion piece with the Enterprise Architecture Reference Guide v2. The peer review for both documents are intended to ... Request to download | |
Disaster Recovery as a Service Disaster Recovery as a Service (DRaaS) is a cloud computing service model that allows an organization to back up its data and IT infrastructure in a third... Request to download | |
Cloud Incident Response Framework This document aims to provide a Cloud Incident Response (CIR) framework that serves as a go-to guide for a CSC to effectively prepare for and manage cloud in... Request to download | |
Critical Controls Implementation for Oracle E-Business Suite This paper will help an organization determine what security changes are needed when deploying Oracle E-Business Suite (EBS) in the Cloud. For clarity, this ... Request to download | |
Cloud Penetration Testing Playbook: Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Cloud Incident Response Working Group Charter In today’s connected era, a comprehensive incident response strategy is an integral aspect of any organization aiming to manage and lower their risk profile.... Request to download | |
The 2020 State of Identity Security in the Cloud The use of cloud services have continued to increase over the past decade. Particularly in the wake of the COVID-19 public health crisis, many enterprises di... Request to download | |
Survey Report - Security Practices in HPC & HPC Cloud This survey report aims to provide insights to the level and type of cyber and cloud security adopted by High Performance Computing (HPC) / HPC Cloud infrast... Request to download | |
Mobile Application Security Testing – Sum-Up & Landscape Overview Users place a good deal of trust in mobile app stores’ abilities to review, test, flag and block apps that exhibit undesirable behavior. However, even with t... Request to download | |
The Six Pillars of DevSecOps: Automation Automation is a critical component of DevSecOps because it enables process efficiency, allowing developers, infrastructure, and information security teams to... Request to download | |
Evolution of CASB Survey Report The study on CASB, which queried more than 200 IT and security professionals from a variety of organization sizes and locations, examined the expectations, t... Request to download | |
Financial Services Stakeholders Platform Working Group Charter Information security plays an integral role in the regulation and protection of customers in the financial industry. Exploring cloud computing and the underl... Request to download | |
SDP: The Most Advanced Zero Trust Architecture Today’s “Zero Trust” implementations are like putting up a wall with multiple doors and allowing people to come and pick a lock on the door. We are then just... Request to download | |
Cloud Incident Response Framework – A Quick Guide What this Quick Guide aims to do is to distill and give readers an overview of key contributions of the work currently undertaken in the CIR WG, towards a co... Request to download | |
Best Practices in Implementing a Secure Microservices Architecture Application containers and a microservices architecture are being used to design, develop, and deploy applications leveraging agile software development appr... Request to download |