CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Deconstructing Application Connectivity Challenges in a Complex Cloud Environment The production and use of SaaS applications in organizations has grown exponentially over the past several years. Application Security has become an integ... Request to download | |
The Six Pillars of DevSecOps - Pragmatic Implementation Organizations have a wide array of tools and solutions to choose from when implementing security into the software development process. They often end up ... Request to download | |
CSA CCM v4.0 Addendum - Spain National Security Framework (ENS) This document is an addendum to the CCM V4.0 that contains controls mapping between the CSA CCM and Spain's National Security Framework (ENS).The document... Request to download | |
Top Threats to Cloud Computing - Pandemic Eleven - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Zero Trust as a Security Philosophy When implemented correctly, a Zero Trust architecture/strategy/approach to Information Technology, and the architecture that supports it, has the potentia... Request to download | |
Understanding Cloud Data Security and Priorities BigID commissioned CSA to develop a survey and report to better understand the industry’s knowledge, attitudes, and opinions regarding data security in th... Request to download | |
SaaS Governance Best Practices for Cloud Customers In the context of cloud security, the focus is almost always on securing Infrastructure-as-a-Service (IaaS) environments. This is despite the reality that... Request to download | |
CSA CCM v4.0 Addendum - ISMAP This document is an addendum to the CCM V4.0 that contain controls mapping between the CSA CCM and Japan's Information System Security Management and Asse... Request to download | |
Healthcare Interoperability When Health Information Technology systems seamlessly exchange data with each other, it is referred to as interoperability. Interoperability occurs when i... Request to download | |
Recommendations for using a Customer Controlled Key Store In the latest from the Cloud Key Management working group, this document provides guidance on how to assess and implement cloud key management services co... Request to download | |
Accedere: Using a SOC 2 Approach to Help Organizations Achieve CSA STAR Level 2 Cybersecurity frameworks, standards and certifications can be quite complicated to understand, making it difficult to identify which standard an organizat... Request to download | |
The State of Cloud Security Risk, Compliance, and Misconfigurations - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Security Guidelines for Providing and Consuming APIs - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Cloud and Web Security Challenges in 2022 Organizations’ work environments have undergone rapid but lasting changes in the face of the recent health crisis. Remote work became a necessity and many... Request to download | |
Secure Connection Requirements of Hybrid Cloud - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Top Threats Working Group Charter 2022 The Top Threats Working Group aims to provide up-to-date, industry-informed expert insights on cloud security risks, threats, and vulnerabilities to help ... Request to download | |
Enterprise Architecture Working Group Charter 2022 This is the 2022 Charter for the Enterprise Architecture Working Group to promote research, development, and education of best practices and methodologies... Request to download | |
Software-Defined Perimeter (SDP) Specification v2.0 - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
IoT Controls Matrix v3 - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Guide to the IoT Controls Matrix v3 - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |