ChaptersEventsBlog

CSA Research

Best practices, guidance, frameworks and tools to help the industry secure the cloud. Read our research to get your questions around cloud security answered.
Research

CSA Research is created by the industry for the industry and is both vendor-neutral and consensus driven. Our research is created by subject matter experts who volunteer for our working groups. Each working group focuses on a unique topic or aspect of cloud security, from IoT, DevSecOps, Serverless and more, we have working groups for over 20 areas of cloud computing. You can view a list of all active research working groups. To find out more about how our research is created and the process we follow you can view the CSA Research Lifecycle.

Contribute to CSA Research

Peer reviews allow security professionals from around the world to collaborate on CSA research. Provide your feedback on the following documents in progress.

Latest Research

Key Responsibility Models

Key Responsibility Models

Release Date: 12/10/2025

This infographic offers a clear understanding of how cloud service providers and customers share responsibilities for cloud key management.

Cloud key management approaches include Bring Your Own Key (BYOK), Hold Your Own Key (HYOK), Provider-Managed Key (PMK), and Customer-Managed Key (CMK). As...
Data Security within AI Environments

Data Security within AI Environments

Release Date: 12/03/2025

As organizations adopt large language models, multi-modal AI systems, and agentic AI, traditional safeguards must evolve. This publication provides a comprehensive, practitioner-focused overview of how AI reshapes modern data protection. Aligned to the CSA AI Controls Matrix (AICM), this guide...
Managing Privileged Access in a Cloud-First World

Managing Privileged Access in a Cloud-First World

Release Date: 11/24/2025

Organizations are shifting to cloud-first architectures, distributed workforces, and identity-centric security models. This means that Privileged Access Management (PAM) has become one of the most critical disciplines in cybersecurity. 

This publication provides a practical overview of...