CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Communicating the Business Value of Zero Trust Zero Trust is a major industry trend that is being adopted and promoted by security teams around the globe, and for good reason - it delivers improved sec... Request to download | |
Medical Devices In A Zero Trust Architecture - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Zero Trust Guiding Principles Zero Trust is a strategic mindset that is highly useful for organizations to adopt as part of their digital transformations and other efforts to increase ... Request to download | |
Zero Trust Principles and Guidance for Identity and Access Management (IAM) Identity and the ability to consume information about that identity as well as other Zero Trust (ZT) signals (additional attributes about an identity), is... Request to download | |
Medical Devices in A Zero Trust Architecture - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Medical Devices in A Zero Trust Architecture Today’s medical devices often connect to the cloud, which increases the risk by expanding the attack surface. This presents the Healthcare Delivery Organi... Request to download | |
Zero Trust as a Security Philosophy When implemented correctly, a Zero Trust architecture/strategy/approach to Information Technology, and the architecture that supports it, has the potentia... Request to download | |
Software-Defined Perimeter (SDP) Specification v2.0 - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
CISO Perspectives and Progress in Deploying Zero Trust Some of the areas covered in this survey include where Zero Trust falls as a priority in the organization, the percentage of those who have completed rela... Request to download | |
Software-Defined Perimeter (SDP) Specification v2.0 - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement The purpose of this research article is to explain how DNS and the enterprise-managed DDI system can be combined with a Software-Defined Perimeter to deli... Request to download | |
Toward a Zero Trust Architecture - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Software-Defined Perimeter (SDP) Specification v2.0 The Software-Defined Perimeter (SDP) architecture is an effective way to implement the principles of Zero Trust. SDP aims to give enterprise security arch... Request to download | |
Toward a Zero Trust Architecture - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
CISO Perspectives and Progress in Deploying Zero Trust - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Toward a Zero Trust Architecture Enterprise stakeholders must consider the challenges of increased real-time system complexity, the need for new cybersecurity policy and strong cultural s... Request to download | |
Zero Trust Architecture Expert Group Charter The CSA Zero Trust Architecture Expert Group will review and advise on the scope, curriculum, objectives, structure, go-to-market (GTM) strategy and value pr... Request to download | |
Software Defined Perimeter Architecture Guide: Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Software-Defined Perimeter Zero Trust Charter The proposed charter outlines the scope, responsibilities, etc. to align and guide the Software-Defined Perimeter Zero Trust working group through the year 2... Request to download |