ChaptersEventsBlog
Get 50% Off TAISE for Yourself and We'll Donate a Second Course to a Future AI Leader
Research Publications currently filtered by Locale.
×

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

CSA Data Security Glossary

CSA Data Security Glossary

Release Date: 01/22/2024

This CSA Data Security Glossary identifies and defines 127 terms relevant to data security. Based on the CSA Cloud Security Glossary, NIST Glossary, and o...

Request to download
DLT Cybersecurity Maturity Core Framework v1.0

DLT Cybersecurity Maturity Core Framework v1.0

Release Date: 01/22/2024

The “DLT Risk Mitigation Model Tool” is designed to assist organizations in crafting a tailored risk mitigation strategy based on their unique risk appeti...

Request to download
Key Management Lifecycle Best Practices

Key Management Lifecycle Best Practices

Release Date: 12/19/2023

Cryptographic keys are essential for securing digital assets, yet managing these keys can be challenging for organizations that run applications in the cl...

Request to download
Communicating the Business Value of Zero Trust

Communicating the Business Value of Zero Trust

Release Date: 12/18/2023

Zero Trust is a major industry trend that is being adopted and promoted by security teams around the globe, and for good reason - it delivers improved sec...

Request to download
Cloud Adversarial Vectors, Exploits, and Threats (CAVEaT™): An Emerging Threat Matrix for Industry Collaboration

Cloud Adversarial Vectors, Exploits, and Threats (CAVEaT™): An Emerging Threat Matrix for Industry Collaboration

Release Date: 11/20/2023

An array of threat-based cybersecurity models and associated knowledge bases exist to inform cloud security practitioners. However, the rapid development ...

Request to download
Beyond Passwords: The Role of Passkeys in Modern Web Security

Beyond Passwords: The Role of Passkeys in Modern Web Security

Release Date: 11/12/2023

Web authentication methods have evolved significantly over the years to improve security and the user experience. In the early days of the internet, usern...

Request to download
How to Design a Secure Serverless Architecture

How to Design a Secure Serverless Architecture

Release Date: 10/23/2023

As businesses work to bring technology value to market faster, serverless computing is gaining adoption with developers. Serverless platforms enable devel...

Request to download
Top Threats to Cloud Computing: Pandemic 11 Deep Dive

Top Threats to Cloud Computing: Pandemic 11 Deep Dive

Release Date: 10/17/2023

This publication reflects on eight recent cloud breach cases, presented as both a detailed narrative and a threat model. The threat model format provides ...

Request to download
Data Loss Prevention in Healthcare

Data Loss Prevention in Healthcare

Release Date: 10/04/2023

The rise of digital services in healthcare has made protecting medical data an ongoing challenge. Data loss may occur in several forms, including informat...

Request to download
STAR Attestation Value Proposition

STAR Attestation Value Proposition

Release Date: 10/03/2023

Request to download
Machine Identity in Cybersecurity and IAM

Machine Identity in Cybersecurity and IAM

Release Date: 09/19/2023

Identity management is a crucial aspect of information security, as it ensures that only authorized individuals and entities have access to sensitive data...

Request to download
Defining Shadow Access: The Emerging IAM Security Challenge

Defining Shadow Access: The Emerging IAM Security Challenge

Release Date: 09/12/2023

Shadow Access is unmonitored, unauthorized, invisible, unsafe, and generally over-permissioned cloud access. This emerging Identity and Access Management ...

Request to download
Guidelines for CPAs Providing CSA STAR Attestation v4

Guidelines for CPAs Providing CSA STAR Attestation v4

Release Date: 09/07/2023

This document provides guidance for CPAs in conducting a STAR Attestation. It includes relevant information including professional requirements, competenc...

Request to download
STAR Program Overview

STAR Program Overview

Release Date: 08/31/2023

The CSA Security, Trust, Assurance, and Risk (STAR) program is the most complete and largest cloud assurance program in the world that constitutes an ecos...

Request to download
FaaS Serverless Control Framework (Set) based on NIST 800-53 R5 controls

FaaS Serverless Control Framework (Set) based on NIST 800-53 R5 controls

Release Date: 08/30/2023

This spreadsheet provides a cybersecurity control framework for Function-as-a-Service (FaaS) serverless deployments. The framework is based on the NIST 80...

Request to download
Identity and Access Management Glossary

Identity and Access Management Glossary

Release Date: 08/29/2023

The Identity and Access Management (IAM) Glossary is a reference document that aggregates and summarizes IAM-related terms and definitions. Bringing toget...

Request to download
Data Security Working Group Charter 2023

Data Security Working Group Charter 2023

Release Date: 08/29/2023

The Data Security working group’s goal is to provide a forum for the cybersecurity community on issues related to data security, data governance, privacy,...

Request to download
Cloud Native Application Protection Platform Survey Report

Cloud Native Application Protection Platform Survey Report

Release Date: 08/23/2023

Cloud Native Application Protection Platforms (CNAPPs) have emerged as a critical category of security tooling in recent years due to the complexity of co...

Request to download
International Standardization Council Charter 2023

International Standardization Council Charter 2023

Release Date: 08/23/2023

This charter lays out the scope, responsibilities, and roadmap for the International Standardization Council (ISC). The ISC actively searches mechanisms o...

Request to download
CSA Assurance Education FAQ

CSA Assurance Education FAQ

Release Date: 08/22/2023

Assurance education encompasses training and certification programs that teach individuals how to determine the effectiveness of the cybersecurity practic...

Request to download