ChaptersEventsBlog
Prove your skills in Illumiverse Labs’ Breach Containment CTF. Register now to stop attackers.
Research Publications currently filtered by Locale.
×

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Cybersecurity Best Practices for the Manufacturing Industry

Cybersecurity Best Practices for the Manufacturing Industry

Release Date: 02/09/2022

This publication was produced through the efforts of chapters and volunteers but the content development falls outside of the CSA Research Lifecycle. For ...

Request to download
DevSecOps - Pillar 4 Bridging Compliance and Development

DevSecOps - Pillar 4 Bridging Compliance and Development

Release Date: 02/08/2022

Given the rapid evolution of software development paradigms and practices, it has become a challenge to align monolithic security compliance activities wi...

Request to download
Cloud Security and Technology Maturity Survey

Cloud Security and Technology Maturity Survey

Release Date: 02/03/2022

The goal of this survey is to better understand the maturity levels of organizations for the cloud and technology both currently and in the near future. K...

Request to download
Artificial Intelligence in Healthcare

Artificial Intelligence in Healthcare

Release Date: 01/06/2022

Artificial intelligence (AI) now has the potential to be integrated into all aspects of healthcare, from management to delivery and diagnosis. These advan...

Request to download
Corda Enterprise 4.8 - Architecture Security Report

Corda Enterprise 4.8 - Architecture Security Report

Release Date: 12/15/2021

Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many...

Request to download
Corda Enterprise 4.8 - Security Controls Checklist

Corda Enterprise 4.8 - Security Controls Checklist

Release Date: 12/15/2021

In this spreadsheet, our Blockchain/Distributed Ledger Working Group delivers a fully implementable security controls checklist for the blockchain framewo...

Request to download
CCMv4.0 Auditing Guidelines

CCMv4.0 Auditing Guidelines

Release Date: 12/08/2021

This document contains auditing guidelines for each of the control specifications within the CCM version 4. The CCM is a detailed controls framework align...

Request to download
Cloud Key Management System with External Origin Key

Cloud Key Management System with External Origin Key

Release Date: 12/02/2021

The purpose of this document is to provide general guidance for choosing, planning, and deploying cloud-native key management systems (KMS) where there is...

Request to download
Roles and Responsibilities of Third Party Security Services

Roles and Responsibilities of Third Party Security Services

Release Date: 11/30/2021

As we witness the broader adoption of cloud services, it is no surprise that third-party outsourced services are also on the rise. The security responsibi...

Request to download
Secure DevOps and Misconfigurations Survey Report

Secure DevOps and Misconfigurations Survey Report

Release Date: 11/18/2021

Secure DevOps, DevSecOps, and “shifting left” have become increasingly popular terms in cybersecurity. With the rapid increase both in volume and speed to...

Request to download
CSA Medical Device Incident Response Playbook

CSA Medical Device Incident Response Playbook

Release Date: 11/08/2021

This document presents a best-practices medical device incident response playbook that incorporates clinical aspects of medical device IR. As such, this g...

Request to download
Secure Connection Requirements of Hybrid Cloud

Secure Connection Requirements of Hybrid Cloud

Release Date: 11/05/2021

The National Institute of Standards and Technology (NIST) defines hybrid cloud infrastructure as a composition of distinct cloud infrastructures (pri...

Request to download
Toward a Zero Trust Architecture

Toward a Zero Trust Architecture

Release Date: 10/27/2021

Enterprise stakeholders must consider the challenges of increased real-time system complexity, the need for new cybersecurity policy and strong cultural s...

Request to download
The Continuous Audit Metrics Catalog

The Continuous Audit Metrics Catalog

Release Date: 10/19/2021

Are traditional infosec assurance tools outdated? Many cloud customers think so. They see that technology changes quickly, and products are frequently evo...

Request to download
Practical Preparations for the Post-Quantum World

Practical Preparations for the Post-Quantum World

Release Date: 10/19/2021

This document discusses the cybersecurity challenges and recommended steps to reduce likely new risks due to quantum information sciences. This paper was ...

Request to download
Information Technology Governance, Risk and Compliance in Healthcare

Information Technology Governance, Risk and Compliance in Healthcare

Release Date: 10/15/2021

Information Technology (IT) Governance, Risk, and Compliance (GRC), are three words that have a significant impact on organizations. While each term seems...

Request to download
Top 10 Blockchain Attacks, Vulnerabilities & Weaknesses

Top 10 Blockchain Attacks, Vulnerabilities & Weaknesses

Release Date: 09/27/2021

Cryptocurrencies and other blockchain virtual assets have been the target of the majority of Distributed Ledger Technology (DLT) attacks and a variety of ...

Request to download
State of Cloud Security Risk, Compliance, and Misconfigurations

State of Cloud Security Risk, Compliance, and Misconfigurations

Release Date: 09/17/2021

Cloud misconfigurations consistently are a top concern for organizations utilizing public cloud. Such errors lead to data breaches, allow the deletion or ...

Request to download
Ransomware in the Healthcare Cloud

Ransomware in the Healthcare Cloud

Release Date: 09/15/2021

Ransomware is the fastest-growing malware threat today. Over the last few years, it has risen to epidemic proportions, quickly becoming a significant reve...

Request to download
How to Design a Secure Serverless Architecture 2021

How to Design a Secure Serverless Architecture 2021

Release Date: 09/14/2021

Like any solution, serverless computing brings with it a variety of cyber risks. This paper covers security for serverless applications, focusing on best pra...

Request to download