ChaptersEventsBlog
We're exploring how organizations adapt IAM to AI. Take the AI Identity and Risk Readiness Survey by September 5 →

Contribute to CSA Research

Home
Contribute

Open Peer Reviews

Key Responsibility Models

Open Until: 08/28/2025

The document aims to standardize terminology and present a clear, comparative responsibility matrix for key management mode...

Multi-Cloud KMS

Open Until: 08/28/2025

This paper addresses the common challenges, strategies, solutions, and best practices for maintaining and using keys secure...

Data Security within AI Environments

Open Until: 08/29/2025

 AI’s demand for large and diverse datasets introduces significant cybersecurity risks across the entire data lifecycl...

AICM Auditing Guidelines

Open Until: 09/03/2025

Auditing steps for each of the 243 controls of the AI Controls Matrix for internal or external auditors that are going to e...

A Practitioner’s Guide to Post-Quantum Cryptography

Open Until: 09/17/2025

As quantum computing advances, the threat it poses to classical cryptographic algorithms becomes increasingly urgent. This ...

Cloud Threat Modeling 2025

Open Until: 09/19/2025

The purpose of this document is to enable and encourage effective threat modeling for cloud applications, services, and sec...

Open Surveys

Take the AI Identity and Risk Readiness Survey by September 5 →

We’re exploring how organizations are adapting their identity and access management practices in response to the growing use of AI. This survey will help us better understand:
  • How AI is changing the identity landscape
  • The challenges organizations face securing AI-generated and non-human identities
  • The impact of legacy systems on modern identity strategies

Take this survey by September 5 for a chance to win a $50 Amazon gift card or Apple AirPods.