ChaptersEventsBlog
Share your organization’s adoption, governance, and security practices. Take the Securing the New Digital Workforce survey now →
Research Publications currently filtered by Locale.
×

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

AI in Medical Research: Applications & Considerations

AI in Medical Research: Applications & Considerations

Release Date: 09/25/2024

The advent of artificial intelligence (AI) has brought about a paradigm shift in numerous fields. AI technologies can process vast amounts of data, recogn...

Request to download
Don’t Panic! Getting Real about AI Governance

Don’t Panic! Getting Real about AI Governance

Release Date: 09/18/2024

The excitement around Generative AI and its potential business value continues to grow. A major factor is AI systems' emerging capability to mimic human-l...

Request to download
Zero Trust Guiding Principles v1.1

Zero Trust Guiding Principles v1.1

Release Date: 09/03/2024

Zero Trust is a strategic mindset that is highly useful for organizations to adopt as part of their digital transformations. Based on the idea of "never t...

Request to download
Data Privacy Engineering Working Group Charter 2024

Data Privacy Engineering Working Group Charter 2024

Release Date: 08/29/2024

The Data Privacy Engineering Working Group (DPE WG) is chartered with the mission to integrate privacy-centric methodologies into development workflows, a...

Request to download
Fully Homomorphic Encryption Working Group Charter 2024

Fully Homomorphic Encryption Working Group Charter 2024

Release Date: 08/29/2024

Through the use and deployment of cryptographic libraries, specialist software toolchains, and dedicated hardware and infrastructure, Fully Homomorphic En...

Request to download
Using AI for Offensive Security

Using AI for Offensive Security

Release Date: 08/06/2024

Offensive security involves proactively simulating an attacker’s behavior by using tactics and techniques similar to those of an adversary to identify sys...

Request to download
Top Threats to Cloud Computing 2024

Top Threats to Cloud Computing 2024

Release Date: 08/05/2024

The CSA Top Threats Report aims to raise awareness of current cloud security risks, threats, and vulnerabilities. In this 2024 installment, we surveyed ov...

Request to download
Quantum-Safe Security Governance with the Cloud Controls Matrix

Quantum-Safe Security Governance with the Cloud Controls Matrix

Release Date: 07/30/2024

For the last decade or so there have been major developments in the quantum and post-quantum cryptography spaces. The time has come for enterprise IT depa...

Request to download
AI Model Risk Management Framework

AI Model Risk Management Framework

Release Date: 07/23/2024

Sophisticated machine learning (ML) models present exciting opportunities in fields such as predictive maintenance and smart supply chain management. Whil...

Request to download
Enterprise Authority To Operate (EATO) Controls Framework

Enterprise Authority To Operate (EATO) Controls Framework

Release Date: 07/02/2024

Many small and mid-sized cloud-based Anything-as-a-Service (XaaS) vendors struggle to implement robust information security controls. These security gaps ...

Request to download
CSA Large Language Model (LLM) Threats Taxonomy

CSA Large Language Model (LLM) Threats Taxonomy

Release Date: 06/10/2024

This document aims to align the industry by defining key terms related to Large Language Model (LLM) risks and threats. Establishing a common language red...

Request to download
CCM-Lite and CAIQ-Lite

CCM-Lite and CAIQ-Lite

Release Date: 06/04/2024

The Cloud Security Alliance, in collaboration with the CCM Working Group, proudly presents the CCM-Lite and CAIQ-Lite File Bundle. These tools offer a str...

Request to download
The Annual SaaS Security Survey Report 2025 Plans and Priorities

The Annual SaaS Security Survey Report 2025 Plans and Priorities

Release Date: 06/03/2024

In 2024, Software-as-a-Service (SaaS) platforms are integral to most businesses. Unfortunately, inventive threat actors regularly breach SaaS applications...

Request to download
CCM v4.0 Implementation Guidelines

CCM v4.0 Implementation Guidelines

Release Date: 06/03/2024

This document will help you understand how to navigate through the Cloud Controls Matrix v4 to use it effectively and interpret and implement the CCM cont...

Request to download
CCM Machine Readable Bundle (JSON/YAML/OSCAL)

CCM Machine Readable Bundle (JSON/YAML/OSCAL)

Release Date: 06/03/2024

CSA provides in a machine-readable format the CCM Controls, CAIQ Security Questionnaire, Implementation Guidelines (both JSON/YAML and OSCAL) and Mappings...

Request to download
Identity and Access Management Working Group Charter 2024

Identity and Access Management Working Group Charter 2024

Release Date: 06/01/2024

Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using Identity Access Management (IAM)...

Request to download
Information Technology Governance, Risk, and Compliance in Healthcare v2

Information Technology Governance, Risk, and Compliance in Healthcare v2

Release Date: 05/28/2024

Healthcare organizations are increasingly using cloud services. However, the transition to the cloud presents many Governance, Risk, and Compliance (GRC) ...

Request to download
The Six Pillars of DevSecOps: Measure, Monitor, Report, and Action

The Six Pillars of DevSecOps: Measure, Monitor, Report, and Action

Release Date: 05/14/2024

The implementation and maintenance of DevSecOps initiatives can take anywhere from a few months to several years to implement. Therefore, continuous measu...

Request to download
Confronting Shadow Access Risks: Considerations for Zero Trust and Artificial Intelligence Deployments

Confronting Shadow Access Risks: Considerations for Zero Trust and Artificial Intelligence Deployments

Release Date: 05/06/2024

Shadow Access, a growing concern within cloud computing and Identity and Access Management (IAM), refers to unintended, unauthorized access to systems and...

Request to download
AI Organizational Responsibilities - Core Security Responsibilities

AI Organizational Responsibilities - Core Security Responsibilities

Release Date: 05/05/2024

This publication from the CSA AI Organizational Responsibilities Working Group provides a blueprint for enterprises to fulfill their core information secu...

Request to download