CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Getting Quantum Safe in 5 Slides Release Date: 04/19/2022 This is a set of 5 high-level slides about how to approach quantum-safe security. The goal is briefly to outline the problem, possible solutions, next ste... Request to download |
![]() | C-Level Guidance to Securing Serverless Architectures Release Date: 04/19/2022 The purpose of this document is to provide a high-level business overview of Serverless architectures, along with the risks and the security concerns when... Request to download |
![]() | Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement Release Date: 04/12/2022 The purpose of this research article is to explain how DNS and the enterprise-managed DDI system can be combined with a Software-Defined Perimeter to deli... Request to download |
![]() | SaaS Security and Misconfigurations Report Release Date: 04/11/2022 Many recent breaches and data leaks have been tied back to misconfigurations causing it to be a top concern for many organizations. Most research related ... Request to download |
![]() | Global Security Database Working Group Charter Release Date: 04/01/2022 The scope of this project is to identify and understand the problems around vulnerability discovery, reporting, publication, tracking, and classification.... Request to download |
![]() | Release Date: 03/17/2022 Compliance requires a comprehensive review of services and processes related to cloud infrastructure and how it is managed during a data lifecycle. STAR f... Request to download |
![]() | Software-Defined Perimeter (SDP) Specification v2.0 Release Date: 03/10/2022 The Software-Defined Perimeter (SDP) architecture is an effective way to implement the principles of Zero Trust. SDP aims to give enterprise security arch... Request to download |
![]() | Blockchain/Distributed Ledger Technology (DLT) Risk and Security Considerations Release Date: 02/16/2022 There is no shortage of guidance on how to design, configure and deploy Fabric solutions. This paper provides insights into how the three layers of blockc... Request to download |
![]() | Release Date: 02/15/2022 This charter lays out the scope, responsibilities, and roadmap for the IoT Working Group. The Cloud Security Alliance (CSA) IoT Working Group (IoTWG) plan... Request to download |
![]() | Cybersecurity Best Practices for the Manufacturing Industry Release Date: 02/09/2022 This publication was produced through the efforts of chapters and volunteers but the content development falls outside of the CSA Research Lifecycle. For ... Request to download |
![]() | DevSecOps - Pillar 4 Bridging Compliance and Development Release Date: 02/08/2022 Given the rapid evolution of software development paradigms and practices, it has become a challenge to align monolithic security compliance activities wi... Request to download |
![]() | Cloud Security and Technology Maturity Survey Release Date: 02/03/2022 The goal of this survey is to better understand the maturity levels of organizations for the cloud and technology both currently and in the near future. K... Request to download |
![]() | Artificial Intelligence in Healthcare Release Date: 01/06/2022 Artificial intelligence (AI) now has the potential to be integrated into all aspects of healthcare, from management to delivery and diagnosis. These advan... Request to download |
![]() | Corda Enterprise 4.8 - Architecture Security Report Release Date: 12/15/2021 Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many... Request to download |
![]() | Corda Enterprise 4.8 - Security Controls Checklist Release Date: 12/15/2021 In this spreadsheet, our Blockchain/Distributed Ledger Working Group delivers a fully implementable security controls checklist for the blockchain framewo... Request to download |
![]() | Release Date: 12/08/2021 This document contains auditing guidelines for each of the control specifications within the CCM version 4. The CCM is a detailed controls framework align... Request to download |
![]() | Cloud Key Management System with External Origin Key Release Date: 12/02/2021 The purpose of this document is to provide general guidance for choosing, planning, and deploying cloud-native key management systems (KMS) where there is... Request to download |
![]() | Roles and Responsibilities of Third Party Security Services Release Date: 11/30/2021 As we witness the broader adoption of cloud services, it is no surprise that third-party outsourced services are also on the rise. The security responsibi... Request to download |
![]() | Secure DevOps and Misconfigurations Survey Report Release Date: 11/18/2021 Secure DevOps, DevSecOps, and “shifting left” have become increasingly popular terms in cybersecurity. With the rapid increase both in volume and speed to... Request to download |
![]() | CSA Medical Device Incident Response Playbook Release Date: 11/08/2021 This document presents a best-practices medical device incident response playbook that incorporates clinical aspects of medical device IR. As such, this g... Request to download |