CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
AI in Medical Research: Applications & Considerations Release Date: 09/25/2024 The advent of artificial intelligence (AI) has brought about a paradigm shift in numerous fields. AI technologies can process vast amounts of data, recogn... Request to download | |
Don’t Panic! Getting Real about AI Governance Release Date: 09/18/2024 The excitement around Generative AI and its potential business value continues to grow. A major factor is AI systems' emerging capability to mimic human-l... Request to download | |
Zero Trust Guiding Principles v1.1 Release Date: 09/03/2024 Zero Trust is a strategic mindset that is highly useful for organizations to adopt as part of their digital transformations. Based on the idea of "never t... Request to download | |
![]() | Data Privacy Engineering Working Group Charter 2024 Release Date: 08/29/2024 The Data Privacy Engineering Working Group (DPE WG) is chartered with the mission to integrate privacy-centric methodologies into development workflows, a... Request to download |
![]() | Fully Homomorphic Encryption Working Group Charter 2024 Release Date: 08/29/2024 Through the use and deployment of cryptographic libraries, specialist software toolchains, and dedicated hardware and infrastructure, Fully Homomorphic En... Request to download |
Using AI for Offensive Security Release Date: 08/06/2024 Offensive security involves proactively simulating an attacker’s behavior by using tactics and techniques similar to those of an adversary to identify sys... Request to download | |
Top Threats to Cloud Computing 2024 Release Date: 08/05/2024 The CSA Top Threats Report aims to raise awareness of current cloud security risks, threats, and vulnerabilities. In this 2024 installment, we surveyed ov... Request to download | |
Quantum-Safe Security Governance with the Cloud Controls Matrix Release Date: 07/30/2024 For the last decade or so there have been major developments in the quantum and post-quantum cryptography spaces. The time has come for enterprise IT depa... Request to download | |
![]() | AI Model Risk Management Framework Release Date: 07/23/2024 Sophisticated machine learning (ML) models present exciting opportunities in fields such as predictive maintenance and smart supply chain management. Whil... Request to download |
Enterprise Authority To Operate (EATO) Controls Framework Release Date: 07/02/2024 Many small and mid-sized cloud-based Anything-as-a-Service (XaaS) vendors struggle to implement robust information security controls. These security gaps ... Request to download | |
CSA Large Language Model (LLM) Threats Taxonomy Release Date: 06/10/2024 This document aims to align the industry by defining key terms related to Large Language Model (LLM) risks and threats. Establishing a common language red... Request to download | |
Release Date: 06/04/2024 The Cloud Security Alliance, in collaboration with the CCM Working Group, proudly presents the CCM-Lite and CAIQ-Lite File Bundle. These tools offer a str... Request to download | |
The Annual SaaS Security Survey Report 2025 Plans and Priorities Release Date: 06/03/2024 In 2024, Software-as-a-Service (SaaS) platforms are integral to most businesses. Unfortunately, inventive threat actors regularly breach SaaS applications... Request to download | |
![]() | CCM v4.0 Implementation Guidelines Release Date: 06/03/2024 This document will help you understand how to navigate through the Cloud Controls Matrix v4 to use it effectively and interpret and implement the CCM cont... Request to download |
CCM Machine Readable Bundle (JSON/YAML/OSCAL) Release Date: 06/03/2024 CSA provides in a machine-readable format the CCM Controls, CAIQ Security Questionnaire, Implementation Guidelines (both JSON/YAML and OSCAL) and Mappings... Request to download | |
![]() | Identity and Access Management Working Group Charter 2024 Release Date: 06/01/2024 Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using Identity Access Management (IAM)... Request to download |
Information Technology Governance, Risk, and Compliance in Healthcare v2 Release Date: 05/28/2024 Healthcare organizations are increasingly using cloud services. However, the transition to the cloud presents many Governance, Risk, and Compliance (GRC) ... Request to download | |
![]() | The Six Pillars of DevSecOps: Measure, Monitor, Report, and Action Release Date: 05/14/2024 The implementation and maintenance of DevSecOps initiatives can take anywhere from a few months to several years to implement. Therefore, continuous measu... Request to download |
Release Date: 05/06/2024 Shadow Access, a growing concern within cloud computing and Identity and Access Management (IAM), refers to unintended, unauthorized access to systems and... Request to download | |
AI Organizational Responsibilities - Core Security Responsibilities Release Date: 05/05/2024 This publication from the CSA AI Organizational Responsibilities Working Group provides a blueprint for enterprises to fulfill their core information secu... Request to download |
%20Charter%202024-01.png)




