ChaptersEventsBlog

CSA Research

Best practices, guidance, frameworks and tools to help the industry secure the cloud. Read our research to get your questions around cloud security answered.
Research

CSA Research is created by the industry for the industry and is both vendor-neutral and consensus driven. Our research is created by subject matter experts who volunteer for our working groups. Each working group focuses on a unique topic or aspect of cloud security, from IoT, DevSecOps, Serverless and more, we have working groups for over 20 areas of cloud computing. You can view a list of all active research working groups. To find out more about how our research is created and the process we follow you can view the CSA Research Lifecycle.

Contribute to CSA Research

Peer reviews allow security professionals from around the world to collaborate on CSA research. Provide your feedback on the following documents in progress.

Latest Research

Cloud Threat Modeling 2025

Cloud Threat Modeling 2025

Release Date: 11/17/2025

This publication provides an updated methodology for identifying and mitigating risks in today’s cloud-first, AI-enabled landscape. Building on the original 2021 edition, this version expands the guidance on threat modeling frameworks. It also introduces AI security principles and modern...
Capabilities-Based Risk Assessment (CBRA) for AI Systems

Capabilities-Based Risk Assessment (CBRA) for AI Systems

Release Date: 11/12/2025

This publication introduces the Capabilities-Based Risk Assessment (CBRA), a structured, scalable approach to evaluating AI risk in enterprise environments. CSA’s AI Safety Initiative developed this framework to help assess risk based on what a given AI system can do.

CBRA evaluates AI through...
A Practitioner’s Guide to Post-Quantum Cryptography

A Practitioner’s Guide to Post-Quantum Cryptography

Release Date: 11/10/2025

Cryptographically relevant quantum computers are projected to emerge as early as the 2030s. Traditional cryptographic systems like RSA, Diffie-Hellman, and elliptic curve algorithms face obsolescence. This guide from the CSA Quantum-Safe Security Working Group provides a practical roadmap for...