CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Top Threats to Cloud Computing 2024 The CSA Top Threats Report aims to raise awareness of current cloud security risks, threats, and vulnerabilities. In this 2024 installment, we surveyed ov... Request to download | |
Top Threats Working Group Charter 2024 The Top Threats Working Group aims to provide up-to-date, industry-informed expert insights on cloud security risks, threats, and vulnerabilities to help ... Request to download | |
An Agile Data Doctrine for a Secure Data Lake - Chinese Translation | |
Top Threats to Cloud Computing: Pandemic 11 Deep Dive This publication reflects on eight recent cloud breach cases, presented as both a detailed narrative and a threat model. The threat model format provides ... Request to download | |
Top Threats to Cloud Computing Post Pandemic Eleven Survey Report The CSA Top Threats Report aims to raise awareness of current cloud security risks, threats, and vulnerabilities. In this 2024 installment, we surveyed ov... Request to download | |
Cloud and Compromise (C&C): Gamifying of Cloud Security CSA’s Top Threats Working Group works to identify the most significant cloud security threats, vulnerabilities, and weaknesses; analyze major incidents; a... Request to download | |
Top Threats Working Group Charter 2023 The Top Threats Working Group aims to provide up-to-date, industry-informed expert insights on cloud security risks, threats, and vulnerabilities to help ... Request to download | |
Top Threats to Cloud Computing - Pandemic Eleven - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Cloud and Web Security Challenges in 2022 Organizations’ work environments have undergone rapid but lasting changes in the face of the recent health crisis. Remote work became a necessity and many... Request to download | |
Top Threats Working Group Charter 2022 The Top Threats Working Group aims to provide up-to-date, industry-informed expert insights on cloud security risks, threats, and vulnerabilities to help ... Request to download | |
Top Threats to Cloud Computing Pandemic Eleven The Top Threats reports have traditionally aimed to raise awareness of threats, risks, and vulnerabilities in the cloud. Such issues are often the result ... Request to download | |
Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Arabic Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Top Threats to Cloud Computing Pandemic Eleven - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Cloud Threat Modeling - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Top Threats to Cloud Computing: Egregious Eleven - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Cloud Threat Modeling The purpose of this document is to enable, encourage cloud and security practitioners to apply threat modeling for cloud applications, services, and security... Request to download | |
Cloud Penetration Testing Playbook: Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Top Threats to Cloud Computing: Egregious Eleven Deep Dive The purpose of the report is to provide organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated ... Request to download | |
Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Chinese Translation The purpose of the report is to provide organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated ... Request to download |