CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Release Date: 07/12/2023 The threat landscape has materially changed over the years to the point that Identity and Access Management (IAM) is a core component of any digital acces... Request to download |
![]() | Cloud and Compromise (C&C): Gamifying of Cloud Security Release Date: 07/10/2023 CSA’s Top Threats Working Group works to identify the most significant cloud security threats, vulnerabilities, and weaknesses; analyze major incidents; a... Request to download |
![]() | CSA Code of Conduct Gap Resolution and Annex 10 to the CSA Code of Conduct for GDPR Compliance Release Date: 06/21/2023 This bundle from the CSA Privacy Level Agreement Working Group includes:CSA Code of Conduct Gap Resolution spreadsheetAnnex 10 to the CSA Code of Conduct ... Request to download |
![]() | Understanding Cloud Attack Vectors Release Date: 06/06/2023 This publication was produced through the efforts of chapters and volunteers but the content development falls outside of the CSA Research Lifecycle. For ... Request to download |
![]() | State of Financial Services in Cloud Release Date: 06/05/2023 In recent years, the financial services industry has increasingly adopted cloud services. This trend is expected to continue with the further adoption and... Request to download |
![]() | High Performance Computing Tabletop Guide Release Date: 05/31/2023 This guide lays out the framework necessary to host a High Performance Computing (HPC)-focused cyberattack tabletop exercise (TTX) so that organizations c... Request to download |
![]() | Enterprise Authority to Operate Working Group Charter 2023 Release Date: 05/10/2023 The mission of the Enterprise Authority to Operate (EATO) Working Group is to develop, maintain, review, update, support and deploy of a concentrated assessm... Request to download |
![]() | Medical Devices in A Zero Trust Architecture Release Date: 05/08/2023 Today’s medical devices often connect to the cloud, which increases the risk by expanding the attack surface. This presents the Healthcare Delivery Organi... Request to download |
![]() | The Six Pillars of DevSecOps: Automation - Japanese Translation Release Date: 04/05/2023 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Agile Data Lake Threat Modeling Release Date: 03/28/2023 As cloud platforms expand further and further into business uses, the need to understand the attack surface to your data becomes much more apparent. With ... Request to download |
![]() | Internet of Things (IoT) Working Group Charter 2023 Release Date: 03/12/2023 This charter lays out the scope, responsibilities, and roadmap for the Internet of Things Working Group. The Cloud Security Alliance Internet of Things (I... Request to download |
![]() | Quantum-Safe Security Working Group Charter 2023 Release Date: 03/10/2023 The focus of the Quantum‐Safe Security Working Group is on cryptographic methods that will remain safe after the widespread availability of the quantum co... Request to download |
![]() | Health Information Management Working Group Charter 2023 Release Date: 03/07/2023 The Health Information Management Working Group aims to directly influence how health information service providers deliver secure cloud solutions (servic... Request to download |
![]() | Top Threats Working Group Charter 2023 Release Date: 02/01/2023 The Top Threats Working Group aims to provide up-to-date, industry-informed expert insights on cloud security risks, threats, and vulnerabilities to help ... Request to download |
![]() | Telesurgery Tabletop Guide Book Release Date: 01/30/2023 The purpose of this guidebook is to assist healthcare providers in planning and facilitating a discussion and evaluation of the procedural response action... Request to download |
![]() | The Six Pillars of DevSecOps - Pragmatic Implementation Release Date: 12/14/2022 Organizations have a wide array of tools and solutions to choose from when implementing security into the software development process. They often end up ... Request to download |
![]() | SaaS Governance Best Practices for Cloud Customers Release Date: 10/10/2022 In the context of cloud security, the focus is almost always on securing Infrastructure-as-a-Service (IaaS) environments. This is despite the reality that... Request to download |
![]() | Release Date: 09/26/2022 When Health Information Technology systems seamlessly exchange data with each other, it is referred to as interoperability. Interoperability occurs when i... Request to download |
![]() | Recommendations for using a Customer Controlled Key Store Release Date: 09/26/2022 In the latest from the Cloud Key Management working group, this document provides guidance on how to assess and implement cloud key management services co... Request to download |
![]() | Top Threats Working Group Charter 2022 Release Date: 08/11/2022 The Top Threats Working Group aims to provide up-to-date, industry-informed expert insights on cloud security risks, threats, and vulnerabilities to help ... Request to download |