ChaptersCircleEventsBlog
Improve the quality of your STAR Level 1 self-assessment by submitting to Valid-AI-ted →
Research Publications currently filtered by Term.
×

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Evolution of CASB Survey Report

Evolution of CASB Survey Report

Release Date: 07/05/2020

The study on CASB, which queried more than 200 IT and security professionals from a variety of organization sizes and locations, examined the expectations, t...

Request to download
Financial Services Stakeholders Platform Working Group Charter

Financial Services Stakeholders Platform Working Group Charter

Release Date: 06/09/2020

Information security plays an integral role in the regulation and protection of customers in the financial industry. Exploring cloud computing and the underl...

Request to download
SDP: The Most Advanced Zero Trust Architecture

SDP: The Most Advanced Zero Trust Architecture

Release Date: 05/27/2020

Today’s “Zero Trust” implementations are like putting up a wall with multiple doors and allowing people to come and pick a lock on the door. We are then just...

Request to download
Cloud Incident Response Framework – A Quick Guide

Cloud Incident Response Framework – A Quick Guide

Release Date: 04/21/2020

What this Quick Guide aims to do is to distill and give readers an overview of key contributions of the work currently undertaken in the CIR WG, towards a co...

Request to download
Best Practices in Implementing a Secure Microservices Architecture

Best Practices in Implementing a Secure Microservices Architecture

Release Date: 02/24/2020

Application containers and a microservices architecture are being used to design, develop, and deploy applications leveraging agile software development appr...

Request to download
Critical Controls Implementation for SAP

Critical Controls Implementation for SAP

Release Date: 01/06/2020

The Critical Controls Implementation for SAP is the first in a series of implementation documents that the CSA ERP Security Working Group aims to develop. Th...

Request to download
Software-Defined Perimeter as a DDoS Prevention Mechanism

Software-Defined Perimeter as a DDoS Prevention Mechanism

Release Date: 10/27/2019

The primary goal of this document is to increase the awareness and understanding of SDP as a tool to prevent DDoS attacks by demonstrating its efficiency and...

Request to download
Six Pillars of DevSecOps

Six Pillars of DevSecOps

Release Date: 08/07/2019

In our current state of cyber security, there has been a large growth of application flaws that bypass the continuing addition of security frameworks to ensu...

Request to download
Top Threats to Cloud Computing: Egregious Eleven

Top Threats to Cloud Computing: Egregious Eleven

Release Date: 08/06/2019

The report provides organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated risk-management deci...

Request to download
Cloud Controls Matrix v3.0.1

Cloud Controls Matrix v3.0.1

Release Date: 08/03/2019

The CCM, the only meta-framework of cloud-specific security controls, mapped to leading standards, best practices and regulations. CCM provides organizations...

Request to download
Best Practices for Implementing a Secure Application Container Architecture

Best Practices for Implementing a Secure Application Container Architecture

Release Date: 07/26/2019

Application containers and a microservices architecture are being used to design, develop and deploy applications leveraging agile software development appro...

Request to download
Cloud Penetration Testing Playbook

Cloud Penetration Testing Playbook

Release Date: 07/12/2019

As cloud services continue to enable new technologies and see massive adoption there is a need to extend the scope of penetration testing into public cloud s...

Request to download
Software Defined Perimeter for Infrastructure as a Service: Chinese Translation

Software Defined Perimeter for Infrastructure as a Service: Chinese Translation

Release Date: 06/24/2019

Obtain a clear sense of the security challenges facing enterprise users of IaaS, understand the problems that arise from combining native IaaS access control...

Request to download
Software Defined Perimeter for Infrastructure as a Service: Japanese Translation

Software Defined Perimeter for Infrastructure as a Service: Japanese Translation

Release Date: 06/23/2019

Obtain a clear sense of the security challenges facing enterprise users of IaaS, understand the problems that arise from combining native IaaS access control...

Request to download
SDP Architecture Guide v2

SDP Architecture Guide v2

Release Date: 05/07/2019

Software Defined Perimeter (SDP) Architecture Guide is designed to leverage proven, standards-based components to stop network attacks against application in...

Request to download
CSA IoT Security Controls Framework

CSA IoT Security Controls Framework

Release Date: 03/05/2019

The Internet of Things (IoT) Security Controls Framework introduces the base-level security controls required to mitigate many of the risks associated with a...

Request to download
CSA Guide to the IoT Security Controls Framework

CSA Guide to the IoT Security Controls Framework

Release Date: 03/05/2019

The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework spreadsheet. This guide ex...

Request to download
OWASP Secure Medical Devices Deployment Standard

OWASP Secure Medical Devices Deployment Standard

Release Date: 08/07/2018

With the explosion of botnets and other malware that now target IoT devices (of which medical devices can be considered a subtype) the need for security-min...

Request to download
Best Practices for Cyber Incident Exchange

Best Practices for Cyber Incident Exchange

Release Date: 04/16/2018

No organization is immune from cyber attack. Malicious actors collaborate with skill and agility, effectively moving from target to target at a breakneck pac...

Request to download
Observations and Recommendations on Connected Vehicle Security

Observations and Recommendations on Connected Vehicle Security

Release Date: 05/25/2017

The introduction of Connected Vehicles (CVs) has been discussed for many years. Pilot implementations currently underway are evaluating CV operations in real...

Request to download