Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Cloud Incident Response Framework - Chinese Translation

Cloud Incident Response Framework - Chinese Translation
Release Date: 02/06/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Cloud Threat Modeling - Japanese Translation

Cloud Threat Modeling - Japanese Translation
Release Date: 11/01/2021

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Top Threats to Cloud Computing: Egregious Eleven - Korean Translation

Top Threats to Cloud Computing: Egregious Eleven - Korean Translation
Release Date: 08/17/2021

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Cloud Threat Modeling

Cloud Threat Modeling
Release Date: 07/29/2021

The purpose of this document is to enable, encourage cloud and security practitioners to apply threat modeling for cloud applications, services, and security...

Request to download
Cloud Incident Response Framework

Cloud Incident Response Framework
Release Date: 05/04/2021

This document aims to provide a Cloud Incident Response (CIR) framework that serves as a go-to guide for a CSC to effectively prepare for and manage cloud in...

Request to download
Cloud-Based, Intelligent Ecosystems

Cloud-Based, Intelligent Ecosystems
Release Date: 12/10/2020

This paper proposes a call to action for security executives to break the endless cycle of iterative tool adoption and, instead, move to data-centric securit...

Request to download
Top Threats to Cloud Computing: Egregious Eleven Deep Dive

Top Threats to Cloud Computing: Egregious Eleven Deep Dive
Release Date: 09/23/2020

The purpose of the report is to provide organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated ...

Request to download
Top Threats to Cloud Computing: Egregious Eleven

Top Threats to Cloud Computing: Egregious Eleven
Release Date: 08/06/2019

The report provides organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated risk-management deci...

Request to download
Cloud Penetration Testing Playbook

Cloud Penetration Testing Playbook
Release Date: 07/12/2019

As cloud services continue to enable new technologies and see massive adoption there is a need to extend the scope of penetration testing into public cloud s...

Request to download
Firmware Integrity in the Cloud Data Center

Firmware Integrity in the Cloud Data Center
Release Date: 06/12/2018

This paper presents the point of view from key stakeholders in datacenter development regarding how to build cloud infrastructure using secure servers and in...

Request to download
Best Practices for Cyber Incident Exchange

Best Practices for Cyber Incident Exchange
Release Date: 04/16/2018

No organization is immune from cyber attack. Malicious actors collaborate with skill and agility, effectively moving from target to target at a breakneck pac...

Request to download