CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Cloud Controls Matrix and CAIQ v4 The Cloud Controls Matrix (CCM) is a cybersecurity control framework for cloud computing aligned to the CSA best practices, that is considered the de-facto s... Request to download | |
Cloud and Web Security Challenges in 2022 Organizations’ work environments have undergone rapid but lasting changes in the face of the recent health crisis. Remote work became a necessity and many... Request to download | |
Third-Party Vendor Risk Management in Healthcare The increased use of third-party vendors for applications and data processing services is a business model that is likely to continue, especially as HDOs ... Request to download | |
Healthcare Supply Chain Cybersecurity Risk Management It is essential for Healthcare Delivery Organizations to conduct proper risk management practices and risk assessments of suppliers and third-party servic... Request to download | |
State of Cloud Security Risk, Compliance, and Misconfigurations - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
State of Cloud Security Risk, Compliance, and Misconfigurations Cloud misconfigurations consistently are a top concern for organizations utilizing public cloud. Such errors lead to data breaches, allow the deletion or ... Request to download | |
Top Threats to Cloud Computing: Egregious Eleven - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Turkey Cloud Adaptation Survey – Turkey vs EU comparison In the last quarter of 2020 as a comprehensive CSA Global's done all over the world "Cloud Computing and Cloud Technology Use in Transition Survey" which mad... Request to download | |
Top Threats to Cloud Computing: Egregious Eleven Deep Dive The purpose of the report is to provide organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated ... Request to download | |
CSA's Perspective on Cloud Risk Management The rapid growth in both scope and market share, combined with the inherent complexity of cloud computing, appears to be straining the capabilities of existi... Request to download | |
Top Threats to Cloud Computing: Egregious Eleven The report provides organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated risk-management deci... Request to download | |
Cloud Octagon Model In this document CSA provides an approach to assess risk in SaaS cloud computing. It takes into account the security challenges in a cloud computing environm... Request to download | |
Top Threats to Cloud Computing: Deep Dive This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its foundation. Each... Request to download | |
SecaaS Category 5 // Security Assessments Implementation Guidance There are many choices for an assessment framework standard and there is no "one size fits all" solution for security assessments. One could reasonably expec... Request to download |