CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Communicating the Business Value of Zero Trust Zero Trust is a major industry trend that is being adopted and promoted by security teams within many organizations around the globe, and for good reasons... Request to download |
![]() | Zero Trust Guiding Principles Zero Trust is a strategic mindset that is highly useful for organizations to adopt as part of their digital transformations and other efforts to increase... Request to download |
![]() | Zero Trust Principles and Guidance for Identity and Access Management (IAM) Identity and the ability to consume information about that identity as well as other Zero Trust (ZT) signals (additional attributes about an identity), is... Request to download |
![]() | Medical Devices in A Zero Trust Architecture Today’s medical devices often connect to the cloud, which increases the risk by expanding the attack surface. This presents the Healthcare Delivery Organi... Request to download |
![]() | Zero Trust as a Security Philosophy When implemented correctly, a Zero Trust architecture/strategy/approach to Information Technology, and the architecture that supports it, has the potentia... Request to download |
![]() | CISO Perspectives and Progress in Deploying Zero Trust Some of the areas covered in this survey include where Zero Trust falls as a priority in the organization, the percentage of those who have completed rela... Request to download |
![]() | Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement The purpose of this research article is to explain how DNS and the enterprise-managed DDI system can be combined with a Software-Defined Perimeter to deli... Request to download |
![]() | Software-Defined Perimeter (SDP) Specification v2.0 The Software-Defined Perimeter (SDP) architecture is an effective way to implement the principles of Zero Trust. SDP aims to give enterprise security arch... Request to download |
![]() | Toward a Zero Trust Architecture Enterprise stakeholders must consider the challenges of increased real-time system complexity, the need for new cybersecurity policy and strong cultural s... Request to download |
![]() | Zero Trust Architecture Expert Group Charter The CSA Zero Trust Architecture Expert Group will review and advise on the scope, curriculum, objectives, structure, go-to-market (GTM) strategy and value pr... Request to download |
![]() | Software-Defined Perimeter Zero Trust Charter The proposed charter outlines the scope, responsibilities, etc. to align and guide the Software-Defined Perimeter Zero Trust working group through the year 2... Request to download |
![]() | SDP: The Most Advanced Zero Trust Architecture Today’s “Zero Trust” implementations are like putting up a wall with multiple doors and allowing people to come and pick a lock on the door. We are then just... Request to download |
![]() | Software-Defined Perimeter as a DDoS Prevention Mechanism The primary goal of this document is to increase the awareness and understanding of SDP as a tool to prevent DDoS attacks by demonstrating its efficiency and... Request to download |
![]() | Software Defined Perimeter (SDP): Awareness and Adoption Infographic A majority of organizations recognize the need to change their approach to user access control. SDP is seeing early market adoption and awareness, with under... Request to download |
![]() | SDP Architecture Guide v2 Software Defined Perimeter (SDP) Architecture Guide is designed to leverage proven, standards-based components to stop network attacks against application in... Request to download |
![]() | Software Defined Perimeter Glossary The Software Defined Perimeter (SDP) Glossary is a reference document that brings together SDP related terms and definitions from various professional resour... Request to download |
![]() | SDP for IaaS Obtain a clear sense of the security challenges facing enterprise users of IaaS, understand the problems that arise from combining native IaaS access control... Request to download |
![]() | SDP Specification v1.0 This document outlines a Cloud Security Alliance (CSA) initiated protocol for the Software Defined Perimeter specification, and requests discussion and sugge... Request to download |
![]() | SDP Hackathon Whitepaper The CSA SDP Hackathon challenged hackers to attack a server defended by a software defined perimeter. Of the billions of packets fired at the server, not one... Request to download |
![]() | Software Defined Perimeter This document explains the software defined perimeter (SDP) security framework and how it can be deployed to protect application infrastructure from network-... Request to download |