CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Streamlining Vendor IT Security and Risk Assessments Release Date: 12/09/2018 Cloud computing has rapidly gained traction as a significant and even default IT system for many different organizations. In such a dynamic environment, cybe... Request to download |
![]() | Release Date: 11/27/2018 Thanks to the rise in popularity of Bitcoin cryptocurrency, the innovative technologies of Blockchain and other systems of distributed ledger technology (DLT... Request to download |
Release Date: 11/24/2018 The use of new technologies, such as cloud services and the Internet of Things (IoT), will disrupt legacy systems and the chain of data processing in the sup... Request to download | |
![]() | Security Guidance v4.0 Info Sheet Release Date: 11/09/2018 This version, the first major update since 2011, is the culmination of over a year of dedicated research and public participation from the CSA community, wor... Request to download |
![]() | Release Date: 09/20/2018 The traditional approach to updating software for IT assets involves analysis, staging and distribution of the update—a process that usually occurs during of... Request to download |
![]() | Top Threats to Cloud Computing: Deep Dive Release Date: 08/08/2018 This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its foundation. Each... Request to download |
![]() | OWASP Secure Medical Devices Deployment Standard Release Date: 08/07/2018 With the explosion of botnets and other malware that now target IoT devices (of which medical devices can be considered a subtype) the need for security-min... Request to download |
![]() | Release Date: 07/09/2018 The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) provides fundamental security principles to guide cloud vendors and cloud customers seeking to ... Request to download |
![]() | Firmware Integrity in the Cloud Data Center Release Date: 06/12/2018 This paper presents the point of view from key stakeholders in datacenter development regarding how to build cloud infrastructure using secure servers and in... Request to download |
![]() | Software Defined Perimeter Glossary Release Date: 06/12/2018 The Software Defined Perimeter (SDP) Glossary is a reference document that brings together SDP related terms and definitions from various professional resour... Request to download |
![]() | The State of Post-Quantum Cryptography Release Date: 05/23/2018 Most people pay little attention to the lock icon on their browser’s address bar that signifies a secure connection called HTTPS. This connection establishes... Request to download |
![]() | Justify Your Investment in CCSK Training Release Date: 05/02/2018 The Certificate of Cloud Security Knowledge (CCSK) Foundation class provides students a comprehensive review of cloud security fundamentals and a detailed de... Request to download |
![]() | A Day Without Safe Cryptography Release Date: 04/19/2018 Over the past fifty years, the digital age has sparked the creation of a remarkable infrastructure through which a nearly infinite variety of digital transac... Request to download |
![]() | GDPR Preparation and Awareness Survey Report Release Date: 04/17/2018 Cloud computing, the Internet of Things, Artificial Intelligence, and other new technologies allow businesses to have better customer engagement, more access... Request to download |
![]() | Best Practices for Cyber Incident Exchange Release Date: 04/16/2018 No organization is immune from cyber attack. Malicious actors collaborate with skill and agility, effectively moving from target to target at a breakneck pac... Request to download |
![]() | Release Date: 04/16/2018 Innovators and early adopters have been using cloud for years taking advantage of the quicker deployment, greater scalability, and cost saving of services. T... Request to download |
![]() | Using Blockchain Technology to Secure the Internet of Things Release Date: 02/13/2018 In the last four years, technical experts, chief digital officers, marketing managers, journalists, bloggers and research institutions have discussed and pro... Request to download |
![]() | The State of Enterprise Resource Planning Security in the Cloud Release Date: 02/07/2018 The State of ERP Security in the Cloud briefly highlights some of the issues and challenges of migrating ERP solutions to the cloud. The document examines co... Request to download |
![]() | Quantum-Safe Security Awareness Survey Release Date: 01/26/2018 Quantum computing threatens the security of public key cryptography, which underlies our global digital communications infrastructure. While many significant... Request to download |
![]() | Blockchain/Distributed Ledger Working Group Glossary Release Date: 12/15/2017 Blockchain is a radical, evolving technology and there is little awareness or knowledge regarding security aspects or compliance implications among many t... Request to download |

















