CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Beyond Passwords: The Role of Passkeys in Modern Web Security - Japanese Translation Release Date: 02/28/2024 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | The Six Pillars of DevSecOps - Collaboration and Integration Release Date: 02/20/2024 “Security can only be achieved through collaboration, not confrontation” is one of the defining principles of DevSecOps. Essentially, security is a team s... Request to download |
![]() | The State of Security Remediation 2024 Release Date: 02/13/2024 Security remediation involves identifying, evaluating, and addressing security vulnerabilities to mitigate potential risks. In the ever-evolving landscape... Request to download |
![]() | CCM v4.0 Addendum - ECUC PP v2.1 Release Date: 02/12/2024 This document is an addendum to the 'ECUC Position Paper v2.1 (ECUC PP v2.1) that contains controls mapping between the CSA CCM v4.0 and the ECUC PPv2.1. ... Request to download |
![]() | Top Threats Working Group Charter 2024 Release Date: 02/01/2024 The Top Threats Working Group aims to provide up-to-date, industry-informed expert insights on cloud security risks, threats, and vulnerabilities to help ... Request to download |
![]() | Health Information Management Working Group Charter 2024 Release Date: 01/31/2024 The Health Information Management Working Group aims to directly influence how health information service providers deliver secure cloud solutions (servic... Request to download |
![]() | Release Date: 01/22/2024 This CSA Data Security Glossary identifies and defines 127 terms relevant to data security. Based on the CSA Cloud Security Glossary, NIST Glossary, and o... Request to download |
![]() | DLT Cybersecurity Maturity Core Framework v1.0 Release Date: 01/22/2024 The “DLT Risk Mitigation Model Tool” is designed to assist organizations in crafting a tailored risk mitigation strategy based on their unique risk appeti... Request to download |
![]() | STAR Attestation Value Proposition - Japanese Translation Release Date: 01/02/2024 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Zero Trust Guiding Principles - Korean Translation Release Date: 01/02/2024 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Zero Trust Guiding Principles - Japanese Translation Release Date: 12/22/2023 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Key Management Lifecycle Best Practices Release Date: 12/19/2023 Cryptographic keys are essential for securing digital assets, yet managing these keys can be challenging for organizations that run applications in the cl... Request to download |
![]() | Communicating the Business Value of Zero Trust Release Date: 12/18/2023 Zero Trust is a major industry trend that is being adopted and promoted by security teams around the globe, and for good reason - it delivers improved sec... Request to download |
![]() | Recommendations for Adopting a Cloud-Native Key Management Service - Korean Translation Release Date: 12/07/2023 Cloud-native key management services (KMS) offer organizations of any size and complexity a low-cost option for meeting their needs for key management, pa... Request to download |
![]() | Release Date: 11/20/2023 An array of threat-based cybersecurity models and associated knowledge bases exist to inform cloud security practitioners. However, the rapid development ... Request to download |
![]() | What is IAM for the Cloud? - Chinese Translation Release Date: 11/13/2023 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Data Loss Prevention and Data Security Survey Report - Chinese Translation Release Date: 11/13/2023 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | High Performance Computing Tabletop Guide - Chinese Translation Release Date: 11/13/2023 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Medical Devices in A Zero Trust Architecture - Chinese Translation Release Date: 11/13/2023 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Security Implications of ChatGPT - Chinese Translation Release Date: 11/13/2023 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |