ChaptersEventsBlog
Get Free Early Access to TAISE Module 3! Sample the Certificate Experience Today!

CSA Research

Best practices, guidance, frameworks and tools to help the industry secure the cloud. Read our research to get your questions around cloud security answered.
Research

CSA Research is created by the industry for the industry and is both vendor-neutral and consensus driven. Our research is created by subject matter experts who volunteer for our working groups. Each working group focuses on a unique topic or aspect of cloud security, from IoT, DevSecOps, Serverless and more, we have working groups for over 20 areas of cloud computing. You can view a list of all active research working groups. To find out more about how our research is created and the process we follow you can view the CSA Research Lifecycle.

Contribute to CSA Research

Peer reviews allow security professionals from around the world to collaborate on CSA research. Provide your feedback on the following documents in progress.

Latest Research

The State of Cloud and AI Security 2025

The State of Cloud and AI Security 2025

Release Date: 09/09/2025

This global survey report, developed in partnership with Tenable, examines how organizations are adapting security strategies for hybrid, multi-cloud, and AI-driven environments. Drawing on insights from more than 1,000 professionals, it highlights the widening gap between rapid adoption and...
MLOps Overview

MLOps Overview

Release Date: 08/27/2025

Machine learning (ML) is becoming increasingly central to business operations, making the security of ML pipelines essential rather than optional. Machine Learning Operations (MLOps) is a set of repeatable processes to build, deploy, and continuously monitor machine learning models, focusing on...
Agentic AI Identity and Access Management: A New Approach

Agentic AI Identity and Access Management: A New Approach

Release Date: 08/18/2025

Agentic AI is pushing the boundaries of automation, autonomy, and decision-making at machine speed. But traditional identity and access management (IAM) protocols, designed for static applications and human users, can’t keep up.

This publication from the Cloud Security Alliance (CSA) introduces a...