ChaptersEventsBlog
Card testing is hitting revenue, not just fraud. What should payment companies do now? Register for this March 10 webinar →

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Streamlining Vendor IT Security and Risk Assessments

Streamlining Vendor IT Security and Risk Assessments

Release Date: 12/09/2018

Cloud computing has rapidly gained traction as a significant and even default IT system for many different organizations. In such a dynamic environment, cybe...

Request to download
Blockchain DLT Use Cases

Blockchain DLT Use Cases

Release Date: 11/27/2018

Thanks to the rise in popularity of Bitcoin cryptocurrency, the innovative technologies of Blockchain and other systems of distributed ledger technology (DLT...

Request to download
HIM Working Group Charter

HIM Working Group Charter

Release Date: 11/24/2018

The use of new technologies, such as cloud services and the Internet of Things (IoT), will disrupt legacy systems and the chain of data processing in the sup...

Request to download
Security Guidance v4.0 Info Sheet

Security Guidance v4.0 Info Sheet

Release Date: 11/09/2018

This version, the first major update since 2011, is the culmination of over a year of dedicated research and public participation from the CSA community, wor...

Request to download
IoT Firmware Update Processes

IoT Firmware Update Processes

Release Date: 09/20/2018

The traditional approach to updating software for IT assets involves analysis, staging and distribution of the update—a process that usually occurs during of...

Request to download
Top Threats to Cloud Computing: Deep Dive

Top Threats to Cloud Computing: Deep Dive

Release Date: 08/08/2018

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its foundation. Each...

Request to download
OWASP Secure Medical Devices Deployment Standard

OWASP Secure Medical Devices Deployment Standard

Release Date: 08/07/2018

With the explosion of botnets and other malware that now target IoT devices (of which medical devices can be considered a subtype) the need for security-min...

Request to download
CCM Mapping Methodology

CCM Mapping Methodology

Release Date: 07/09/2018

The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) provides fundamental security principles to guide cloud vendors and cloud customers seeking to ...

Request to download
Firmware Integrity in the Cloud Data Center

Firmware Integrity in the Cloud Data Center

Release Date: 06/12/2018

This paper presents the point of view from key stakeholders in datacenter development regarding how to build cloud infrastructure using secure servers and in...

Request to download
Software Defined Perimeter Glossary

Software Defined Perimeter Glossary

Release Date: 06/12/2018

The Software Defined Perimeter (SDP) Glossary is a reference document that brings together SDP related terms and definitions from various professional resour...

Request to download
The State of Post-Quantum Cryptography

The State of Post-Quantum Cryptography

Release Date: 05/23/2018

Most people pay little attention to the lock icon on their browser’s address bar that signifies a secure connection called HTTPS. This connection establishes...

Request to download
Justify Your Investment in CCSK Training

Justify Your Investment in CCSK Training

Release Date: 05/02/2018

The Certificate of Cloud Security Knowledge (CCSK) Foundation class provides students a comprehensive review of cloud security fundamentals and a detailed de...

Request to download
A Day Without Safe Cryptography

A Day Without Safe Cryptography

Release Date: 04/19/2018

Over the past fifty years, the digital age has sparked the creation of a remarkable infrastructure through which a nearly infinite variety of digital transac...

Request to download
GDPR Preparation and Awareness Survey Report

GDPR Preparation and Awareness Survey Report

Release Date: 04/17/2018

Cloud computing, the Internet of Things, Artificial Intelligence, and other new technologies allow businesses to have better customer engagement, more access...

Request to download
Best Practices for Cyber Incident Exchange

Best Practices for Cyber Incident Exchange

Release Date: 04/16/2018

No organization is immune from cyber attack. Malicious actors collaborate with skill and agility, effectively moving from target to target at a breakneck pac...

Request to download
State of Cloud Report

State of Cloud Report

Release Date: 04/16/2018

Innovators and early adopters have been using cloud for years taking advantage of the quicker deployment, greater scalability, and cost saving of services. T...

Request to download
Using Blockchain Technology to Secure the Internet of Things

Using Blockchain Technology to Secure the Internet of Things

Release Date: 02/13/2018

In the last four years, technical experts, chief digital officers, marketing managers, journalists, bloggers and research institutions have discussed and pro...

Request to download
The State of Enterprise Resource Planning Security in the Cloud

The State of Enterprise Resource Planning Security in the Cloud

Release Date: 02/07/2018

The State of ERP Security in the Cloud briefly highlights some of the issues and challenges of migrating ERP solutions to the cloud. The document examines co...

Request to download
Quantum-Safe Security Awareness Survey

Quantum-Safe Security Awareness Survey

Release Date: 01/26/2018

Quantum computing threatens the security of public key cryptography, which underlies our global digital communications infrastructure. While many significant...

Request to download
Blockchain/Distributed Ledger Working Group Glossary

Blockchain/Distributed Ledger Working Group Glossary

Release Date: 12/15/2017

Blockchain is a radical, evolving technology and there is little awareness or knowledge regarding security aspects or compliance implications among many t...

Request to download