CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Release Date: 01/08/2023 In the following illustrative type 2 SOC 2 report, the service auditor is reporting on:The fairness of the presentation of the service organization’s desc... Request to download |
![]() | Deconstructing Application Connectivity Challenges in a Complex Cloud Environment Release Date: 12/14/2022 The production and use of SaaS applications in organizations has grown exponentially over the past several years. Application Security has become an integ... Request to download |
![]() | The Six Pillars of DevSecOps - Pragmatic Implementation Release Date: 12/14/2022 Organizations have a wide array of tools and solutions to choose from when implementing security into the software development process. They often end up ... Request to download |
![]() | CSA CCM v4.0 Addendum - Spain National Security Framework (ENS) Release Date: 12/08/2022 This document is an addendum to the CCM V4.0 that contains controls mapping between the CSA CCM and Spain's National Security Framework (ENS).The document... Request to download |
![]() | Top Threats to Cloud Computing - Pandemic Eleven - Japanese Translation Release Date: 11/16/2022 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Zero Trust as a Security Philosophy Release Date: 11/14/2022 When implemented correctly, a Zero Trust architecture/strategy/approach to Information Technology, and the architecture that supports it, has the potentia... Request to download |
![]() | Understanding Cloud Data Security and Priorities Release Date: 10/19/2022 BigID commissioned CSA to develop a survey and report to better understand the industry’s knowledge, attitudes, and opinions regarding data security in th... Request to download |
![]() | SaaS Governance Best Practices for Cloud Customers Release Date: 10/10/2022 In the context of cloud security, the focus is almost always on securing Infrastructure-as-a-Service (IaaS) environments. This is despite the reality that... Request to download |
![]() | Release Date: 10/04/2022 This document is an addendum to the CCM V4.0 that contain controls mapping between the CSA CCM and Japan's Information System Security Management and Asse... Request to download |
![]() | Release Date: 09/26/2022 When Health Information Technology systems seamlessly exchange data with each other, it is referred to as interoperability. Interoperability occurs when i... Request to download |
![]() | Recommendations for using a Customer Controlled Key Store Release Date: 09/26/2022 In the latest from the Cloud Key Management working group, this document provides guidance on how to assess and implement cloud key management services co... Request to download |
![]() | Accedere: Using a SOC 2 Approach to Help Organizations Achieve CSA STAR Level 2 Release Date: 09/19/2022 Cybersecurity frameworks, standards and certifications can be quite complicated to understand, making it difficult to identify which standard an organizat... Request to download |
![]() | The State of Cloud Security Risk, Compliance, and Misconfigurations - Korean Translation Release Date: 09/07/2022 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Security Guidelines for Providing and Consuming APIs - Korean Translation Release Date: 08/17/2022 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Cloud and Web Security Challenges in 2022 Release Date: 08/16/2022 Organizations’ work environments have undergone rapid but lasting changes in the face of the recent health crisis. Remote work became a necessity and many... Request to download |
![]() | Secure Connection Requirements of Hybrid Cloud - Korean Translation Release Date: 08/15/2022 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Top Threats Working Group Charter 2022 Release Date: 08/11/2022 The Top Threats Working Group aims to provide up-to-date, industry-informed expert insights on cloud security risks, threats, and vulnerabilities to help ... Request to download |
![]() | Enterprise Architecture Working Group Charter 2022 Release Date: 08/11/2022 This is the 2022 Charter for the Enterprise Architecture Working Group to promote research, development, and education of best practices and methodologies... Request to download |
![]() | Software-Defined Perimeter (SDP) Specification v2.0 - Korean Translation Release Date: 08/11/2022 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | IoT Controls Matrix v3 - Japanese Translation Release Date: 07/21/2022 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |