CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Release Date: 07/05/2022 This document serves as a mapping exercise between the California Consumer Privacy Act (CCPA), the EU General Data Protection Regulation (GDPR) and the CS... Request to download |
![]() | CSA CCM v4.0 Addendum - UAE IA Regulation Release Date: 07/05/2022 This document is an addendum to the CCM V4.0 that contain controls mapping between the CSA CCM and the UAE Information Assurance (IA) Regulation. The docu... Request to download |
![]() | Measuring Risk and Risk Governance Release Date: 06/21/2022 Adapting to the cloud presents a new challenge to enterprises. The shared responsibility model, used to distinguish responsibilities between cloud provide... Request to download |
![]() | The Continuous Audit Metrics Catalog: Towards a Machine-Readable Representation Release Date: 06/07/2022 In October 2021, the Cloud Security Alliance released the first version of the Continuous Audit Metrics catalog which provides a standard reference for th... Request to download |
![]() | Top Threats to Cloud Computing Pandemic Eleven Release Date: 06/06/2022 The Top Threats reports have traditionally aimed to raise awareness of threats, risks, and vulnerabilities in the cloud. Such issues are often the result ... Request to download |
CISO Perspectives and Progress in Deploying Zero Trust Release Date: 06/03/2022 Some of the areas covered in this survey include where Zero Trust falls as a priority in the organization, the percentage of those who have completed rela... Request to download | |
![]() | Best Practices for Smart Contract Security Hyperledger Fabric Release Date: 05/18/2022 The goal is to establish best practices for using smart contract specifically in Hyperledger Fabric 2.0 environment. This document serves as a guide for S... Request to download |
![]() | Serverless Computing Working Group Charter Release Date: 05/17/2022 Serverless working group charter document. The Serverless WG seeks to develop best practices to help organizations that want to run their business wi... Request to download |
![]() | HPC Cloud Services Onboarding Guide Release Date: 05/16/2022 This paper aims to present an overview of what to consider to ensure the proper selection, design, and implementation of an HPC solution that will satisfy... Request to download |
![]() | Healthcare Supply Chain Cybersecurity Risk Management Release Date: 05/11/2022 It is essential for Healthcare Delivery Organizations to conduct proper risk management practices and risk assessments of suppliers and third-party servic... Request to download |
![]() | Cloud Key Management Working Group Charter Release Date: 05/04/2022 Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using key management systems with thos... Request to download |
![]() | Release Date: 04/25/2022 The IoT Security Controls Matrix is relevant for enterprise IoT systems that incorporate multiple types of connected devices, cloud services, and networki... Request to download |
![]() | Guide to the IoT Controls Matrix v3 Release Date: 04/25/2022 The Guide to the IoT Security Controls Matrix provides instructions for using the companion CSA IoT Security Controls Matrix v3. This guide explains how t... Request to download |
![]() | Identity Access Management Working Group Charter Release Date: 04/22/2022 Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using Identity Access Management (IAM)... Request to download |
![]() | Health Information Management Working Group Charter Release Date: 04/22/2022 The Health Information Management Working Group aims to directly influence how health information service providers deliver secure cloud solutions (servic... Request to download |
![]() | Getting Quantum Safe in 5 Slides Release Date: 04/19/2022 This is a set of 5 high-level slides about how to approach quantum-safe security. The goal is briefly to outline the problem, possible solutions, next ste... Request to download |
![]() | C-Level Guidance to Securing Serverless Architectures Release Date: 04/19/2022 The purpose of this document is to provide a high-level business overview of Serverless architectures, along with the risks and the security concerns when... Request to download |
![]() | Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement Release Date: 04/12/2022 The purpose of this research article is to explain how DNS and the enterprise-managed DDI system can be combined with a Software-Defined Perimeter to deli... Request to download |
![]() | SaaS Security and Misconfigurations Report Release Date: 04/11/2022 Many recent breaches and data leaks have been tied back to misconfigurations causing it to be a top concern for many organizations. Most research related ... Request to download |
![]() | Global Security Database Working Group Charter Release Date: 04/01/2022 The scope of this project is to identify and understand the problems around vulnerability discovery, reporting, publication, tracking, and classification.... Request to download |


















