CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Cloud Incident Response Framework - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Cloud Threat Modeling - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Top Threats to Cloud Computing: Egregious Eleven - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Cloud Threat Modeling The purpose of this document is to enable, encourage cloud and security practitioners to apply threat modeling for cloud applications, services, and security... Request to download | |
Cloud Incident Response Framework This document aims to provide a Cloud Incident Response (CIR) framework that serves as a go-to guide for a CSC to effectively prepare for and manage cloud in... Request to download | |
Cloud-Based, Intelligent Ecosystems This paper proposes a call to action for security executives to break the endless cycle of iterative tool adoption and, instead, move to data-centric securit... Request to download | |
Top Threats to Cloud Computing: Egregious Eleven Deep Dive The purpose of the report is to provide organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated ... Request to download | |
Top Threats to Cloud Computing: Egregious Eleven The report provides organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated risk-management deci... Request to download | |
Cloud Penetration Testing Playbook As cloud services continue to enable new technologies and see massive adoption there is a need to extend the scope of penetration testing into public cloud s... Request to download | |
Firmware Integrity in the Cloud Data Center This paper presents the point of view from key stakeholders in datacenter development regarding how to build cloud infrastructure using secure servers and in... Request to download | |
Best Practices for Cyber Incident Exchange No organization is immune from cyber attack. Malicious actors collaborate with skill and agility, effectively moving from target to target at a breakneck pac... Request to download |