Contribute to CSA Research

Home
Contribute

Open Peer Reviews

Serverless Computing Security in 2021

Open Until: 06/13/2021

Like any solution, serverless computing brings with it a variety of cyber risks. This paper covers security for serverless appli...

Software-Defined Perimeter (SDP) Specification v2.0

Open Until: 06/18/2021

This document updates the Cloud Security Alliance (CSA) Software-Defined Perimeter (SDP) Specification. Version 1.0 was written ...

SecaaS Working Group Charter 2021

Open Until: 06/18/2021

This charter lays out the scope, responsibilities, and roadmap for the Security as a Service Working Group. We welcome all feedb...

International Standardization Council Charter 2021

Open Until: 06/18/2021

This charter lays out the scope, responsibilities, and roadmap for the International Standardization Council. We welcome all fee...

Recommendations for Adopting a Cloud-Native Key Management Service

Open Until: 06/30/2021

The purpose of this document is to provide general guidance for choosing, planning, and deploying cloud-native Key Management Sy...

Secure Connection Requirements of Hybrid Cloud

Open Until: 07/08/2021

Hybrid cloud environments provide enterprises with diverse resources to run different workloads depending on the Cloud Service C...

Ransomware in the Healthcare Industry

Open Until: 07/09/2021

Ransomware is the fastest-growing malware threat today. Over the last few years, it has risen to epidemic proportions, quickly b...

Surveys

Cloud Risk and Misconfigurations
Participate here! https://www.surveymonkey.com/r/CSAconfigwebsite

Deadline: July 2
Length: 30 questions, approximately 10 minutes
Prizes for participation:

  • First 100 participants will receive a $5 US Amazon Giftcard
  • All participants will have the chance at winning Bose Sport Earbuds

Research Goals:
The goal of this survey is to assess readiness of organizations that
leverage the public cloud for mitigating security and compliance risks due
to configuration mistakes. Key areas of interest include:

  • Top public cloud security risks including those due to configuration
    mistakes
  • Who is responsible for detecting and remediating cloud security and
    compliance risks?
  • What tools are being used for detecting and remediating cloud security
    and compliance risks
  • Key challenges security owners face in reducing configuration security
    and compliance risk
  • Where companies are in their Cloud Security Posture Management (CSPM)
    journey
  • How security owners measure progress and success in CSPM