ChaptersCircleEventsBlog
Take the Cloud Security & AI Trends Survey for a chance to win a free CCSK token ($445 value) or a CCZT + CCSK training bundle ($1,250 value)!

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

State of Financial Services in Cloud - Chinese Translation

State of Financial Services in Cloud - Chinese Translation

Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
The Six Pillars of DevSecOps: Automation - Chinese Translation

The Six Pillars of DevSecOps: Automation - Chinese Translation

Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Understanding Cloud Attack Vectors - Chinese Translation

Understanding Cloud Attack Vectors - Chinese Translation

Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Understanding Cloud Data Security and Priorities - Chinese Translation

Understanding Cloud Data Security and Priorities - Chinese Translation

Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
An Agile Data Doctrine for a Secure Data Lake - Chinese Translation

An Agile Data Doctrine for a Secure Data Lake - Chinese Translation

Release Date: 11/13/2023

Request to download
DevSecOps - Pillar 4 Bridging Compliance and Development - Chinese Translation

DevSecOps - Pillar 4 Bridging Compliance and Development - Chinese Translation

Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Beyond Passwords: The Role of Passkeys in Modern Web Security

Beyond Passwords: The Role of Passkeys in Modern Web Security

Release Date: 11/12/2023

Web authentication methods have evolved significantly over the years to improve security and the user experience. In the early days of the internet, usern...

Request to download
How to Design a Secure Serverless Architecture

How to Design a Secure Serverless Architecture

Release Date: 10/23/2023

As businesses work to bring technology value to market faster, serverless computing is gaining adoption with developers. Serverless platforms enable devel...

Request to download
Top Threats to Cloud Computing: Pandemic 11 Deep Dive

Top Threats to Cloud Computing: Pandemic 11 Deep Dive

Release Date: 10/17/2023

This publication reflects on eight recent cloud breach cases, presented as both a detailed narrative and a threat model. The threat model format provides ...

Request to download
Medical Devices In A Zero Trust Architecture - Korean Translation

Medical Devices In A Zero Trust Architecture - Korean Translation

Release Date: 10/05/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Data Loss Prevention in Healthcare

Data Loss Prevention in Healthcare

Release Date: 10/04/2023

The rise of digital services in healthcare has made protecting medical data an ongoing challenge. Data loss may occur in several forms, including informat...

Request to download
STAR Attestation Value Proposition

STAR Attestation Value Proposition

Release Date: 10/03/2023

Request to download
Machine Identity in Cybersecurity and IAM

Machine Identity in Cybersecurity and IAM

Release Date: 09/19/2023

Identity management is a crucial aspect of information security, as it ensures that only authorized individuals and entities have access to sensitive data...

Request to download
Defining Shadow Access: The Emerging IAM Security Challenge

Defining Shadow Access: The Emerging IAM Security Challenge

Release Date: 09/12/2023

Shadow Access is unmonitored, unauthorized, invisible, unsafe, and generally over-permissioned cloud access. This emerging Identity and Access Management ...

Request to download
Guidelines for CPAs Providing CSA STAR Attestation v4

Guidelines for CPAs Providing CSA STAR Attestation v4

Release Date: 09/07/2023

This document provides guidance for CPAs in conducting a STAR Attestation. It includes relevant information including professional requirements, competenc...

Request to download
STAR Program Overview

STAR Program Overview

Release Date: 08/31/2023

The CSA Security, Trust, Assurance, and Risk (STAR) program is the most complete and largest cloud assurance program in the world that constitutes an ecos...

Request to download
FaaS Serverless Control Framework (Set) based on NIST 800-53 R5 controls

FaaS Serverless Control Framework (Set) based on NIST 800-53 R5 controls

Release Date: 08/30/2023

This spreadsheet provides a cybersecurity control framework for Function-as-a-Service (FaaS) serverless deployments. The framework is based on the NIST 80...

Request to download
Identity and Access Management Glossary

Identity and Access Management Glossary

Release Date: 08/29/2023

The Identity and Access Management (IAM) Glossary is a reference document that aggregates and summarizes IAM-related terms and definitions. Bringing toget...

Request to download
Data Security Working Group Charter 2023

Data Security Working Group Charter 2023

Release Date: 08/29/2023

The Data Security working group’s goal is to provide a forum for the cybersecurity community on issues related to data security, data governance, privacy,...

Request to download
Cloud Native Application Protection Platform Survey Report

Cloud Native Application Protection Platform Survey Report

Release Date: 08/23/2023

Cloud Native Application Protection Platforms (CNAPPs) have emerged as a critical category of security tooling in recent years due to the complexity of co...

Request to download