CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Cloud Native Application Protection Platform Survey Report Release Date: 08/23/2023 Cloud Native Application Protection Platforms (CNAPPs) have emerged as a critical category of security tooling in recent years due to the complexity of co... Request to download |
![]() | An Agile Data Doctrine for a Secure Data Lake Release Date: 04/25/2023 Data is now a significant asset in most organizations around the globe, whether government, business, or not-for-profit; the inevitable shift toward its u... Request to download |
![]() | Software-Defined Perimeter (SDP) Specification v2.0 Release Date: 03/10/2022 The Software-Defined Perimeter (SDP) architecture is an effective way to implement the principles of Zero Trust. SDP aims to give enterprise security arch... Request to download |
![]() | Secure Connection Requirements of Hybrid Cloud Release Date: 11/05/2021 The National Institute of Standards and Technology (NIST) defines hybrid cloud infrastructure as a composition of distinct cloud infrastructures (pri... Request to download |
![]() | The Continuous Audit Metrics Catalog Release Date: 10/19/2021 Are traditional infosec assurance tools outdated? Many cloud customers think so. They see that technology changes quickly, and products are frequently evo... Request to download |
![]() | How to Design a Secure Serverless Architecture 2021 Release Date: 09/14/2021 Like any solution, serverless computing brings with it a variety of cyber risks. This paper covers security for serverless applications, focusing on best pra... Request to download |
![]() | Recommendations for Adopting a Cloud-Native Key Management Service Release Date: 09/14/2021 Cloud-native key management services (KMS) offer organizations of any size and complexity a low-cost option for meeting their needs for key management, pa... Request to download |
![]() | Hyperledger Fabric 2.0 Architecture Security Report Release Date: 06/28/2021 Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many... Request to download |
![]() | Hyperledger Fabric 2.0 Architecture Security Controls Checklist Release Date: 06/28/2021 Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many... Request to download |
![]() | Crypto-Asset Exchange Security Guidelines Release Date: 04/13/2021 Thanks to the blockchain technology that makes them possible, crypto-assets are becoming massively successful. As with any successful industry, a multitud... Request to download |
![]() | CSA STAR Level 3 Focus Group Charter Release Date: 04/02/2021 The CSA STAR Level 3 Focus Group will advise on the scope, objectives, structure, go-to-market (GTM) strategy and value proposition for STAR Level 3... Request to download |
![]() | Blockchains in the Quantum Era Release Date: 02/05/2021 Digital Ledger Technologies (DLT) such as blockchain are being deployed as part of diverse applications that span multiple market segments. Application devel... Request to download |
![]() | The Six Pillars of DevSecOps: Automation Release Date: 07/06/2020 Automation is a critical component of DevSecOps because it enables process efficiency, allowing developers, infrastructure, and information security teams to... Request to download |
![]() | Financial Services Stakeholders Platform Working Group Charter Release Date: 06/09/2020 Information security plays an integral role in the regulation and protection of customers in the financial industry. Exploring cloud computing and the underl... Request to download |
![]() | Managing the Risk for Medical Devices Connected to the Cloud Release Date: 03/16/2020 With the increased number of Internet of Things devices, Healthcare Delivery Organizations are experiencing a digital transformation bigger than anything in ... Request to download |
![]() | Documentation of Relevant Distributed Ledger Technology and Blockchain Use Cases v2 Release Date: 07/31/2019 Thanks to the rise in popularity of Bitcoin cryptocurrency, the innovative technologies of Blockchain and other systems of distributed ledger technology (DLT... Request to download |
![]() | Mitigating the Quantum Threat with Hybrid Cryptography Release Date: 06/17/2019 Focus of this document is on four hybrid cryptographic schemes which provide both classical security of classical crypto and the quantum security of a quantu... Request to download |
![]() | Release Date: 05/07/2019 Software Defined Perimeter (SDP) Architecture Guide is designed to leverage proven, standards-based components to stop network attacks against application in... Request to download |
![]() | CSA IoT Security Controls Framework Release Date: 03/05/2019 The Internet of Things (IoT) Security Controls Framework introduces the base-level security controls required to mitigate many of the risks associated with a... Request to download |
![]() | CSA Guide to the IoT Security Controls Framework Release Date: 03/05/2019 The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework spreadsheet. This guide ex... Request to download |