ChaptersEventsBlog
Register for DataSecAI 2025 in Dallas – Protect Data, Secure AI, and Drive Innovation
Research Publications currently filtered by Locale.
×

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Critical Controls Implementation for SAP

Critical Controls Implementation for SAP

Release Date: 01/06/2020

The Critical Controls Implementation for SAP is the first in a series of implementation documents that the CSA ERP Security Working Group aims to develop. Th...

Request to download
Privacy Level Agreement Working Group Charter

Privacy Level Agreement Working Group Charter

Release Date: 11/29/2019

The Cloud Security Alliance would like to invite you to review and comment on the updated Privacy Level Agreement Working Group Charter. The Privacy Level A...

Request to download
CSA CCM v3.0.1 Addendum to the Reserve Bank of India (RBI)’s Gopala Krishna Committee (GKC) report

CSA CCM v3.0.1 Addendum to the Reserve Bank of India (RBI)’s Gopala Krishna Committee (GKC) report

Release Date: 11/27/2019

This document contains a mapping and gap analysis between the cloud security requirements of CCM V3.0.1 and those of the Reserve Bank of India (RBI)’s Gopala...

Request to download
Beyond the General Data Protection Regulation (GDPR)

Beyond the General Data Protection Regulation (GDPR)

Release Date: 11/19/2019

Data residency insights from around the world. This study reveals the top data protection concerns and strategies of more than 800 senior business profession...

Request to download
Code of Conduct (CoC): Statement of Adherence 3rd Party Certification

Code of Conduct (CoC): Statement of Adherence 3rd Party Certification

Release Date: 11/19/2019

CSA PLA Code of Conduct for GDPR Compliance provides a consistent and comprehensive framework for complying with the EU’s GDPR. The CSA PLA Code of Conduct f...

Request to download
PLA Code of Conduct (CoC): Statement of Adherence Self-Assessment

PLA Code of Conduct (CoC): Statement of Adherence Self-Assessment

Release Date: 11/19/2019

CSA PLA Code of Conduct for GDPR Compliance provides a consistent and comprehensive framework for complying with the EU’s GDPR. The CSA PLA Code of Conduct f...

Request to download
Guidance for submitting the CSA Code of Conduct (CoC) for GDPR Compliance Self-Assessment

Guidance for submitting the CSA Code of Conduct (CoC) for GDPR Compliance Self-Assessment

Release Date: 11/19/2019

The CSA CoC for GDPR Compliance Self-Assessment is the voluntary publication of a CSP’s self-assessment results based on the requirements specified in the PL...

Request to download
Software-Defined Perimeter as a DDoS Prevention Mechanism

Software-Defined Perimeter as a DDoS Prevention Mechanism

Release Date: 10/27/2019

The primary goal of this document is to increase the awareness and understanding of SDP as a tool to prevent DDoS attacks by demonstrating its efficiency and...

Request to download
Mobile Application Security Testing (MAST) - Charter

Mobile Application Security Testing (MAST) - Charter

Release Date: 10/22/2019

Mobile Applications are becoming an integral part of not just modern enterprises but also of human existence and a huge part of this shift is due to the emer...

Request to download
Mapping of 'The Guidelines' Security Recommendations to CCM

Mapping of 'The Guidelines' Security Recommendations to CCM

Release Date: 09/05/2019

This document contains the additional controls that serves to bridge the gap between CCM V3.0.1 and the controls within 'Guideline on Effectively Managing Se...

Request to download
Gap Analysis Report on Mapping CSA’s Cloud Controls Matrix to ‘Guideline on Effectively Managing Security Service in the Cloud’

Gap Analysis Report on Mapping CSA’s Cloud Controls Matrix to ‘Guideline on Effectively Managing Security Service in the Cloud’

Release Date: 09/05/2019

The report summarizes the mapping of CCM v3.0.1 to 'Guideline on Effectively Managing Security Services in the Cloud' and provides gap analysis on the result...

Request to download
Six Pillars of DevSecOps

Six Pillars of DevSecOps

Release Date: 08/07/2019

In our current state of cyber security, there has been a large growth of application flaws that bypass the continuing addition of security frameworks to ensu...

Request to download
Top Threats to Cloud Computing: Egregious Eleven

Top Threats to Cloud Computing: Egregious Eleven

Release Date: 08/06/2019

The report provides organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated risk-management deci...

Request to download
Cloud Controls Matrix v3.0.1

Cloud Controls Matrix v3.0.1

Release Date: 08/03/2019

The CCM, the only meta-framework of cloud-specific security controls, mapped to leading standards, best practices and regulations. CCM provides organizations...

Request to download
CCM v3.0.1 Addendum - FedRAMP Moderate

CCM v3.0.1 Addendum - FedRAMP Moderate

Release Date: 08/03/2019

This document is an addendum to the CCM V3.0.1 that contain controls mapping between the CSA CCM and the FedRAMP R4 Moderate Baseline. The document aims to ...

Request to download
CSA CCM v3.0.1 Addendum - NIST 800-53 Rev 4 Moderate

CSA CCM v3.0.1 Addendum - NIST 800-53 Rev 4 Moderate

Release Date: 08/03/2019

This document is an addendum to the CCM V3.0.1 that contain controls mapping between the CSA CCM and the NIST 800-53 R4 Moderate Baseline. The document aims ...

Request to download
CSA CCM v3.0.1 Addendum - AICPA TSC 2017

CSA CCM v3.0.1 Addendum - AICPA TSC 2017

Release Date: 08/03/2019

This document is an addendum to the CCM V3.0.1 that contain controls mapping between the CSA CCM and the AICPA TSC 2017. The document aims to help AICPA TSC ...

Request to download
CCM v3.0.1-080319

CCM v3.0.1-080319

Release Date: 08/03/2019

The CCM, the only meta-framework of cloud-specific security controls, mapped to leading standards, best practices and regulations. CCM provides organizations...

Request to download
Information Security Management through Reflexive Security

Information Security Management through Reflexive Security

Release Date: 08/01/2019

This document defines “Reflexive Security” as a new security management approach that is built upon the interrelationships between security, development and ...

Request to download
Documentation of Relevant Distributed Ledger Technology and Blockchain Use Cases v2

Documentation of Relevant Distributed Ledger Technology and Blockchain Use Cases v2

Release Date: 07/31/2019

Thanks to the rise in popularity of Bitcoin cryptocurrency, the innovative technologies of Blockchain and other systems of distributed ledger technology (DLT...

Request to download