CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Top Concerns With Vulnerability Data Release Date: 11/11/2024 The top vulnerability management frameworks used today include the Common Vulnerabilities and Exposures (CVE) program and the Common Vulnerability Scoring... Request to download | |
Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives Release Date: 11/05/2024 This publication explores the use of asymmetric cryptography in Zero Trust. Asymmetric cryptography provides an industry-standard, secure method to establ... Request to download | |
![]() | The State of Multi-Cloud Identity Survey Release Date: 10/29/2024 Enterprises encounter significant obstacles when adopting multi-cloud. Namely, harmonizing hybrid and cloud identity systems for secure integration. Ident... Request to download |
![]() | Zero Trust Guidance for Critical Infrastructure Release Date: 10/28/2024 In most nations, the health of public services relies on secure and resilient Critical Infrastructure. We call these infrastructures "critical" because th... Request to download |
The State of Non-Human Identity Security Release Date: 09/11/2024 Non-human identities (NHIs) include bots, API keys, service accounts, OAuth tokens, and secrets. These identities keep today’s organizations running smoot... Request to download | |
![]() | Confidential Computing Working Group Charter 2024 Release Date: 09/10/2024 The working group is tasked with exploring and implementing Confidential Computing technologies to enhance data security across various industries. This g... Request to download |
Zero Trust Guiding Principles v1.1 Release Date: 09/03/2024 Zero Trust is a strategic mindset that is highly useful for organizations to adopt as part of their digital transformations. Based on the idea of "never t... Request to download | |
Strengthening Research Integrity with High-Performance Computing (HPC) Security Release Date: 08/07/2024 High-Performance Computing (HPC) systems aggregate computing resources to gain performance greater than that of a single workstation. HPC systems have bec... Request to download | |
Top Threats to Cloud Computing 2024 Release Date: 08/05/2024 The CSA Top Threats Report aims to raise awareness of current cloud security risks, threats, and vulnerabilities. In this 2024 installment, we surveyed ov... Request to download | |
Quantum-Safe Security Governance with the Cloud Controls Matrix Release Date: 07/30/2024 For the last decade or so there have been major developments in the quantum and post-quantum cryptography spaces. The time has come for enterprise IT depa... Request to download | |
Enterprise Authority To Operate (EATO) Controls Framework Release Date: 07/02/2024 Many small and mid-sized cloud-based Anything-as-a-Service (XaaS) vendors struggle to implement robust information security controls. These security gaps ... Request to download | |
![]() | CCM v4.0 Implementation Guidelines Release Date: 06/03/2024 This document will help you understand how to navigate through the Cloud Controls Matrix v4 to use it effectively and interpret and implement the CCM cont... Request to download |
Cloud Controls Matrix and CAIQ v4 Release Date: 06/03/2024 The Cloud Controls Matrix (CCM) is a cybersecurity control framework for cloud computing aligned to the CSA best practices, that is considered the de-facto s... Request to download | |
![]() | Identity and Access Management Working Group Charter 2024 Release Date: 06/01/2024 Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using Identity Access Management (IAM)... Request to download |
Information Technology Governance, Risk, and Compliance in Healthcare v2 Release Date: 05/28/2024 Healthcare organizations are increasingly using cloud services. However, the transition to the cloud presents many Governance, Risk, and Compliance (GRC) ... Request to download | |
![]() | The Six Pillars of DevSecOps: Measure, Monitor, Report, and Action Release Date: 05/14/2024 The implementation and maintenance of DevSecOps initiatives can take anywhere from a few months to several years to implement. Therefore, continuous measu... Request to download |
HSM-as-a-Service Use Cases, Considerations, and Best Practices Release Date: 04/03/2024 A Hardware Security Module (HSM) is a certified, trusted platform for performing cryptographic operations and protecting keys. It is a tamper-responsive a... Request to download | |
![]() | Defining the Zero Trust Protect Surface Release Date: 03/05/2024 Enterprise adoption and implementation of Zero Trust is broad and growing. Venture Beat reports that 90% of organizations moving to the cloud are adopting... Request to download |
The Six Pillars of DevSecOps - Collaboration and Integration Release Date: 02/20/2024 “Security can only be achieved through collaboration, not confrontation” is one of the defining principles of DevSecOps. Essentially, security is a team s... Request to download | |
The State of Security Remediation 2024 Release Date: 02/13/2024 Security remediation involves identifying, evaluating, and addressing security vulnerabilities to mitigate potential risks. In the ever-evolving landscape... Request to download |






