CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Release Date: 10/19/2016 As a follow up to the Top Threats in Cloud Computing and from the months of May to July 2016 we surveyed approximately 100 professionals on the extent of the... Request to download |
![]() | Future Proofing the Connected World Release Date: 10/07/2016 An IoT system is only as secure as its weakest link, this document is our attempt at providing actionable and useful guidance for securing the individual pro... Request to download |
![]() | Big Data Security and Privacy Handbook Release Date: 08/26/2016 The term “big data” refers to the massive amounts of digital information companies and governments collect about human beings and our environment. This Cloud... Request to download |
![]() | Release Date: 08/17/2016 With several years of cloud adoption in organizations, approaches to security have been evolving rapidly. To dig deeper into these concerns and the controls ... Request to download |
![]() | Release Date: 07/15/2016 Request to download |
![]() | Mobile Application Security Testing Release Date: 06/30/2016 The Mobile Application Security Testing (MAST) Initiative is a research which aims to help organizations and individuals reduce the possible risk exposures a... Request to download |
![]() | Quantum Random Number Generators Release Date: 06/09/2016 A random number is generated by a process whose outcome is unpredictable, and which cannot be reliably reproduced. Randomness, quantitatively measured by ent... Request to download |
![]() | Release Date: 04/19/2016 The goal of the Identity Solutions: Security Beyond the Perimeter survey was to address Insufficient Identity, Credential, and Access Management and gain a b... Request to download |
![]() | CSA STAR Program & Open Certification Framework in 2016 and Beyond Release Date: 04/12/2016 The Cloud Security Alliance (CSA) Security, Trust and Assurance Registry (STAR) program is the industry’s leading trust mark for cloud security. The CSA Open... Request to download |
![]() | Mobile Application Security Testing Initiative Revised Charter Release Date: 03/14/2016 Mobile applications are becoming an integral part of not just modern enterprises but also of human existence and a huge part of this shift is due to the emer... Request to download |
![]() | Security as a Service Implementation Guidance (Categories 1-10) Release Date: 03/01/2016 In order to improve the understanding of Security as a Service and accelerate market acceptance, clear categorization and definitions of security services... Request to download |
![]() | Defining Categories of Security as a Service: Continuous Monitoring Release Date: 02/29/2016 In order to improve the understanding of Security as a Service and accelerate market acceptance, clear categorization and definitions of these services is ne... Request to download |
![]() | ‘The Treacherous Twelve’ Cloud Computing Top Threats in 2016 Release Date: 02/29/2016 “The Treacherous 12 - Cloud Computing Top Threats in 2016” plays a crucial role in the CSA research ecosystem. The purpose of the report is to provide organi... Request to download |
![]() | Security Position Paper - Network Function Virtualization Release Date: 02/29/2016 This white paper discusses some of the potential security issues and concerns, and offers guidance for securing a Virtual Network Function (NFV) based archit... Request to download |
![]() | Release Date: 02/27/2016 Cloud computing is an incredible innovation. While at its heart a simple concept, the packaging of compute resources as an on demand service is having a fund... Request to download |
![]() | Consensus Assessments Initiative Questionnaire v3.0.1 (12-5-16 Update) Release Date: 02/01/2016 There is a new version of CAIQ available. The latest version has been combined with the Cloud Controls Matrix. Realigns the CAIQ questions to CCM v3.0.1 co... Request to download |
![]() | The Cloud Balancing Act for IT: Between Promise and Peril Release Date: 01/13/2016 Cloud Adoption does not have to mean opening up your organization to increased security risks and threats if the right policies are in place. That’s what the... Request to download |
![]() | CloudTrust Protocol Prototype Source Code Release Date: 12/10/2015 The Cloud Trust Protocol (CTP) is designed to be a mechanism by which cloud service customers can ask for and receive information related to the security of ... Request to download |
![]() | Guidelines for Safe Smart Cities Release Date: 11/15/2015 Interest in the smart city concept has grown continuously over the past few years, with the top research being done in the Internet of Things (IoT) and urban... Request to download |
![]() | International Standardization Council Policies & Procedures Release Date: 10/15/2015 In today’s technological environment, standards play a critical role in product development and market competitiveness. Every input, behavior, and action has... Request to download |