Cloud 101CircleEventsBlog

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

HSM-as-a-Service Use Cases, Considerations, and Best Practices

HSM-as-a-Service Use Cases, Considerations, and Best Practices
Release Date: 04/03/2024

A Hardware Security Module (HSM) is a certified, trusted platform for performing cryptographic operations and protecting keys. It is a tamper-responsive a...

Request to download
Defining the Zero Trust Protect Surface

Defining the Zero Trust Protect Surface
Release Date: 03/05/2024

Enterprise adoption and implementation of Zero Trust is broad and growing. Venture Beat reports that 90% of organizations moving to the cloud are adopting...

Request to download
The Six Pillars of DevSecOps - Collaboration and Integration

The Six Pillars of DevSecOps - Collaboration and Integration
Release Date: 02/20/2024

“Security can only be achieved through collaboration, not confrontation” is one of the defining principles of DevSecOps. Essentially, security is a team s...

Request to download
The State of Security Remediation 2024

The State of Security Remediation 2024
Release Date: 02/13/2024

Security remediation involves identifying, evaluating, and addressing security vulnerabilities to mitigate potential risks. In the ever-evolving landscape...

Request to download
Health Information Management Working Group Charter 2024

Health Information Management Working Group Charter 2024
Release Date: 01/31/2024

The Health Information Management Working Group aims to directly influence how health information service providers deliver secure cloud solutions (servic...

Request to download
CSA Data Security Glossary

CSA Data Security Glossary
Release Date: 01/22/2024

This CSA Data Security Glossary identifies and defines 127 terms relevant to data security. Based on the CSA Cloud Security Glossary, NIST Glossary, and o...

Request to download
Key Management Lifecycle Best Practices

Key Management Lifecycle Best Practices
Release Date: 12/19/2023

Cryptographic keys are essential for securing digital assets, yet managing these keys can be challenging for organizations that run applications in the cl...

Request to download
Communicating the Business Value of Zero Trust

Communicating the Business Value of Zero Trust
Release Date: 12/18/2023

Zero Trust is a major industry trend that is being adopted and promoted by security teams around the globe, and for good reason - it delivers improved sec...

Request to download
How to Design a Secure Serverless Architecture

How to Design a Secure Serverless Architecture
Release Date: 10/23/2023

As businesses work to bring technology value to market faster, serverless computing is gaining adoption with developers. Serverless platforms enable devel...

Request to download
Top Threats to Cloud Computing: Pandemic 11 Deep Dive

Top Threats to Cloud Computing: Pandemic 11 Deep Dive
Release Date: 10/17/2023

This publication reflects on eight recent cloud breach cases, presented as both a detailed narrative and a threat model. The threat model format provides ...

Request to download
Data Loss Prevention in Healthcare

Data Loss Prevention in Healthcare
Release Date: 10/04/2023

The rise of digital services in healthcare has made protecting medical data an ongoing challenge. Data loss may occur in several forms, including informat...

Request to download
FaaS Serverless Control Framework (Set) based on NIST 800-53 R5 controls

FaaS Serverless Control Framework (Set) based on NIST 800-53 R5 controls
Release Date: 08/30/2023

This spreadsheet provides a cybersecurity control framework for Function-as-a-Service (FaaS) serverless deployments. The framework is based on the NIST 80...

Request to download
Identity and Access Management Glossary

Identity and Access Management Glossary
Release Date: 08/29/2023

The Identity and Access Management (IAM) Glossary is a reference document that aggregates and summarizes IAM-related terms and definitions. Bringing toget...

Request to download
Data Security Working Group Charter 2023

Data Security Working Group Charter 2023
Release Date: 08/29/2023

The Data Security working group’s goal is to provide a forum for the cybersecurity community on issues related to data security, data governance, privacy,...

Request to download
Cloud Native Application Protection Platform Survey Report

Cloud Native Application Protection Platform Survey Report
Release Date: 08/23/2023

Cloud Native Application Protection Platforms (CNAPPs) have emerged as a critical category of security tooling in recent years due to the complexity of co...

Request to download
International Standardization Council Charter 2023

International Standardization Council Charter 2023
Release Date: 08/23/2023

This charter lays out the scope, responsibilities, and roadmap for the International Standardization Council (ISC). The ISC actively searches mechanisms o...

Request to download
Zero Trust Principles and Guidance for Identity and Access Management (IAM)

Zero Trust Principles and Guidance for Identity and Access Management (IAM)
Release Date: 07/13/2023

Identity and the ability to consume information about that identity as well as other Zero Trust (ZT) signals (additional attributes about an identity), is...

Request to download
What is IAM for the Cloud?

What is IAM for the Cloud?
Release Date: 07/12/2023

The purpose of this document is to provide an understanding of the challenges and considerations involved in managing Identity and Access Management (IAM)...

Request to download
Cloud and Compromise (C&C): Gamifying of Cloud Security

Cloud and Compromise (C&C): Gamifying of Cloud Security
Release Date: 07/10/2023

CSA’s Top Threats Working Group works to identify the most significant cloud security threats, vulnerabilities, and weaknesses; analyze major incidents; a...

Request to download
CSA Code of Conduct Gap Resolution and Annex 10 to the CSA Code of Conduct for GDPR Compliance

CSA Code of Conduct Gap Resolution and Annex 10 to the CSA Code of Conduct for GDPR Compliance
Release Date: 06/21/2023

This bundle from the CSA Privacy Level Agreement Working Group includes:CSA Code of Conduct Gap Resolution spreadsheetAnnex 10 to the CSA Code of Conduct ...

Request to download