CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Defining the Zero Trust Protect Surface Release Date: 03/05/2024 Enterprise adoption and implementation of Zero Trust is broad and growing. Venture Beat reports that 90% of organizations moving to the cloud are adopting... Request to download |
![]() | The Six Pillars of DevSecOps - Collaboration and Integration Release Date: 02/20/2024 “Security can only be achieved through collaboration, not confrontation” is one of the defining principles of DevSecOps. Essentially, security is a team s... Request to download |
![]() | The State of Security Remediation 2024 Release Date: 02/13/2024 Security remediation involves identifying, evaluating, and addressing security vulnerabilities to mitigate potential risks. In the ever-evolving landscape... Request to download |
![]() | CCM v4.0 Addendum - ECUC PP v2.1 Release Date: 02/12/2024 This document is an addendum to the 'ECUC Position Paper v2.1 (ECUC PP v2.1) that contains controls mapping between the CSA CCM v4.0 and the ECUC PPv2.1. ... Request to download |
![]() | Top Threats Working Group Charter 2024 Release Date: 02/01/2024 The Top Threats Working Group aims to provide up-to-date, industry-informed expert insights on cloud security risks, threats, and vulnerabilities to help ... Request to download |
![]() | Health Information Management Working Group Charter 2024 Release Date: 01/31/2024 The Health Information Management Working Group aims to directly influence how health information service providers deliver secure cloud solutions (servic... Request to download |
![]() | Release Date: 01/22/2024 This CSA Data Security Glossary identifies and defines 127 terms relevant to data security. Based on the CSA Cloud Security Glossary, NIST Glossary, and o... Request to download |
![]() | DLT Cybersecurity Maturity Core Framework v1.0 Release Date: 01/22/2024 The “DLT Risk Mitigation Model Tool” is designed to assist organizations in crafting a tailored risk mitigation strategy based on their unique risk appeti... Request to download |
![]() | Key Management Lifecycle Best Practices Release Date: 12/19/2023 Cryptographic keys are essential for securing digital assets, yet managing these keys can be challenging for organizations that run applications in the cl... Request to download |
![]() | Communicating the Business Value of Zero Trust Release Date: 12/18/2023 Zero Trust is a major industry trend that is being adopted and promoted by security teams around the globe, and for good reason - it delivers improved sec... Request to download |
![]() | Release Date: 11/20/2023 An array of threat-based cybersecurity models and associated knowledge bases exist to inform cloud security practitioners. However, the rapid development ... Request to download |
![]() | Beyond Passwords: The Role of Passkeys in Modern Web Security Release Date: 11/12/2023 Web authentication methods have evolved significantly over the years to improve security and the user experience. In the early days of the internet, usern... Request to download |
![]() | How to Design a Secure Serverless Architecture Release Date: 10/23/2023 As businesses work to bring technology value to market faster, serverless computing is gaining adoption with developers. Serverless platforms enable devel... Request to download |
![]() | Top Threats to Cloud Computing: Pandemic 11 Deep Dive Release Date: 10/17/2023 This publication reflects on eight recent cloud breach cases, presented as both a detailed narrative and a threat model. The threat model format provides ... Request to download |
![]() | Data Loss Prevention in Healthcare Release Date: 10/04/2023 The rise of digital services in healthcare has made protecting medical data an ongoing challenge. Data loss may occur in several forms, including informat... Request to download |
![]() | STAR Attestation Value Proposition Release Date: 10/03/2023 Request to download |
![]() | Machine Identity in Cybersecurity and IAM Release Date: 09/19/2023 Identity management is a crucial aspect of information security, as it ensures that only authorized individuals and entities have access to sensitive data... Request to download |
![]() | Defining Shadow Access: The Emerging IAM Security Challenge Release Date: 09/12/2023 Shadow Access is unmonitored, unauthorized, invisible, unsafe, and generally over-permissioned cloud access. This emerging Identity and Access Management ... Request to download |
![]() | Guidelines for CPAs Providing CSA STAR Attestation v4 Release Date: 09/07/2023 This document provides guidance for CPAs in conducting a STAR Attestation. It includes relevant information including professional requirements, competenc... Request to download |
![]() | Release Date: 08/31/2023 The CSA Security, Trust, Assurance, and Risk (STAR) program is the most complete and largest cloud assurance program in the world that constitutes an ecos... Request to download |