CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Strengthening Research Integrity with High-Performance Computing (HPC) Security Release Date: 08/07/2024 High-Performance Computing (HPC) systems aggregate computing resources to gain performance greater than that of a single workstation. HPC systems have bec... Request to download | |
Using AI for Offensive Security Release Date: 08/06/2024 Offensive security involves proactively simulating an attacker’s behavior by using tactics and techniques similar to those of an adversary to identify sys... Request to download | |
Top Threats to Cloud Computing 2024 Release Date: 08/05/2024 The CSA Top Threats Report aims to raise awareness of current cloud security risks, threats, and vulnerabilities. In this 2024 installment, we surveyed ov... Request to download | |
Quantum-Safe Security Governance with the Cloud Controls Matrix Release Date: 07/30/2024 For the last decade or so there have been major developments in the quantum and post-quantum cryptography spaces. The time has come for enterprise IT depa... Request to download | |
![]() | AI Model Risk Management Framework Release Date: 07/23/2024 Sophisticated machine learning (ML) models present exciting opportunities in fields such as predictive maintenance and smart supply chain management. Whil... Request to download |
Enterprise Authority To Operate (EATO) Controls Framework Release Date: 07/02/2024 Many small and mid-sized cloud-based Anything-as-a-Service (XaaS) vendors struggle to implement robust information security controls. These security gaps ... Request to download | |
CSA Large Language Model (LLM) Threats Taxonomy Release Date: 06/10/2024 This document aims to align the industry by defining key terms related to Large Language Model (LLM) risks and threats. Establishing a common language red... Request to download | |
Release Date: 06/04/2024 The Cloud Security Alliance, in collaboration with the CCM Working Group, proudly presents the CCM-Lite and CAIQ-Lite File Bundle. These tools offer a str... Request to download | |
The Annual SaaS Security Survey Report 2025 Plans and Priorities Release Date: 06/03/2024 In 2024, Software-as-a-Service (SaaS) platforms are integral to most businesses. Unfortunately, inventive threat actors regularly breach SaaS applications... Request to download | |
![]() | CCM v4.0 Implementation Guidelines Release Date: 06/03/2024 This document will help you understand how to navigate through the Cloud Controls Matrix v4 to use it effectively and interpret and implement the CCM cont... Request to download |
Cloud Controls Matrix and CAIQ v4 Release Date: 06/03/2024 The Cloud Controls Matrix (CCM) is a cybersecurity control framework for cloud computing aligned to the CSA best practices, that is considered the de-facto s... Request to download | |
CCM Machine Readable Bundle (JSON/YAML/OSCAL) Release Date: 06/03/2024 CSA provides in a machine-readable format the CCM Controls, CAIQ Security Questionnaire, Implementation Guidelines (both JSON/YAML and OSCAL) and Mappings... Request to download | |
![]() | Identity and Access Management Working Group Charter 2024 Release Date: 06/01/2024 Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using Identity Access Management (IAM)... Request to download |
Information Technology Governance, Risk, and Compliance in Healthcare v2 Release Date: 05/28/2024 Healthcare organizations are increasingly using cloud services. However, the transition to the cloud presents many Governance, Risk, and Compliance (GRC) ... Request to download | |
![]() | The Six Pillars of DevSecOps: Measure, Monitor, Report, and Action Release Date: 05/14/2024 The implementation and maintenance of DevSecOps initiatives can take anywhere from a few months to several years to implement. Therefore, continuous measu... Request to download |
Release Date: 05/06/2024 Shadow Access, a growing concern within cloud computing and Identity and Access Management (IAM), refers to unintended, unauthorized access to systems and... Request to download | |
AI Organizational Responsibilities - Core Security Responsibilities Release Date: 05/05/2024 This publication from the CSA AI Organizational Responsibilities Working Group provides a blueprint for enterprises to fulfill their core information secu... Request to download | |
AI Resilience: A Revolutionary Benchmarking Model for AI Safety Release Date: 05/05/2024 The rapid evolution of Artificial Intelligence (AI) promises unprecedented advances. However, as AI systems become increasingly sophisticated, they also p... Request to download | |
Principles to Practice: Responsible AI in a Dynamic Regulatory Environment Release Date: 05/05/2024 Artificial Intelligence (AI) innovation is not expected to slow down any time soon, as the big tech giants plan to invest hundreds of billions of dollars ... Request to download | |
HSM-as-a-Service Use Cases, Considerations, and Best Practices Release Date: 04/03/2024 A Hardware Security Module (HSM) is a certified, trusted platform for performing cryptographic operations and protecting keys. It is a tamper-responsive a... Request to download |



