ChaptersEventsBlog
How is your organization using Agentic AI and autonomous AI agents? Take this survey to help us identify how teams are addressing new risks →

CSA Research

Best practices, guidance, frameworks and tools to help the industry secure the cloud. Read our research to get your questions around cloud security answered.
Research

CSA Research is created by the industry for the industry and is both vendor-neutral and consensus driven. Our research is created by subject matter experts who volunteer for our working groups. Each working group focuses on a unique topic or aspect of cloud security, from IoT, DevSecOps, Serverless and more, we have working groups for over 20 areas of cloud computing. You can view a list of all active research working groups. To find out more about how our research is created and the process we follow you can view the CSA Research Lifecycle.

Contribute to CSA Research

Peer reviews allow security professionals from around the world to collaborate on CSA research. Provide your feedback on the following documents in progress.

Latest Research

Enabling Zero Trust for Cellular Networks

Enabling Zero Trust for Cellular Networks

Release Date: 02/11/2026

4G/LTE, 5G, and Open Radio Access Network (O-RAN) cellular networks have evolved into highly distributed, hybrid cloud ecosystems. These architectures underpin critical national infrastructure and enable innovation in areas such as autonomous mobility, remote healthcare, industrial automation,...
Securing Autonomous AI Agents

Securing Autonomous AI Agents

Release Date: 02/04/2026

Autonomous AI agents are being embedded across cloud, hybrid, and on-prem environments. However, most identity systems were built for humans, not for self-directed, API-driven agents operating continuously at runtime. This comprehensive survey report, commissioned by Strata, explores the current...
Stealth Mode SDP for Zero Trust Network Infrastructure

Stealth Mode SDP for Zero Trust Network Infrastructure

Release Date: 02/03/2026

Traditional TCP/IP networking was designed for openness, not adversarial environments. This default visibility has become a critical liability in an era of machine-speed attacks and AI-powered scanning. This publication from the CSA Zero Trust Working Group addresses this challenge by...