CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Release Date: 07/12/2022 Anjuna commissioned CSA to develop a survey to better understand the industry’s knowledge, attitudes, and opinions regarding sensitive data in the cloud. ... Request to download |
![]() | State of ICS Security in the Age of Cloud Release Date: 07/05/2022 The goal of this document hopes to create awareness and share insights on the benefits of leveraging Cloud Computing for ICS/OT. It also attempts to stimu... Request to download |
![]() | Top Threats to Cloud Computing Pandemic Eleven Release Date: 06/06/2022 The Top Threats reports have traditionally aimed to raise awareness of threats, risks, and vulnerabilities in the cloud. Such issues are often the result ... Request to download |
![]() | Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Arabic Translation Release Date: 05/27/2022 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Best Practices for Smart Contract Security Hyperledger Fabric Release Date: 05/18/2022 The goal is to establish best practices for using smart contract specifically in Hyperledger Fabric 2.0 environment. This document serves as a guide for S... Request to download |
![]() | HPC Cloud Services Onboarding Guide Release Date: 05/16/2022 This paper aims to present an overview of what to consider to ensure the proper selection, design, and implementation of an HPC solution that will satisfy... Request to download |
![]() | Cloud Key Management Working Group Charter Release Date: 05/04/2022 Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using key management systems with thos... Request to download |
![]() | Release Date: 04/25/2022 The IoT Security Controls Matrix is relevant for enterprise IoT systems that incorporate multiple types of connected devices, cloud services, and networki... Request to download |
![]() | Guide to the IoT Controls Matrix v3 Release Date: 04/25/2022 The Guide to the IoT Security Controls Matrix provides instructions for using the companion CSA IoT Security Controls Matrix v3. This guide explains how t... Request to download |
![]() | SaaS Security and Misconfigurations Report Release Date: 04/11/2022 Many recent breaches and data leaks have been tied back to misconfigurations causing it to be a top concern for many organizations. Most research related ... Request to download |
![]() | Artificial Intelligence in Healthcare Release Date: 01/06/2022 Artificial intelligence (AI) now has the potential to be integrated into all aspects of healthcare, from management to delivery and diagnosis. These advan... Request to download |
![]() | Corda Enterprise 4.8 - Architecture Security Report Release Date: 12/15/2021 Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many... Request to download |
![]() | Cloud Key Management System with External Origin Key Release Date: 12/02/2021 The purpose of this document is to provide general guidance for choosing, planning, and deploying cloud-native key management systems (KMS) where there is... Request to download |
![]() | Roles and Responsibilities of Third Party Security Services Release Date: 11/30/2021 As we witness the broader adoption of cloud services, it is no surprise that third-party outsourced services are also on the rise. The security responsibi... Request to download |
![]() | Information Technology Governance, Risk and Compliance in Healthcare Release Date: 10/15/2021 Information Technology (IT) Governance, Risk, and Compliance (GRC), are three words that have a significant impact on organizations. While each term seems... Request to download |
![]() | Top 10 Blockchain Attacks, Vulnerabilities & Weaknesses Release Date: 09/27/2021 Cryptocurrencies and other blockchain virtual assets have been the target of the majority of Distributed Ledger Technology (DLT) attacks and a variety of ... Request to download |
![]() | Ransomware in the Healthcare Cloud Release Date: 09/15/2021 Ransomware is the fastest-growing malware threat today. Over the last few years, it has risen to epidemic proportions, quickly becoming a significant reve... Request to download |
![]() | Microservices Architecture Pattern Release Date: 08/31/2021 This document provides a repeatable approach to architecting, developing, and deploying microservices as Microservices Architecture Patterns (MAPs). The p... Request to download |
![]() | Protecting the Privacy of Healthcare Data in the Cloud Release Date: 08/10/2021 The Health Delivery Organization (HDO) needs to understand the relationship between privacy and security, particularly the differences. This understanding... Request to download |
![]() | Release Date: 07/29/2021 The purpose of this document is to enable, encourage cloud and security practitioners to apply threat modeling for cloud applications, services, and security... Request to download |