ChaptersEventsBlog
Share your organization’s adoption, governance, and security practices. Take the Securing the New Digital Workforce survey now →
Research Publications currently filtered by Topic, Locale.
×

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation

Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation

Release Date: 08/07/2025

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Cloud Controls Matrix and CAIQ v4

Cloud Controls Matrix and CAIQ v4

Release Date: 06/03/2024

The Cloud Controls Matrix (CCM) is a cybersecurity control framework for cloud computing aligned to the CSA best practices, that is considered the de-facto s...

Request to download
Zero Trust Privacy Assessment and Guidance - Korean Translation

Zero Trust Privacy Assessment and Guidance - Korean Translation

Release Date: 07/22/2025

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Six Pillars of DevSecOps

Six Pillars of DevSecOps

Release Date: 08/07/2019

In our current state of cyber security, there has been a large growth of application flaws that bypass the continuing addition of security frameworks to ensu...

Request to download
Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Arabic Translation

Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Arabic Translation

Release Date: 05/27/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Sensitive Data in the Cloud

Sensitive Data in the Cloud

Release Date: 07/12/2022

Anjuna commissioned CSA to develop a survey to better understand the industry’s knowledge, attitudes, and opinions regarding sensitive data in the cloud. ...

Request to download
Agile Data Lake Threat Modeling

Agile Data Lake Threat Modeling

Release Date: 03/28/2023

As cloud platforms expand further and further into business uses, the need to understand the attack surface to your data becomes much more apparent. With ...

Request to download
What is IAM for the Cloud?

What is IAM for the Cloud?

Release Date: 07/12/2023

The threat landscape has materially changed over the years to the point that Identity and Access Management (IAM) is a core component of any digital acces...

Request to download
CSA Data Security Glossary

CSA Data Security Glossary

Release Date: 01/22/2024

This CSA Data Security Glossary identifies and defines 127 terms relevant to data security. Based on the CSA Cloud Security Glossary, NIST Glossary, and o...

Request to download
Strengthening Research Integrity with High-Performance Computing (HPC) Security

Strengthening Research Integrity with High-Performance Computing (HPC) Security

Release Date: 08/07/2024

High-Performance Computing (HPC) systems aggregate computing resources to gain performance greater than that of a single workstation. HPC systems have bec...

Request to download
Top Threats to Cloud Computing Post Pandemic Eleven Survey Report

Top Threats to Cloud Computing Post Pandemic Eleven Survey Report

Release Date: 08/05/2023

The CSA Top Threats Report aims to raise awareness of current cloud security risks, threats, and vulnerabilities. In this 2024 installment, we surveyed ov...

Request to download
Confidential Computing Working Group Charter 2024

Confidential Computing Working Group Charter 2024

Release Date: 09/10/2024

The working group is tasked with exploring and implementing Confidential Computing technologies to enhance data security across various industries. This g...

Request to download
CSA Code of Conduct to EU Cloud Code of Conduct Mapping

CSA Code of Conduct to EU Cloud Code of Conduct Mapping

Release Date: 03/24/2025

Navigating General Data Protection Regulation (GDPR) compliance requirements can be challenging. Fortunately, Codes of Conduct (CoCs) provide a straightfo...

Request to download
Top Threats Working Group Charter 2025

Top Threats Working Group Charter 2025

Release Date: 02/04/2025

The Top Threats Working Group aims to provide up-to-date, industry-informed expert insights on cloud security risks, threats, and vulnerabilities to help ...

Request to download
Cloud Security for Startups 2024 - Japanese Translation

Cloud Security for Startups 2024 - Japanese Translation

Release Date: 02/11/2025

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Fully Homomorphic Encryption: A Comprehensive Guide for Cybersecurity Professionals - Japanese Translation

Fully Homomorphic Encryption: A Comprehensive Guide for Cybersecurity Professionals - Japanese Translation

Release Date: 02/13/2025

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Zero Trust Automation & Orchestration and Visibility & Analytics Overview

Zero Trust Automation & Orchestration and Visibility & Analytics Overview

Release Date: 06/04/2025

Visibility & Analytics and Automation & Orchestration are foundational, cross-cutting capabilities within the Zero Trust paradigm. They enable con...

Request to download
Cloud Key Management Working Group Charter 2025

Cloud Key Management Working Group Charter 2025

Release Date: 03/18/2025

Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using key management systems with thos...

Request to download
State of SaaS Security Report 2025

State of SaaS Security Report 2025

Release Date: 04/21/2025

Software-as-a-Service (SaaS) applications have become foundational to modern business operations. However, organizations are also facing a rising tide of ...

Request to download
CAVEaT Working Group Charter 2025

CAVEaT Working Group Charter 2025

Release Date: 06/26/2025

The Cloud Security Alliance (CSA), in collaboration with the MITRE Corporation, established the Cloud Adversarial Vectors, Exploits, and Threats (CAVEaT™)...

Request to download