ChaptersEventsBlog
Share your organization’s adoption, governance, and security practices. Take the Securing the New Digital Workforce survey now →
Research Publications currently filtered by Locale.
×

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

A Practitioner’s Guide to Post-Quantum Cryptography

A Practitioner’s Guide to Post-Quantum Cryptography

Release Date: 11/10/2025

Cryptographically relevant quantum computers are projected to emerge as early as the 2030s. Traditional cryptographic systems like RSA, Diffie-Hellman, an...

Request to download
AI Controls Matrix

AI Controls Matrix

Release Date: 07/09/2025

The AI Controls Matrix (AICM) is a first-of-its-kind vendor-agnostic framework for cloud-based AI systems. Organizations can use the AICM to develop, impl...

Request to download
AICM Implementation & Auditing Guidelines (Frameworks)

AICM Implementation & Auditing Guidelines (Frameworks)

Release Date: 10/22/2025

The Cloud Security Alliance (CSA) AI Controls Matrix (AICM) Implementation and Auditing Guidelines Bundle provides comprehensive direction for both implem...

Request to download
Beyond the Hype: A Benchmark Study of AI Agents in the SOC

Beyond the Hype: A Benchmark Study of AI Agents in the SOC

Release Date: 10/06/2025

CSA experts conducted a benchmarking study that evaluated how AI can transform alert investigations in Security Operations Centers (SOCs). Using simulated...

Request to download
Research Lifecycle

Research Lifecycle

Release Date: 10/03/2025

The CSA Research Lifecycle graphic illustrates how research moves from proposal to approval, execution, peer review, publication, and dissemination. This res...

Request to download
SaaS Security Capability Framework (SSCF)

SaaS Security Capability Framework (SSCF)

Release Date: 09/23/2025

The SaaS Security Capability Framework (SSCF) is a new technical framework that defines configurable, consumable, and customer-facing security controls pr...

Request to download
MLOps Overview

MLOps Overview

Release Date: 08/27/2025

Machine learning (ML) is becoming increasingly central to business operations, making the security of ML pipelines essential rather than optional. Machine...

Request to download
Analyzing Log Data with AI Models to Meet Zero Trust Principles

Analyzing Log Data with AI Models to Meet Zero Trust Principles

Release Date: 09/15/2025

Logs are fundamental to Zero Trust. They capture critical details about user activity, device behavior, network traffic, and application access. However, ...

Request to download
The State of Cloud and AI Security 2025

The State of Cloud and AI Security 2025

Release Date: 09/09/2025

This global survey report, developed in partnership with Tenable, examines how organizations are adapting security strategies for hybrid, multi-cloud, and...

Request to download
CSA Assurance Education FAQ

CSA Assurance Education FAQ

Release Date: 08/22/2023

Assurance education encompasses training and certification programs that teach individuals how to determine the effectiveness of the cybersecurity practic...

Request to download
STAR Program Overview

STAR Program Overview

Release Date: 08/31/2023

The CSA Security, Trust, Assurance, and Risk (STAR) program is the most complete and largest cloud assurance program in the world that constitutes an ecos...

Request to download
Security Guidance for Critical Areas of Focus in Cloud Computing v5

Security Guidance for Critical Areas of Focus in Cloud Computing v5

Release Date: 07/15/2024

Cloud computing has firmly cemented its place as the foundation of the information security industry. The Cloud Security Alliance’s Security Guidance v5 i...

Request to download
Agentic AI Identity and Access Management: A New Approach

Agentic AI Identity and Access Management: A New Approach

Release Date: 08/18/2025

Agentic AI is pushing the boundaries of automation, autonomy, and decision-making at machine speed. But traditional identity and access management (IAM) p...

Request to download
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation

Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation

Release Date: 08/07/2025

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Secure Agentic System Design: A Trait-Based Approach

Secure Agentic System Design: A Trait-Based Approach

Release Date: 07/30/2025

Thanks to powerful reasoning models, AI agents are making more nuanced decisions and interacting more effectively with their environments. At the same tim...

Request to download
Cloud Controls Matrix and CAIQ v4

Cloud Controls Matrix and CAIQ v4

Release Date: 06/03/2024

The Cloud Controls Matrix (CCM) is a cybersecurity control framework for cloud computing aligned to the CSA best practices, that is considered the de-facto s...

Request to download
CCM Working Group Charter

CCM Working Group Charter

Release Date: 07/28/2025

The CCM Working Group is responsible for maintaining and evolving the Cloud Security Alliance’s foundational framework for cloud security assurance, the C...

Request to download
Zero Trust Privacy Assessment and Guidance - Korean Translation

Zero Trust Privacy Assessment and Guidance - Korean Translation

Release Date: 07/22/2025

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Requirements for Bodies Providing STAR Certification

Requirements for Bodies Providing STAR Certification

Release Date: 03/31/2025

This document outlines how to conduct STAR certification assessments to the Cloud Controls Matrix (CCM) as part of an ISO 27001 assessment. The STAR certi...

Request to download
CloudTrust Protocol Prototype Source Code

CloudTrust Protocol Prototype Source Code

Release Date: 12/10/2015

The Cloud Trust Protocol (CTP) is designed to be a mechanism by which cloud service customers can ask for and receive information related to the security of ...

Request to download