CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Defining the Zero Trust Protect Surface Enterprise adoption and implementation of Zero Trust is broad and growing. Venture Beat reports that 90% of organizations moving to the cloud are adopting... Request to download | |
Beyond Passwords: The Role of Passkeys in Modern Web Security Web authentication methods have evolved significantly over the years to improve security and user experience. In the early days of the internet, usernames... Request to download | |
Cloud Native Application Protection Platform Survey Report Cloud Native Application Protection Platforms (CNAPPs) have emerged as a critical category of security tooling in recent years due to the complexity of co... Request to download | |
How to Design a Secure Serverless Architecture (2023 Version) - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
An Agile Data Doctrine for a Secure Data Lake Data is now a significant asset in most organizations around the globe, whether government, business, or not-for-profit; the inevitable shift toward its u... Request to download | |
Secure Connection Requirements of Hybrid Cloud - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Software-Defined Perimeter (SDP) Specification v2.0 The Software-Defined Perimeter (SDP) architecture is an effective way to implement the principles of Zero Trust. SDP aims to give enterprise security arch... Request to download | |
How to Design a Secure Serverless Architecture - Chinese Translation Like any solution, serverless computing brings with it a variety of cyber risks. This paper covers security for serverless applications, focusing on best pra... Request to download | |
Blockchains in the Quantum Era - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Secure Connection Requirements of Hybrid Cloud The National Institute of Standards and Technology (NIST) defines hybrid cloud infrastructure as a composition of distinct cloud infrastructures (pri... Request to download | |
The Continuous Audit Metrics Catalog Are traditional infosec assurance tools outdated? Many cloud customers think so. They see that technology changes quickly, and products are frequently evo... Request to download | |
How to Design a Secure Serverless Architecture 2021 Like any solution, serverless computing brings with it a variety of cyber risks. This paper covers security for serverless applications, focusing on best pra... Request to download | |
Recommendations for Adopting a Cloud-Native Key Management Service The purpose of this document is to provide general guidance for choosing, planning, and deploying cloud-native Key Management Systems (KMS). The guidance ... Request to download | |
Hyperledger Fabric 2.0 Architecture Security Report Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many... Request to download | |
Hyperledger Fabric 2.0 Architecture Security Controls Checklist Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many... Request to download | |
CSA Guide to the IoT Security Controls Framework v2 - Japanese Translation The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework spreadsheet. This guide ex... Request to download | |
Crypto-Asset Exchange Security Guidelines Thanks to the blockchain technology that makes them possible, crypto-assets are becoming massively successful. As with any successful industry, a multitud... Request to download | |
CSA STAR Level 3 Focus Group Charter The CSA STAR Level 3 Focus Group will advise on the scope, objectives, structure, go-to-market (GTM) strategy and value proposition for STAR Level 3... Request to download | |
Software Defined Perimeter Architecture Guide: Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Blockchains in the Quantum Era Digital Ledger Technologies (DLT) such as blockchain are being deployed as part of diverse applications that span multiple market segments. Application devel... Request to download |