CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Identity and Access Management Working Group Charter 2024 Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using Identity Access Management (IAM)... Request to download | |
Confronting Shadow Access Risks: Considerations for Zero Trust and Artificial Intelligence Deployments Shadow Access, a growing concern within cloud computing and Identity and Access Management (IAM), refers to unintended, unauthorized access to systems and... Request to download | |
What is IAM for the Cloud? - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Beyond Passwords: The Role of Passkeys in Modern Web Security Web authentication methods have evolved significantly over the years to improve security and the user experience. In the early days of the internet, usern... Request to download | |
Machine Identity in Cybersecurity and IAM Identity management is a crucial aspect of information security, as it ensures that only authorized individuals and entities have access to sensitive data... Request to download | |
Defining Shadow Access: The Emerging IAM Security Challenge Shadow Access is unmonitored, unauthorized, invisible, unsafe, and generally over-permissioned cloud access. This emerging Identity and Access Management ... Request to download | |
Identity and Access Management Glossary The Identity and Access Management (IAM) Glossary is a reference document that aggregates and summarizes IAM-related terms and definitions. Bringing toget... Request to download | |
Zero Trust Principles and Guidance for Identity and Access Management (IAM) Identity and the ability to consume information about that identity as well as other Zero Trust (ZT) signals (additional attributes about an identity), is... Request to download | |
What is IAM for the Cloud? The threat landscape has materially changed over the years to the point that Identity and Access Management (IAM) is a core component of any digital acces... Request to download | |
Identity Access Management Working Group Charter Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using Identity Access Management (IAM)... Request to download | |
The 2020 State of Identity Security in the Cloud - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
The 2020 State of Identity Security in the Cloud The use of cloud services have continued to increase over the past decade. Particularly in the wake of the COVID-19 public health crisis, many enterprises di... Request to download | |
Identity Security The goal of the Identity Solutions: Security Beyond the Perimeter survey was to address Insufficient Identity, Credential, and Access Management and gain a b... Request to download | |
Identity and Access Management for the Internet of Things - Japanese Translation This document is the first in a series of summary guidance aimed at providing easily understandable recommendations to information technology staff charged ... Request to download | |
Identity and Access Management for the Internet of Things This document is the first in a series of summary guidance aimed at providing easily understandable recommendations to information technology staff charged w... Request to download | |
SecaaS Category 1 // Identity and Access Management Implementation Guidance This document addresses personnel involved in the identification and implementation of the IAM solution in the cloud. It will be of particular interest to th... Request to download |