ChaptersCircleEventsBlog
Share how your organization manages AI securely. Take the CSA and Google enterprise AI Survey today!
Research Publications currently filtered by Locale.
×

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Getting Quantum Safe in 5 Slides

Getting Quantum Safe in 5 Slides

Release Date: 04/19/2022

This is a set of 5 high-level slides about how to approach quantum-safe security. The goal is briefly to outline the problem, possible solutions, next ste...

Request to download
C-Level Guidance to Securing Serverless Architectures

C-Level Guidance to Securing Serverless Architectures

Release Date: 04/19/2022

The purpose of this document is to provide a high-level business overview of Serverless architectures, along with the risks and the security concerns when...

Request to download
Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement

Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement

Release Date: 04/12/2022

The purpose of this research article is to explain how DNS and the enterprise-managed DDI system can be combined with a Software-Defined Perimeter to deli...

Request to download
SaaS Security and Misconfigurations Report

SaaS Security and Misconfigurations Report

Release Date: 04/11/2022

Many recent breaches and data leaks have been tied back to misconfigurations causing it to be a top concern for many organizations. Most research related ...

Request to download
Global Security Database Working Group Charter

Global Security Database Working Group Charter

Release Date: 04/01/2022

The scope of this project is to identify and understand the problems around vulnerability discovery, reporting, publication, tracking, and classification....

Request to download
The Importance of STAR

The Importance of STAR

Release Date: 03/17/2022

Compliance requires a comprehensive review of services and processes related to cloud infrastructure and how it is managed during a data lifecycle. STAR f...

Request to download
Software-Defined Perimeter (SDP) Specification v2.0

Software-Defined Perimeter (SDP) Specification v2.0

Release Date: 03/10/2022

The Software-Defined Perimeter (SDP) architecture is an effective way to implement the principles of Zero Trust. SDP aims to give enterprise security arch...

Request to download
Blockchain/Distributed Ledger Technology (DLT) Risk and Security Considerations

Blockchain/Distributed Ledger Technology (DLT) Risk and Security Considerations

Release Date: 02/16/2022

There is no shortage of guidance on how to design, configure and deploy Fabric solutions. This paper provides insights into how the three layers of blockc...

Request to download
IoT Charter 2022

IoT Charter 2022

Release Date: 02/15/2022

This charter lays out the scope, responsibilities, and roadmap for the IoT Working Group. The Cloud Security Alliance (CSA) IoT Working Group (IoTWG) plan...

Request to download
Cybersecurity Best Practices for the Manufacturing Industry

Cybersecurity Best Practices for the Manufacturing Industry

Release Date: 02/09/2022

This publication was produced through the efforts of chapters and volunteers but the content development falls outside of the CSA Research Lifecycle. For ...

Request to download
DevSecOps - Pillar 4 Bridging Compliance and Development

DevSecOps - Pillar 4 Bridging Compliance and Development

Release Date: 02/08/2022

Given the rapid evolution of software development paradigms and practices, it has become a challenge to align monolithic security compliance activities wi...

Request to download
Cloud Security and Technology Maturity Survey

Cloud Security and Technology Maturity Survey

Release Date: 02/03/2022

The goal of this survey is to better understand the maturity levels of organizations for the cloud and technology both currently and in the near future. K...

Request to download
Artificial Intelligence in Healthcare

Artificial Intelligence in Healthcare

Release Date: 01/06/2022

Artificial intelligence (AI) now has the potential to be integrated into all aspects of healthcare, from management to delivery and diagnosis. These advan...

Request to download
Corda Enterprise 4.8 - Architecture Security Report

Corda Enterprise 4.8 - Architecture Security Report

Release Date: 12/15/2021

Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many...

Request to download
Corda Enterprise 4.8 - Security Controls Checklist

Corda Enterprise 4.8 - Security Controls Checklist

Release Date: 12/15/2021

In this spreadsheet, our Blockchain/Distributed Ledger Working Group delivers a fully implementable security controls checklist for the blockchain framewo...

Request to download
CCMv4.0 Auditing Guidelines

CCMv4.0 Auditing Guidelines

Release Date: 12/08/2021

This document contains auditing guidelines for each of the control specifications within the CCM version 4. The CCM is a detailed controls framework align...

Request to download
Cloud Key Management System with External Origin Key

Cloud Key Management System with External Origin Key

Release Date: 12/02/2021

The purpose of this document is to provide general guidance for choosing, planning, and deploying cloud-native key management systems (KMS) where there is...

Request to download
Roles and Responsibilities of Third Party Security Services

Roles and Responsibilities of Third Party Security Services

Release Date: 11/30/2021

As we witness the broader adoption of cloud services, it is no surprise that third-party outsourced services are also on the rise. The security responsibi...

Request to download
Secure DevOps and Misconfigurations Survey Report

Secure DevOps and Misconfigurations Survey Report

Release Date: 11/18/2021

Secure DevOps, DevSecOps, and “shifting left” have become increasingly popular terms in cybersecurity. With the rapid increase both in volume and speed to...

Request to download
CSA Medical Device Incident Response Playbook

CSA Medical Device Incident Response Playbook

Release Date: 11/08/2021

This document presents a best-practices medical device incident response playbook that incorporates clinical aspects of medical device IR. As such, this g...

Request to download