ChaptersEventsBlog
How is your organization adopting AI technologies? Take this short survey to help us identify key trends and risks across FSI →

CSA Research

Best practices, guidance, frameworks and tools to help the industry secure the cloud. Read our research to get your questions around cloud security answered.
Research

CSA Research is created by the industry for the industry and is both vendor-neutral and consensus driven. Our research is created by subject matter experts who volunteer for our working groups. Each working group focuses on a unique topic or aspect of cloud security, from IoT, DevSecOps, Serverless and more, we have working groups for over 20 areas of cloud computing. You can view a list of all active research working groups. To find out more about how our research is created and the process we follow you can view the CSA Research Lifecycle.

Contribute to CSA Research

Peer reviews allow security professionals from around the world to collaborate on CSA research. Provide your feedback on the following documents in progress.

Latest Research

The Continuous Audit Metrics Catalog

The Continuous Audit Metrics Catalog

Release Date: 01/28/2026

Are traditional infosec assurance tools outdated? Many cloud customers think so. They see that technology changes quickly, and products are frequently evolving with continuous integration and deployment. Therefore, a certification obtained once a year after a third-party audit is not a...
CCMv4.1 Implementation Guidelines

CCMv4.1 Implementation Guidelines

Release Date: 01/27/2026

This document will help you understand how to navigate through the Cloud Controls Matrix v4.1 to use it effectively and interpret and implement the CCM control specifications.  The document’s main goal is to support the implementation of CCM controls and provide guidance in the form of...
STAR Level 1: Security Questionnaire (CAIQ v4.1)

STAR Level 1: Security Questionnaire (CAIQ v4.1)

Release Date: 01/27/2026

The STAR Level 1: Security Questionnaire (CAIQ v4.1) offers an industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services, providing security control transparency. It provides a set of Yes/No questions a cloud consumer and cloud auditor may wish to ask of a...