Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Identity and Access Management Working Group Charter 2024

Identity and Access Management Working Group Charter 2024
Release Date: 06/01/2024

Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using Identity Access Management (IAM)...

Request to download
Confronting Shadow Access Risks: Considerations for Zero Trust and Artificial Intelligence Deployments

Confronting Shadow Access Risks: Considerations for Zero Trust and Artificial Intelligence Deployments
Release Date: 05/06/2024

Shadow Access, a growing concern within cloud computing and Identity and Access Management (IAM), refers to unintended, unauthorized access to systems and...

Request to download
What is IAM for the Cloud? - Chinese Translation

What is IAM for the Cloud? - Chinese Translation
Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Beyond Passwords: The Role of Passkeys in Modern Web Security

Beyond Passwords: The Role of Passkeys in Modern Web Security
Release Date: 11/12/2023

Web authentication methods have evolved significantly over the years to improve security and the user experience. In the early days of the internet, usern...

Request to download
Machine Identity in Cybersecurity and IAM

Machine Identity in Cybersecurity and IAM
Release Date: 09/19/2023

Identity management is a crucial aspect of information security, as it ensures that only authorized individuals and entities have access to sensitive data...

Request to download
Defining Shadow Access: The Emerging IAM Security Challenge

Defining Shadow Access: The Emerging IAM Security Challenge
Release Date: 09/12/2023

Shadow Access is unmonitored, unauthorized, invisible, unsafe, and generally over-permissioned cloud access. This emerging Identity and Access Management ...

Request to download
Identity and Access Management Glossary

Identity and Access Management Glossary
Release Date: 08/29/2023

The Identity and Access Management (IAM) Glossary is a reference document that aggregates and summarizes IAM-related terms and definitions. Bringing toget...

Request to download
Zero Trust Principles and Guidance for Identity and Access Management (IAM)

Zero Trust Principles and Guidance for Identity and Access Management (IAM)
Release Date: 07/13/2023

Identity and the ability to consume information about that identity as well as other Zero Trust (ZT) signals (additional attributes about an identity), is...

Request to download
What is IAM for the Cloud?

What is IAM for the Cloud?
Release Date: 07/12/2023

The threat landscape has materially changed over the years to the point that Identity and Access Management (IAM) is a core component of any digital acces...

Request to download
Identity Access Management Working Group Charter

Identity Access Management Working Group Charter
Release Date: 04/22/2022

Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using Identity Access Management (IAM)...

Request to download
The 2020 State of Identity Security in the Cloud - Chinese Translation

The 2020 State of Identity Security in the Cloud - Chinese Translation
Release Date: 02/07/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
The 2020 State of Identity Security in the Cloud

The 2020 State of Identity Security in the Cloud
Release Date: 11/19/2020

The use of cloud services have continued to increase over the past decade. Particularly in the wake of the COVID-19 public health crisis, many enterprises di...

Request to download
Identity Security

Identity Security
Release Date: 04/19/2016

The goal of the Identity Solutions: Security Beyond the Perimeter survey was to address Insufficient Identity, Credential, and Access Management and gain a b...

Request to download
Identity and Access Management for the Internet of Things - Japanese Translation

Identity and Access Management for the Internet of Things - Japanese Translation
Release Date: 04/05/2016

This document is the first in a series of summary guidance aimed at providing easily understandable recommendations to information technology staff charged ...

Request to download
Identity and Access Management for the Internet of Things

Identity and Access Management for the Internet of Things
Release Date: 09/28/2015

This document is the first in a series of summary guidance aimed at providing easily understandable recommendations to information technology staff charged w...

Request to download
SecaaS Category 1 // Identity and Access Management Implementation Guidance

SecaaS Category 1 // Identity and Access Management Implementation Guidance
Release Date: 09/26/2012

This document addresses personnel involved in the identification and implementation of the IAM solution in the cloud. It will be of particular interest to th...

Request to download