CSAIChaptersEventsBlog

CSA Research

Best practices, guidance, frameworks and tools to help the industry secure the cloud. Read our research to get your questions around cloud security answered.
Research

CSA Research is created by the industry for the industry and is both vendor-neutral and consensus driven. Our research is created by subject matter experts who volunteer for our working groups. Each working group focuses on a unique topic or aspect of cloud security, from IoT, DevSecOps, Serverless and more, we have working groups for over 20 areas of cloud computing. You can view a list of all active research working groups. To find out more about how our research is created and the process we follow you can view the CSA Research Lifecycle.

Contribute to CSA Research

Peer reviews allow security professionals from around the world to collaborate on CSA research. Provide your feedback on the following documents in progress.

Latest Research

AI Security Maturity Model (AISMM)

AI Security Maturity Model (AISMM)

Release Date: 05/07/2026

The AI Security Maturity Model (AISMM) helps organizations assess, build, and improve their AI security programs. Aligning with common information security structures, processes, and responsibilities, the AISMM provides a practical roadmap for advancing AI security maturity across the...
Software-Defined Perimeter (SDP) Architecture Guide V3

Software-Defined Perimeter (SDP) Architecture Guide V3

Release Date: 05/05/2026

This guide provides a detailed explanation of the Software-Defined Perimeter (SDP). Originally conceptualized by CSA, SDP is a comprehensive framework for implementing Zero Trust Architecture (ZTA). It focuses on an identity-centric, “authenticate-before-connect” approach.

As organizations...
The "AI Vulnerability Storm"

The "AI Vulnerability Storm"

Release Date: 05/01/2026

AI is fundamentally changing the speed, scale, and economics of vulnerability discovery—and most security programs aren’t built to keep up. This publication breaks down how AI-driven exploit development is compressing timelines from weeks to hours, creating a structural advantage for attackers...