CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
State of Cloud Security Concerns, Challenges, and Incidents - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Toward a Zero Trust Architecture - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Global Security Database Working Group Charter The scope of this project is to identify and understand the problems around vulnerability discovery, reporting, publication, tracking, and classification.... Request to download | |
Guideline on Effectively Managing Security Service in the Cloud - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
The Importance of STAR Compliance requires a comprehensive review of services and processes related to cloud infrastructure and how it is managed during a data lifecycle. STAR f... Request to download | |
CCM v4 - Indonesian Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Software-Defined Perimeter (SDP) Specification v2.0 The Software-Defined Perimeter (SDP) architecture is an effective way to implement the principles of Zero Trust. SDP aims to give enterprise security arch... Request to download | |
Blockchain/Distributed Ledger Technology (DLT) Risk and Security Considerations There is no shortage of guidance on how to design, configure and deploy Fabric solutions. This paper provides insights into how the three layers of blockc... Request to download | |
IoT Charter 2022 This charter lays out the scope, responsibilities, and roadmap for the IoT Working Group. The Cloud Security Alliance (CSA) IoT Working Group (IoTWG) plan... Request to download | |
Toward a Zero Trust Architecture - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Cybersecurity Best Practices for the Manufacturing Industry The manufacturing and industrial sectors have evolved with the introduction of technologies over the past many decades. Progress in improving processes, t... Request to download | |
DevSecOps - Pillar 4 Bridging Compliance and Development OverviewThis document provides guidance to ensure the gap between compliance and development is addressed by recognizing compliance objectives, translatin... Request to download | |
Top Threats to Cloud Computing Pandemic Eleven - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
The 2020 State of Identity Security in the Cloud - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
SaaS Governance Best Practices for Cloud Customers - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Guide to the Internet of Things (IoT) Security Controls Framework v2 - Chinese Translation The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework v2 spreadsheet. This guide... Request to download | |
Protecting the Privacy of Healthcare Data in the Cloud - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
How to Design a Secure Serverless Architecture - Chinese Translation Like any solution, serverless computing brings with it a variety of cyber risks. This paper covers security for serverless applications, focusing on best pra... Request to download | |
CSA Enterprise Architecture Reference Guide - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |