ChaptersCircleEventsBlog
Join us for the in-person CCSK Azure course at Black Hat from August 4–5! Register now for a hands-on deep dive and secure your spot now!

CSA Research

Best practices, guidance, frameworks and tools to help the industry secure the cloud. Read our research to get your questions around cloud security answered.
Research

CSA Research is created by the industry for the industry and is both vendor-neutral and consensus driven. Our research is created by subject matter experts who volunteer for our working groups. Each working group focuses on a unique topic or aspect of cloud security, from IoT, DevSecOps, Serverless and more, we have working groups for over 20 areas of cloud computing. You can view a list of all active research working groups. To find out more about how our research is created and the process we follow you can view the CSA Research Lifecycle.

Contribute to CSA Research

Peer reviews allow security professionals from around the world to collaborate on CSA research. Provide your feedback on the following documents in progress.

Latest Research

Valid-AI-ted Overview

Valid-AI-ted Overview

Release Date: 06/20/2025

This document introduces Valid-AI-ted, CSA’s new AI-powered tool for evaluating STAR Level 1 self-assessments. Learn how the tool uses LLM technology to provide automated, actionable feedback, support continuous improvement, and award a STAR Level 1 Valid-AI-ted badge upon passing. 

Receive...
Zero Trust Automation & Orchestration and Visibility & Analytics Overview

Zero Trust Automation & Orchestration and Visibility & Analytics Overview

Release Date: 06/04/2025

Visibility & Analytics and Automation & Orchestration are foundational, cross-cutting capabilities within the Zero Trust paradigm. They enable continuous monitoring, access control policy enforcement, incident detection, and automated response. In short:
  • Visibility encompasses continuous,...