ChaptersCircleEventsBlog
Share how your organization manages AI securely. Take the CSA and Google enterprise AI Survey today!
Research Publications currently filtered by Topic, Locale.
×

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Zero Trust Automation & Orchestration and Visibility & Analytics Overview

Zero Trust Automation & Orchestration and Visibility & Analytics Overview

Release Date: 06/04/2025

Visibility & Analytics and Automation & Orchestration are foundational, cross-cutting capabilities within the Zero Trust paradigm. They enable con...

Request to download
Zero Trust Guidance for IoT

Zero Trust Guidance for IoT

Release Date: 05/27/2025

Traditional security models treat Internet of Things (IoT) security solely as a long-term supply chain concern. This is a significant oversight in today's...

Request to download
Zero Trust Privacy Assessment and Guidance

Zero Trust Privacy Assessment and Guidance

Release Date: 02/18/2025

When people discuss Zero Trust, they often focus on how it can help protect data across an organization. However, they tend to forget how it can also help...

Request to download
Context-Based Access Control for Zero Trust

Context-Based Access Control for Zero Trust

Release Date: 01/15/2025

Traditional access decision-making is agnostic to both Zero Trust and context. Historically, security teams based access decisions on trust. The common ac...

Request to download
Zero Trust Guidance for Small and Medium Size Businesses (SMBs)

Zero Trust Guidance for Small and Medium Size Businesses (SMBs)

Release Date: 01/13/2025

Cybersecurity for small businesses involves unique and heightened challenges. This makes the adoption of a Zero Trust strategy critical for safeguarding t...

Request to download
Map the Transaction Flows for Zero Trust

Map the Transaction Flows for Zero Trust

Release Date: 11/18/2024

The NSTAC Report to the President on Zero Trust defines five steps to implementing a Zero Trust security strategy. This publication provides guidance on e...

Request to download
Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives

Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives

Release Date: 11/05/2024

This publication explores the use of asymmetric cryptography in Zero Trust. Asymmetric cryptography provides an industry-standard, secure method to establ...

Request to download
Zero Trust Guidance for Critical Infrastructure

Zero Trust Guidance for Critical Infrastructure

Release Date: 10/28/2024

In most nations, the health of public services relies on secure and resilient Critical Infrastructure. We call these infrastructures "critical" because th...

Request to download
Zero Trust Guiding Principles v1.1

Zero Trust Guiding Principles v1.1

Release Date: 09/03/2024

Zero Trust is a strategic mindset that is highly useful for organizations to adopt as part of their digital transformations. Based on the idea of "never t...

Request to download
Confronting Shadow Access Risks: Considerations for Zero Trust and Artificial Intelligence Deployments

Confronting Shadow Access Risks: Considerations for Zero Trust and Artificial Intelligence Deployments

Release Date: 05/06/2024

Shadow Access, a growing concern within cloud computing and Identity and Access Management (IAM), refers to unintended, unauthorized access to systems and...

Request to download
Defining the Zero Trust Protect Surface

Defining the Zero Trust Protect Surface

Release Date: 03/05/2024

Enterprise adoption and implementation of Zero Trust is broad and growing. Venture Beat reports that 90% of organizations moving to the cloud are adopting...

Request to download
Communicating the Business Value of Zero Trust

Communicating the Business Value of Zero Trust

Release Date: 12/18/2023

Zero Trust is a major industry trend that is being adopted and promoted by security teams around the globe, and for good reason - it delivers improved sec...

Request to download
Zero Trust Guiding Principles

Zero Trust Guiding Principles

Release Date: 07/18/2023

Zero Trust is a strategic mindset that is highly useful for organizations to adopt as part of their digital transformations and other efforts to increase ...

Request to download
Zero Trust Principles and Guidance for Identity and Access Management (IAM)

Zero Trust Principles and Guidance for Identity and Access Management (IAM)

Release Date: 07/13/2023

Identity and the ability to consume information about that identity as well as other Zero Trust (ZT) signals (additional attributes about an identity), is...

Request to download
Medical Devices in A Zero Trust Architecture

Medical Devices in A Zero Trust Architecture

Release Date: 05/08/2023

Today’s medical devices often connect to the cloud, which increases the risk by expanding the attack surface. This presents the Healthcare Delivery Organi...

Request to download
Zero Trust as a Security Philosophy

Zero Trust as a Security Philosophy

Release Date: 11/14/2022

When implemented correctly, a Zero Trust architecture/strategy/approach to Information Technology, and the architecture that supports it, has the potentia...

Request to download
CISO Perspectives and Progress in Deploying Zero Trust

CISO Perspectives and Progress in Deploying Zero Trust

Release Date: 06/03/2022

Some of the areas covered in this survey include where Zero Trust falls as a priority in the organization, the percentage of those who have completed rela...

Request to download
Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement

Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement

Release Date: 04/12/2022

The purpose of this research article is to explain how DNS and the enterprise-managed DDI system can be combined with a Software-Defined Perimeter to deli...

Request to download
Software-Defined Perimeter (SDP) Specification v2.0

Software-Defined Perimeter (SDP) Specification v2.0

Release Date: 03/10/2022

The Software-Defined Perimeter (SDP) architecture is an effective way to implement the principles of Zero Trust. SDP aims to give enterprise security arch...

Request to download
Toward a Zero Trust Architecture

Toward a Zero Trust Architecture

Release Date: 10/27/2021

Enterprise stakeholders must consider the challenges of increased real-time system complexity, the need for new cybersecurity policy and strong cultural s...

Request to download