CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Internet of Things (IoT) Working Group Charter 2023 Release Date: 03/12/2023 This charter lays out the scope, responsibilities, and roadmap for the Internet of Things Working Group. The Cloud Security Alliance Internet of Things (I... Request to download |
![]() | Quantum-Safe Security Working Group Charter 2023 Release Date: 03/10/2023 The focus of the Quantum‐Safe Security Working Group is on cryptographic methods that will remain safe after the widespread availability of the quantum co... Request to download |
![]() | Health Information Management Working Group Charter 2023 Release Date: 03/07/2023 The Health Information Management Working Group aims to directly influence how health information service providers deliver secure cloud solutions (servic... Request to download |
![]() | Auditors Guidance Document STAR Certification: Auditing the Cloud Controls Matrix Release Date: 03/01/2023 The download file also contains the following: Illustrative Type 2 SOC 2® Report: With the Additional Criteria in the Cloud Security Alliance (CSA) Cloud ... Request to download |
![]() | CSA CCM v4.0 Addendum - IBM Cloud Framework for Financial Services v1.1.0 Release Date: 02/22/2023 This document is a CSA CCM v4.0 addendum to the IBM Cloud Framework for Financial Services v1.1.0 that contains controls mapping between the CCM and the I... Request to download |
![]() | Release Date: 02/01/2023 A STAR Enabled Solution is a product or service that utilizes the CCM framework or the Consensus Assessment Initiative Questionnaire (CAIQ). Their technol... Request to download |
![]() | Top Threats Working Group Charter 2023 Release Date: 02/01/2023 The Top Threats Working Group aims to provide up-to-date, industry-informed expert insights on cloud security risks, threats, and vulnerabilities to help ... Request to download |
![]() | Telesurgery Tabletop Guide Book Release Date: 01/30/2023 The purpose of this guidebook is to assist healthcare providers in planning and facilitating a discussion and evaluation of the procedural response action... Request to download |
![]() | ACSP Training Course Outline | CSA Release Date: 01/17/2023 An outline of the topics covered and what you'll be building in the labs each day of the Advanced Cloud Security Practitioner (ACSP) Training. Cloud ... Request to download |
![]() | Release Date: 01/08/2023 In the following illustrative type 2 SOC 2 report, the service auditor is reporting on:The fairness of the presentation of the service organization’s desc... Request to download |
![]() | Deconstructing Application Connectivity Challenges in a Complex Cloud Environment Release Date: 12/14/2022 The production and use of SaaS applications in organizations has grown exponentially over the past several years. Application Security has become an integ... Request to download |
![]() | The Six Pillars of DevSecOps - Pragmatic Implementation Release Date: 12/14/2022 Organizations have a wide array of tools and solutions to choose from when implementing security into the software development process. They often end up ... Request to download |
![]() | CSA CCM v4.0 Addendum - Spain National Security Framework (ENS) Release Date: 12/08/2022 This document is an addendum to the CCM V4.0 that contains controls mapping between the CSA CCM and Spain's National Security Framework (ENS).The document... Request to download |
![]() | Zero Trust as a Security Philosophy Release Date: 11/14/2022 When implemented correctly, a Zero Trust architecture/strategy/approach to Information Technology, and the architecture that supports it, has the potentia... Request to download |
![]() | Understanding Cloud Data Security and Priorities Release Date: 10/19/2022 BigID commissioned CSA to develop a survey and report to better understand the industry’s knowledge, attitudes, and opinions regarding data security in th... Request to download |
![]() | SaaS Governance Best Practices for Cloud Customers Release Date: 10/10/2022 In the context of cloud security, the focus is almost always on securing Infrastructure-as-a-Service (IaaS) environments. This is despite the reality that... Request to download |
![]() | Release Date: 10/04/2022 This document is an addendum to the CCM V4.0 that contain controls mapping between the CSA CCM and Japan's Information System Security Management and Asse... Request to download |
![]() | Release Date: 09/26/2022 When Health Information Technology systems seamlessly exchange data with each other, it is referred to as interoperability. Interoperability occurs when i... Request to download |
![]() | Recommendations for using a Customer Controlled Key Store Release Date: 09/26/2022 In the latest from the Cloud Key Management working group, this document provides guidance on how to assess and implement cloud key management services co... Request to download |
![]() | Accedere: Using a SOC 2 Approach to Help Organizations Achieve CSA STAR Level 2 Release Date: 09/19/2022 Cybersecurity frameworks, standards and certifications can be quite complicated to understand, making it difficult to identify which standard an organizat... Request to download |