CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Strengthening Research Integrity with High-Performance Computing (HPC) Security Release Date: 08/07/2024 High-Performance Computing (HPC) systems aggregate computing resources to gain performance greater than that of a single workstation. HPC systems have bec... Request to download | |
Top Threats to Cloud Computing Post Pandemic Eleven Survey Report Release Date: 08/05/2023 The CSA Top Threats Report aims to raise awareness of current cloud security risks, threats, and vulnerabilities. In this 2024 installment, we surveyed ov... Request to download | |
Securing LLM Backed Systems: Essential Authorization Practices Release Date: 08/13/2024 Organizations are increasingly leveraging Large Language Models (LLMs) to tackle diverse business problems. Both existing companies and a crop of new star... Request to download | |
![]() | Confidential Computing Working Group Charter 2024 Release Date: 09/10/2024 The working group is tasked with exploring and implementing Confidential Computing technologies to enhance data security across various industries. This g... Request to download |
Release Date: 03/11/2025 Shadow Access is undesired or unauthorized access to resources, such as applications, networks, and data. Shadow Access is increasingly a cloud issue, res... Request to download | |
![]() | CSA Code of Conduct to EU Cloud Code of Conduct Mapping Release Date: 03/24/2025 Navigating General Data Protection Regulation (GDPR) compliance requirements can be challenging. Fortunately, Codes of Conduct (CoCs) provide a straightfo... Request to download |
![]() | Top Threats Working Group Charter 2025 Release Date: 02/04/2025 The Top Threats Working Group aims to provide up-to-date, industry-informed expert insights on cloud security risks, threats, and vulnerabilities to help ... Request to download |
Understanding Data Security Risk Survey Report 2025 Release Date: 02/26/2025 Organizations face a rapidly changing threat landscape. The complexities of hybrid and multi-cloud environments are exposing new vulnerabilities and chall... Request to download | |
![]() | Cloud Security for Startups 2024 - Japanese Translation Release Date: 02/11/2025 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Release Date: 02/13/2025 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
The Six Pillars of DevSecOps Bundle Release Date: 03/10/2025 DevOps enhances the management of information security, but its execution must be secured to avoid vulnerabilities like lax firewall rules or default cred... Request to download | |
Dynamic Process Landscape: A Strategic Guide to Successful AI Implementation Release Date: 06/02/2025 Artificial Intelligence (AI) adoption in business and manufacturing is failing at least twice as often as it succeeds. Companies are trying to integrate A... Request to download | |
Zero Trust Automation & Orchestration and Visibility & Analytics Overview Release Date: 06/04/2025 Visibility & Analytics and Automation & Orchestration are foundational, cross-cutting capabilities within the Zero Trust paradigm. They enable con... Request to download | |
![]() | Cloud Key Management Working Group Charter 2025 Release Date: 03/18/2025 Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using key management systems with thos... Request to download |
State of SaaS Security Report 2025 Release Date: 04/21/2025 Software-as-a-Service (SaaS) applications have become foundational to modern business operations. However, organizations are also facing a rising tide of ... Request to download | |
![]() | Release Date: 06/20/2025 This document introduces Valid-AI-ted, CSA’s new AI-powered tool for evaluating STAR Level 1 self-assessments. Learn how the tool uses LLM technology to p... Request to download |
![]() | CAVEaT Working Group Charter 2025 Release Date: 06/26/2025 The Cloud Security Alliance (CSA), in collaboration with the MITRE Corporation, established the Cloud Adversarial Vectors, Exploits, and Threats (CAVEaT™)... Request to download |
![]() | Healthcare Confidential Computing and the Trusted Execution Environment Release Date: 07/14/2025 Healthcare Delivery Organizations (HDOs) routinely process Protected Health Information (PHI), Personally Identifiable Information (PII), and financial da... Request to download |
The State of Non-Human Identity Security Release Date: 09/11/2024 Non-human identities (NHIs) include bots, API keys, service accounts, OAuth tokens, and secrets. These identities keep today’s organizations running smoot... Request to download | |
![]() | Top Threats to Cloud Computing 2024 - Japanese Translation Release Date: 12/12/2024 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |

.png)






