CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | CSA Congress 2012 Big Data Overview Release Date: 11/06/2012 Crystallization of best practices for security and privacy in big data. Request to download |
![]() | SecaaS Category 7 // Security Information and Event Management Implementation Guidance Release Date: 10/29/2012 This document provides guidance on how to evaluate, architect, and deploy cloud-based SIEM services to both enterprise and cloud-based networks, infrastructu... Request to download |
![]() | SecaaS Category 9 // BCDR Implementation Guidance Release Date: 10/08/2012 When using the cloud for operational processes and/or production systems, an organization’s BC/DR requirements must be included in their procurement, plannin... Request to download |
![]() | SecaaS Category 8 // Encryption Implementation Guidance Release Date: 10/08/2012 Encryption is a primary data (and application) protection technique. For encryption to be useful, encryption keys must be properly managed and protected. Thi... Request to download |
![]() | SecaaS Category 6 // Intrusion Management Implementation Guidance Release Date: 10/08/2012 Because of the limited market maturity and lack of widely accepted best practices, this document provides implementation guidelines for cloud-based intrusion... Request to download |
![]() | SecaaS Category 5 // Security Assessments Implementation Guidance Release Date: 10/08/2012 There are many choices for an assessment framework standard and there is no "one size fits all" solution for security assessments. One could reasonably expec... Request to download |
![]() | SecaaS Category 4 // Email Security Implementation Guidance Release Date: 10/08/2012 Due to its ubiquitous use, electronic mail is both the prime target of, and primary vehicle for, attacks, and must be protected on both ends: sending and rec... Request to download |
![]() | SecaaS Category 2 // Data Loss Prevention Implementation Guidance Release Date: 10/08/2012 DLP must be considered an essential element for achieving an effective information security strategy for protecting data as it moves to, resides in and depar... Request to download |
![]() | SecaaS Category 3 // Web Security Implementation Guidance Release Date: 10/08/2012 The vendor and academic community have come together to form a set of solutions called Security as a Service. This document specifically addresses one elemen... Request to download |
![]() | SecaaS Category 10 // Network Security Implementation Guidance Release Date: 10/08/2012 In a cloud environment, a major part of network security is likely to be provided by virtual security devices and services, alongside traditional physical ne... Request to download |
![]() | Release Date: 10/04/2012 Request to download |
![]() | CSA/ISACA Cloud Market Maturity Study Results Release Date: 09/27/2012 A collaborative project by ISACA and CSA, the Cloud Market Maturity study provides business and IT leaders with insight into the maturity of cloud computing ... Request to download |
![]() | SecaaS Category 1 // Identity and Access Management Implementation Guidance Release Date: 09/26/2012 This document addresses personnel involved in the identification and implementation of the IAM solution in the cloud. It will be of particular interest to th... Request to download |
![]() | Mobile Device Management: Key Components Release Date: 09/20/2012 With the growth in the number of applications, content, and data being accessed through a variety of devices, Mobile Device Management (MDM) is vital to mana... Request to download |
![]() | Release Date: 09/20/2012 This is an old version of the Cloud Controls Matrix (CCM). You learn more and download the latest version of the CCM here: https://cloudsecurityalliance.org/... Request to download |
![]() | PLA Initiative Research Sponsorship Outline Release Date: 08/27/2012 Request to download |
![]() | Release Date: 08/17/2012 The CSA Open Certification Framework is a program for flexible, incremental and multi-layered cloud provider certification according to the Cloud Security Al... Request to download |
![]() | Innovation Initiative Overview Powerpoint Release Date: 02/24/2012 Request to download |
![]() | Release Date: 02/24/2012 Request to download |
![]() | Cloud Consumer Advocacy Questionnaire Release Date: 11/16/2011 The purpose of this survey was to capture the current state of data governance and data security capabilities offered by leading cloud service providers in t... Request to download |