CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Quantum-Safe Security Working Group Charter 2023 The focus of the Quantum‐Safe Security Working Group is on cryptographic methods that will remain safe after the widespread availability of the quantum co... Request to download | |
Health Information Management Working Group Charter 2023 The Health Information Management Working Group aims to directly influence how health information service providers deliver secure cloud solutions (servic... Request to download | |
Auditors Guidance Document STAR Certification: Auditing the Cloud Controls Matrix The download file also contains the following: Illustrative Type 2 SOC 2® Report: With the Additional Criteria in the Cloud Security Alliance (CSA) Cloud ... Request to download | |
CSA CCM v4.0 Addendum - IBM Cloud Framework for Financial Services v1.1.0 This document is a CSA CCM v4.0 addendum to the IBM Cloud Framework for Financial Services v1.1.0 that contains controls mapping between the CCM and the I... Request to download | |
STAR Enabled Solutions FAQ A STAR Enabled Solution is a product or service that utilizes the CCM framework or the Consensus Assessment Initiative Questionnaire (CAIQ). Their technol... Request to download | |
Top Threats Working Group Charter 2023 The Top Threats Working Group aims to provide up-to-date, industry-informed expert insights on cloud security risks, threats, and vulnerabilities to help ... Request to download | |
Telesurgery Tabletop Guide Book The purpose of this guidebook is to assist healthcare providers in planning and facilitating a discussion and evaluation of the procedural response action... Request to download | |
ACSP Training Course Outline | CSA An outline of the topics covered and what you'll be building in the labs each day of the Advanced Cloud Security Practitioner (ACSP) Training. Cloud ... Request to download | |
Illustrative Type 2 SOC 2® Report: With the Additional Criteria in the Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) In the following illustrative type 2 SOC 2 report, the service auditor is reporting on:The fairness of the presentation of the service organization’s desc... Request to download | |
Deconstructing Application Connectivity Challenges in a Complex Cloud Environment The production and use of SaaS applications in organizations has grown exponentially over the past several years. Application Security has become an integ... Request to download | |
The Six Pillars of DevSecOps - Pragmatic Implementation Organizations have a wide array of tools and solutions to choose from when implementing security into the software development process. They often end up ... Request to download | |
CSA CCM v4.0 Addendum - Spain National Security Framework (ENS) This document is an addendum to the CCM V4.0 that contains controls mapping between the CSA CCM and Spain's National Security Framework (ENS).The document... Request to download | |
Top Threats to Cloud Computing - Pandemic Eleven - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Zero Trust as a Security Philosophy When implemented correctly, a Zero Trust architecture/strategy/approach to Information Technology, and the architecture that supports it, has the potentia... Request to download | |
Understanding Cloud Data Security and Priorities BigID commissioned CSA to develop a survey and report to better understand the industry’s knowledge, attitudes, and opinions regarding data security in th... Request to download | |
SaaS Governance Best Practices for Cloud Customers In the context of cloud security, the focus is almost always on securing Infrastructure-as-a-Service (IaaS) environments. This is despite the reality that... Request to download | |
CSA CCM v4.0 Addendum - ISMAP This document is an addendum to the CCM V4.0 that contain controls mapping between the CSA CCM and Japan's Information System Security Management and Asse... Request to download | |
Healthcare Interoperability When Health Information Technology systems seamlessly exchange data with each other, it is referred to as interoperability. Interoperability occurs when i... Request to download | |
Recommendations for using a Customer Controlled Key Store In the latest from the Cloud Key Management working group, this document provides guidance on how to assess and implement cloud key management services co... Request to download | |
Accedere: Using a SOC 2 Approach to Help Organizations Achieve CSA STAR Level 2 Cybersecurity frameworks, standards and certifications can be quite complicated to understand, making it difficult to identify which standard an organizat... Request to download |