ChaptersCircleEventsBlog
Share how your organization manages AI securely. Take the CSA and Google enterprise AI Survey today!
Research Publications currently filtered by Locale.
×

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives

Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives

Release Date: 11/05/2024

This publication explores the use of asymmetric cryptography in Zero Trust. Asymmetric cryptography provides an industry-standard, secure method to establ...

Request to download
CCM Video Series: HRS - Human Resources Security

CCM Video Series: HRS - Human Resources Security

Release Date: 11/04/2024

In this presentation we focus on the Human Resources (HRS) security domain, which comprises thirteen control specifications designed to help cloud organiz...

Request to download
CCM Video Series: GRC - Governance, Risk Management, & Compliance

CCM Video Series: GRC - Governance, Risk Management, & Compliance

Release Date: 11/04/2024

In this presentation we introduce the*Governance, Risk Management, and Compliance (GRC) domain of CCM, which consists of eight control specifications. The...

Request to download
CCM Video Series: CCC - Change Control & Configuration Management

CCM Video Series: CCC - Change Control & Configuration Management

Release Date: 11/02/2024

This presentation explores the Change Control and Configuration Management (CCCM) domain of the Cloud Control Matrix (CCM). With its nine control specific...

Request to download
CCM Video Series: CEK - Cryptography, Encryption, & Key Management

CCM Video Series: CEK - Cryptography, Encryption, & Key Management

Release Date: 11/02/2024

In this presentation we explore the Cryptography, Encryption, and Key Management (CEK) domain within the Cloud Control Matrix (CCM) that comprises twenty-...

Request to download
CCM Video Series: LOG - Logging & Monitoring

CCM Video Series: LOG - Logging & Monitoring

Release Date: 11/02/2024

In this presentation we focus on the Logging and Monitoring domain, which includes thirteen control specifications that help both Cloud Service Providers ...

Request to download
CCM Video Series: STA - Supply Chain Mgmt, Transparency, & Accountability

CCM Video Series: STA - Supply Chain Mgmt, Transparency, & Accountability

Release Date: 11/02/2024

In this presentation we explore the Supply Chain Management, Transparency, and Accountability (STA) domain, which includes fourteen control specifications...

Request to download
CCM Video Series: TVM - Threat & Vulnerability Management

CCM Video Series: TVM - Threat & Vulnerability Management

Release Date: 11/02/2024

In this presentation we cover the Threat and Vulnerability Management (TVM) domain, which features ten control specifications aimed at helping both Cloud ...

Request to download
CCM Video Series: BCR - Business Continuity Mgmt & Op Resilience

CCM Video Series: BCR - Business Continuity Mgmt & Op Resilience

Release Date: 11/02/2024

In this presentation, we introduce the CCM business Continuity Management and Operational Resilience domain, comprising eleven control specifications. Thi...

Request to download
CCM Video Series: DSP - Data Security & Privacy

CCM Video Series: DSP - Data Security & Privacy

Release Date: 11/02/2024

In this presentation we explore the Data Security and Privacy Lifecycle Management (DSP) domain, which includes nineteen control specifications focused on...

Request to download
CCM Video Series: IAM - Identity & Access Management

CCM Video Series: IAM - Identity & Access Management

Release Date: 11/02/2024

In this presentation we introduce the Identity and Access Management (IAM) domain, which includes sixteen control specifications aimed at helping both Clo...

Request to download
CCM Video Series: IVS - Infrastructure & Virtualization Security

CCM Video Series: IVS - Infrastructure & Virtualization Security

Release Date: 11/02/2024

In this presentation we delve into the Infrastructure and Virtualization Security (IVS) domain, which comprises nine control specifications designed to gu...

Request to download
The State of Multi-Cloud Identity Survey

The State of Multi-Cloud Identity Survey

Release Date: 10/29/2024

Enterprises encounter significant obstacles when adopting multi-cloud. Namely, harmonizing hybrid and cloud identity systems for secure integration. Ident...

Request to download
Zero Trust Guidance for Critical Infrastructure

Zero Trust Guidance for Critical Infrastructure

Release Date: 10/28/2024

In most nations, the health of public services relies on secure and resilient Critical Infrastructure. We call these infrastructures "critical" because th...

Request to download
AI Organizational Responsibilities - Governance, Risk Management, Compliance and Cultural Aspects

AI Organizational Responsibilities - Governance, Risk Management, Compliance and Cultural Aspects

Release Date: 10/21/2024

Continuing CSA's efforts to address the evolving AI landscape, this latest publication covers AI governance, risk management, and culture. Understand vari...

Request to download
NIST CSF v2 Cloud Community Profile - Based on CCM v4

NIST CSF v2 Cloud Community Profile - Based on CCM v4

Release Date: 10/15/2024

The CSFv2.0 Cloud Community Profile aligns the Cloud Controls Matrix (CCM) version 4.0 with the Cybersecurity Framework (CSF) version 2.0 by mapping equiv...

Request to download
Informative Reference Details for the Mapping of CCM v4 to NIST CSF v2

Informative Reference Details for the Mapping of CCM v4 to NIST CSF v2

Release Date: 10/08/2024

The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices for securing cloud...

Request to download
AI in Medical Research: Applications & Considerations

AI in Medical Research: Applications & Considerations

Release Date: 09/25/2024

The advent of artificial intelligence (AI) has brought about a paradigm shift in numerous fields. AI technologies can process vast amounts of data, recogn...

Request to download
Don’t Panic! Getting Real about AI Governance

Don’t Panic! Getting Real about AI Governance

Release Date: 09/18/2024

The excitement around Generative AI and its potential business value continues to grow. A major factor is AI systems' emerging capability to mimic human-l...

Request to download
The State of Non-Human Identity Security

The State of Non-Human Identity Security

Release Date: 09/11/2024

Non-human identities (NHIs) include bots, API keys, service accounts, OAuth tokens, and secrets. These identities keep today’s organizations running smoot...

Request to download