ChaptersEventsBlog
How is your enterprise using AI Agents? Help us benchmark security and take the survey before November 30 →
Research Publications currently filtered by Locale.
×

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Enterprise Authority To Operate (EATO) Controls Framework

Enterprise Authority To Operate (EATO) Controls Framework

Release Date: 07/02/2024

Many small and mid-sized cloud-based Anything-as-a-Service (XaaS) vendors struggle to implement robust information security controls. These security gaps ...

Request to download
CSA Large Language Model (LLM) Threats Taxonomy

CSA Large Language Model (LLM) Threats Taxonomy

Release Date: 06/10/2024

This document aims to align the industry by defining key terms related to Large Language Model (LLM) risks and threats. Establishing a common language red...

Request to download
CCM-Lite and CAIQ-Lite

CCM-Lite and CAIQ-Lite

Release Date: 06/04/2024

The Cloud Security Alliance, in collaboration with the CCM Working Group, proudly presents the CCM-Lite and CAIQ-Lite File Bundle. These tools offer a str...

Request to download
The Annual SaaS Security Survey Report 2025 Plans and Priorities

The Annual SaaS Security Survey Report 2025 Plans and Priorities

Release Date: 06/03/2024

In 2024, Software-as-a-Service (SaaS) platforms are integral to most businesses. Unfortunately, inventive threat actors regularly breach SaaS applications...

Request to download
CCM v4.0 Implementation Guidelines

CCM v4.0 Implementation Guidelines

Release Date: 06/03/2024

This document will help you understand how to navigate through the Cloud Controls Matrix v4 to use it effectively and interpret and implement the CCM cont...

Request to download
Cloud Controls Matrix and CAIQ v4

Cloud Controls Matrix and CAIQ v4

Release Date: 06/03/2024

The Cloud Controls Matrix (CCM) is a cybersecurity control framework for cloud computing aligned to the CSA best practices, that is considered the de-facto s...

Request to download
CCM Machine Readable Bundle (JSON/YAML/OSCAL)

CCM Machine Readable Bundle (JSON/YAML/OSCAL)

Release Date: 06/03/2024

CSA provides in a machine-readable format the CCM Controls, CAIQ Security Questionnaire, Implementation Guidelines (both JSON/YAML and OSCAL) and Mappings...

Request to download
Identity and Access Management Working Group Charter 2024

Identity and Access Management Working Group Charter 2024

Release Date: 06/01/2024

Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using Identity Access Management (IAM)...

Request to download
Information Technology Governance, Risk, and Compliance in Healthcare v2

Information Technology Governance, Risk, and Compliance in Healthcare v2

Release Date: 05/28/2024

Healthcare organizations are increasingly using cloud services. However, the transition to the cloud presents many Governance, Risk, and Compliance (GRC) ...

Request to download
The Six Pillars of DevSecOps: Measure, Monitor, Report, and Action

The Six Pillars of DevSecOps: Measure, Monitor, Report, and Action

Release Date: 05/14/2024

The implementation and maintenance of DevSecOps initiatives can take anywhere from a few months to several years to implement. Therefore, continuous measu...

Request to download
Confronting Shadow Access Risks: Considerations for Zero Trust and Artificial Intelligence Deployments

Confronting Shadow Access Risks: Considerations for Zero Trust and Artificial Intelligence Deployments

Release Date: 05/06/2024

Shadow Access, a growing concern within cloud computing and Identity and Access Management (IAM), refers to unintended, unauthorized access to systems and...

Request to download
AI Organizational Responsibilities - Core Security Responsibilities

AI Organizational Responsibilities - Core Security Responsibilities

Release Date: 05/05/2024

This publication from the CSA AI Organizational Responsibilities Working Group provides a blueprint for enterprises to fulfill their core information secu...

Request to download
AI Resilience: A Revolutionary Benchmarking Model for AI Safety

AI Resilience: A Revolutionary Benchmarking Model for AI Safety

Release Date: 05/05/2024

The rapid evolution of Artificial Intelligence (AI) promises unprecedented advances. However, as AI systems become increasingly sophisticated, they also p...

Request to download
Principles to Practice: Responsible AI in a Dynamic Regulatory Environment

Principles to Practice: Responsible AI in a Dynamic Regulatory Environment

Release Date: 05/05/2024

Artificial Intelligence (AI) innovation is not expected to slow down any time soon, as the big tech giants plan to invest hundreds of billions of dollars ...

Request to download
HSM-as-a-Service Use Cases, Considerations, and Best Practices

HSM-as-a-Service Use Cases, Considerations, and Best Practices

Release Date: 04/03/2024

A Hardware Security Module (HSM) is a certified, trusted platform for performing cryptographic operations and protecting keys. It is a tamper-responsive a...

Request to download
The State of AI and Security Survey Report

The State of AI and Security Survey Report

Release Date: 04/02/2024

The advent of artificial intelligence (AI) in cybersecurity marks a transformative era in the realm of digital defense. AI has the potential to be a vital...

Request to download
Open Certification Framework Working Group Charter

Open Certification Framework Working Group Charter

Release Date: 03/31/2024

The CSA Open Certification Framework (OCF) is an industry initiative to allow global, trusted independent evaluation of cloud providers. It is a program for ...

Request to download
AI Controls Framework Working Group Charter 2024

AI Controls Framework Working Group Charter 2024

Release Date: 03/21/2024

The AI Controls Framework working group is focused on staying abreast of the latest technological advancements in AI while simultaneously identifying, und...

Request to download
Standardizing Security in Diverse Sectors: A Template for STAR-Aligned Sector-Specific Standards

Standardizing Security in Diverse Sectors: A Template for STAR-Aligned Sector-Specific Standards

Release Date: 03/06/2024

The CSA Security, Trust, Assurance, and Risk (STAR) program encompasses the key principles of transparency, rigorous auditing, and harmonization of cybers...

Request to download
Defining the Zero Trust Protect Surface

Defining the Zero Trust Protect Surface

Release Date: 03/05/2024

Enterprise adoption and implementation of Zero Trust is broad and growing. Venture Beat reports that 90% of organizations moving to the cloud are adopting...

Request to download