CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Cloud Security and Technology Maturity Survey Release Date: 02/03/2022 The goal of this survey is to better understand the maturity levels of organizations for the cloud and technology both currently and in the near future. K... Request to download |
![]() | Artificial Intelligence in Healthcare Release Date: 01/06/2022 Artificial intelligence (AI) now has the potential to be integrated into all aspects of healthcare, from management to delivery and diagnosis. These advan... Request to download |
![]() | Corda Enterprise 4.8 - Architecture Security Report Release Date: 12/15/2021 Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many... Request to download |
![]() | Corda Enterprise 4.8 - Security Controls Checklist Release Date: 12/15/2021 In this spreadsheet, our Blockchain/Distributed Ledger Working Group delivers a fully implementable security controls checklist for the blockchain framewo... Request to download |
![]() | Release Date: 12/08/2021 This document contains auditing guidelines for each of the control specifications within the CCM version 4. The CCM is a detailed controls framework align... Request to download |
![]() | Cloud Key Management System with External Origin Key Release Date: 12/02/2021 The purpose of this document is to provide general guidance for choosing, planning, and deploying cloud-native key management systems (KMS) where there is... Request to download |
![]() | Roles and Responsibilities of Third Party Security Services Release Date: 11/30/2021 As we witness the broader adoption of cloud services, it is no surprise that third-party outsourced services are also on the rise. The security responsibi... Request to download |
![]() | Secure DevOps and Misconfigurations Survey Report Release Date: 11/18/2021 Secure DevOps, DevSecOps, and “shifting left” have become increasingly popular terms in cybersecurity. With the rapid increase both in volume and speed to... Request to download |
![]() | CSA Medical Device Incident Response Playbook Release Date: 11/08/2021 This document presents a best-practices medical device incident response playbook that incorporates clinical aspects of medical device IR. As such, this g... Request to download |
![]() | Secure Connection Requirements of Hybrid Cloud Release Date: 11/05/2021 The National Institute of Standards and Technology (NIST) defines hybrid cloud infrastructure as a composition of distinct cloud infrastructures (pri... Request to download |
![]() | Toward a Zero Trust Architecture Release Date: 10/27/2021 Enterprise stakeholders must consider the challenges of increased real-time system complexity, the need for new cybersecurity policy and strong cultural s... Request to download |
![]() | The Continuous Audit Metrics Catalog Release Date: 10/19/2021 Are traditional infosec assurance tools outdated? Many cloud customers think so. They see that technology changes quickly, and products are frequently evo... Request to download |
![]() | Practical Preparations for the Post-Quantum World Release Date: 10/19/2021 This document discusses the cybersecurity challenges and recommended steps to reduce likely new risks due to quantum information sciences. This paper was ... Request to download |
![]() | Information Technology Governance, Risk and Compliance in Healthcare Release Date: 10/15/2021 Information Technology (IT) Governance, Risk, and Compliance (GRC), are three words that have a significant impact on organizations. While each term seems... Request to download |
![]() | Top 10 Blockchain Attacks, Vulnerabilities & Weaknesses Release Date: 09/27/2021 Cryptocurrencies and other blockchain virtual assets have been the target of the majority of Distributed Ledger Technology (DLT) attacks and a variety of ... Request to download |
![]() | State of Cloud Security Risk, Compliance, and Misconfigurations Release Date: 09/17/2021 Cloud misconfigurations consistently are a top concern for organizations utilizing public cloud. Such errors lead to data breaches, allow the deletion or ... Request to download |
![]() | Ransomware in the Healthcare Cloud Release Date: 09/15/2021 Ransomware is the fastest-growing malware threat today. Over the last few years, it has risen to epidemic proportions, quickly becoming a significant reve... Request to download |
![]() | How to Design a Secure Serverless Architecture 2021 Release Date: 09/14/2021 Like any solution, serverless computing brings with it a variety of cyber risks. This paper covers security for serverless applications, focusing on best pra... Request to download |
![]() | Recommendations for Adopting a Cloud-Native Key Management Service Release Date: 09/14/2021 Cloud-native key management services (KMS) offer organizations of any size and complexity a low-cost option for meeting their needs for key management, pa... Request to download |
![]() | The Evolution of STAR: Introducing Continuous Auditing Release Date: 09/14/2021 The CSA Continuous Auditing Certification (aka STAR Level 3) is the most rigorous assurance tier in the STAR program. Level 3 certified services providers... Request to download |