ChaptersEventsBlog
Card testing is hitting revenue, not just fraud. What should payment companies do now? Register for this March 10 webinar →

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Re-Think Security

Re-Think Security

Release Date: 07/15/2016

Request to download
Mobile Application Security Testing

Mobile Application Security Testing

Release Date: 06/30/2016

The Mobile Application Security Testing (MAST) Initiative is a research which aims to help organizations and individuals reduce the possible risk exposures a...

Request to download
Quantum Random Number Generators

Quantum Random Number Generators

Release Date: 06/09/2016

A random number is generated by a process whose outcome is unpredictable, and which cannot be reliably reproduced. Randomness, quantitatively measured by ent...

Request to download
Identity Security

Identity Security

Release Date: 04/19/2016

The goal of the Identity Solutions: Security Beyond the Perimeter survey was to address Insufficient Identity, Credential, and Access Management and gain a b...

Request to download
CSA STAR Program & Open Certification Framework in 2016 and Beyond

CSA STAR Program & Open Certification Framework in 2016 and Beyond

Release Date: 04/12/2016

The Cloud Security Alliance (CSA) Security, Trust and Assurance Registry (STAR) program is the industry’s leading trust mark for cloud security. The CSA Open...

Request to download
Mobile Application Security Testing Initiative Revised Charter

Mobile Application Security Testing Initiative Revised Charter

Release Date: 03/14/2016

Mobile applications are becoming an integral part of not just modern enterprises but also of human existence and a huge part of this shift is due to the emer...

Request to download
Security as a Service Implementation Guidance (Categories 1-10)

Security as a Service Implementation Guidance (Categories 1-10)

Release Date: 03/01/2016

In order to improve the understanding of Security as a Service and accelerate market acceptance, clear categorization and definitions of security services...

Request to download
Defining Categories of Security as a Service: Continuous Monitoring

Defining Categories of Security as a Service: Continuous Monitoring

Release Date: 02/29/2016

In order to improve the understanding of Security as a Service and accelerate market acceptance, clear categorization and definitions of these services is ne...

Request to download
‘The Treacherous Twelve’ Cloud Computing Top Threats in 2016

‘The Treacherous Twelve’ Cloud Computing Top Threats in 2016

Release Date: 02/29/2016

“The Treacherous 12 - Cloud Computing Top Threats in 2016” plays a crucial role in the CSA research ecosystem. The purpose of the report is to provide organi...

Request to download
Security Position Paper - Network Function Virtualization

Security Position Paper - Network Function Virtualization

Release Date: 02/29/2016

This white paper discusses some of the potential security issues and concerns, and offers guidance for securing a Virtual Network Function (NFV) based archit...

Request to download
State of Cloud Security 2016

State of Cloud Security 2016

Release Date: 02/27/2016

Cloud computing is an incredible innovation. While at its heart a simple concept, the packaging of compute resources as an on demand service is having a fund...

Request to download
Consensus Assessments Initiative Questionnaire v3.0.1 (12-5-16 Update)

Consensus Assessments Initiative Questionnaire v3.0.1 (12-5-16 Update)

Release Date: 02/01/2016

There is a new version of CAIQ available. The latest version has been combined with the Cloud Controls Matrix. Realigns the CAIQ questions to CCM v3.0.1 co...

Request to download
The Cloud Balancing Act for IT: Between Promise and Peril

The Cloud Balancing Act for IT: Between Promise and Peril

Release Date: 01/13/2016

Cloud Adoption does not have to mean opening up your organization to increased security risks and threats if the right policies are in place. That’s what the...

Request to download
CloudTrust Protocol Prototype Source Code

CloudTrust Protocol Prototype Source Code

Release Date: 12/10/2015

The Cloud Trust Protocol (CTP) is designed to be a mechanism by which cloud service customers can ask for and receive information related to the security of ...

Request to download
Guidelines for Safe Smart Cities

Guidelines for Safe Smart Cities

Release Date: 11/15/2015

Interest in the smart city concept has grown continuously over the past few years, with the top research being done in the Internet of Things (IoT) and urban...

Request to download
International Standardization Council Policies & Procedures

International Standardization Council Policies & Procedures

Release Date: 10/15/2015

In today’s technological environment, standards play a critical role in product development and market competitiveness. Every input, behavior, and action has...

Request to download
Cloud Forensics Capability Maturity Model

Cloud Forensics Capability Maturity Model

Release Date: 10/12/2015

Request to download
CloudTrust Protocol Data Model and API

CloudTrust Protocol Data Model and API

Release Date: 10/09/2015

The Cloud Trust Protocol (CTP) is designed to be a mechanism by which cloud service customers can ask for and receive information related to the security of ...

Request to download
Identity and Access Management for the Internet of Things

Identity and Access Management for the Internet of Things

Release Date: 09/28/2015

This document is the first in a series of summary guidance aimed at providing easily understandable recommendations to information technology staff charged w...

Request to download
What is Post-Quantum Cryptography

What is Post-Quantum Cryptography

Release Date: 09/28/2015

Most people pay little attention to the lock icon on their browser address bar that signifies a secure HTTPS connection. They don’t realize that there is an ...

Request to download