ChaptersEventsBlog
Research Publications currently filtered by Topic, Locale.
×

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Managing Privileged Access in a Cloud-First World

Managing Privileged Access in a Cloud-First World

Release Date: 11/24/2025

Organizations are shifting to cloud-first architectures, distributed workforces, and identity-centric security models. This means that Privileged Access M...

Request to download
CAVEaT Working Group Charter 2025

CAVEaT Working Group Charter 2025

Release Date: 06/26/2025

The Cloud Security Alliance (CSA), in collaboration with the MITRE Corporation, established the Cloud Adversarial Vectors, Exploits, and Threats (CAVEaT™)...

Request to download
Zero Trust Automation & Orchestration and Visibility & Analytics Overview

Zero Trust Automation & Orchestration and Visibility & Analytics Overview

Release Date: 06/04/2025

Visibility & Analytics and Automation & Orchestration are foundational, cross-cutting capabilities within the Zero Trust paradigm. They enable con...

Request to download
Zero Trust Guidance for IoT

Zero Trust Guidance for IoT

Release Date: 05/27/2025

Traditional security models treat Internet of Things (IoT) security solely as a long-term supply chain concern. This is a significant oversight in today's...

Request to download
Top Threats to Cloud Computing - Deep Dive 2025

Top Threats to Cloud Computing - Deep Dive 2025

Release Date: 04/28/2025

This report uses the threats identified in CSA’s Top Threats to Cloud Computing 2024 to reflect on eight recent cybersecurity breaches. Notable incidents ...

Request to download
State of SaaS Security Report 2025

State of SaaS Security Report 2025

Release Date: 04/21/2025

Software-as-a-Service (SaaS) applications have become foundational to modern business operations. However, organizations are also facing a rising tide of ...

Request to download
CSA Code of Conduct to EU Cloud Code of Conduct Mapping

CSA Code of Conduct to EU Cloud Code of Conduct Mapping

Release Date: 03/24/2025

Navigating General Data Protection Regulation (GDPR) compliance requirements can be challenging. Fortunately, Codes of Conduct (CoCs) provide a straightfo...

Request to download
Cloud Key Management Working Group Charter 2025

Cloud Key Management Working Group Charter 2025

Release Date: 03/18/2025

Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using key management systems with thos...

Request to download
Enterprise Authority To Operate (EATO) Auditing Guidelines

Enterprise Authority To Operate (EATO) Auditing Guidelines

Release Date: 03/05/2025

Now includes Auditing Guidelines!Many small and mid-sized cloud-based Anything-as-a-Service (XaaS) vendors struggle to implement robust information securi...

Request to download
Zero Trust Privacy Assessment and Guidance

Zero Trust Privacy Assessment and Guidance

Release Date: 02/18/2025

When people discuss Zero Trust, they often focus on how it can help protect data across an organization. However, they tend to forget how it can also help...

Request to download
Cybersecurity and the Data Lifecycle

Cybersecurity and the Data Lifecycle

Release Date: 02/10/2025

The data lifecycle refers to the comprehensive process that data undergoes, from its creation to its eventual disposal. Understanding and securing each ph...

Request to download
Top Threats Working Group Charter 2025

Top Threats Working Group Charter 2025

Release Date: 02/04/2025

The Top Threats Working Group aims to provide up-to-date, industry-informed expert insights on cloud security risks, threats, and vulnerabilities to help ...

Request to download
Fully Homomorphic Encryption: A Comprehensive Guide for Cybersecurity Professionals

Fully Homomorphic Encryption: A Comprehensive Guide for Cybersecurity Professionals

Release Date: 02/03/2025

As organizations increasingly rely on cloud computing, protecting data during processing has become a critical challenge. Traditional encryption methods p...

Request to download
DLT Cybersecurity Governance Package

DLT Cybersecurity Governance Package

Release Date: 01/22/2025

Distributed Ledger Technology (DLT) brings traceability and transparency to external business workflows, while also instilling trust and efficiency in an ...

Request to download
Context-Based Access Control for Zero Trust

Context-Based Access Control for Zero Trust

Release Date: 01/15/2025

Traditional access decision-making is agnostic to both Zero Trust and context. Historically, security teams based access decisions on trust. The common ac...

Request to download
Zero Trust Guidance for Small and Medium Size Businesses (SMBs)

Zero Trust Guidance for Small and Medium Size Businesses (SMBs)

Release Date: 01/13/2025

Cybersecurity for small businesses involves unique and heightened challenges. This makes the adoption of a Zero Trust strategy critical for safeguarding t...

Request to download
Cloud Security for Startups 2024

Cloud Security for Startups 2024

Release Date: 12/18/2024

Volunteers from the CSA Israel Chapter produced this publication. The content development falls outside the CSA Research Lifecycle. For any questions and ...

Request to download
Key Management for Public Cloud Migration

Key Management for Public Cloud Migration

Release Date: 12/17/2024

More and more organizations are adopting public cloud technologies. This leads to a mass data migration where existing applications that are on-premises o...

Request to download
Cyber Resiliency in the Financial Industry 2024 Survey Report

Cyber Resiliency in the Financial Industry 2024 Survey Report

Release Date: 12/09/2024

Data resiliency and operational security have become increasingly critical as digital transformation accelerates. The financial industry faces distinct ch...

Request to download
Map the Transaction Flows for Zero Trust

Map the Transaction Flows for Zero Trust

Release Date: 11/18/2024

The NSTAC Report to the President on Zero Trust defines five steps to implementing a Zero Trust security strategy. This publication provides guidance on e...

Request to download