CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | CSA CCM v4.0 Addendum - UAE IA Regulation Release Date: 07/05/2022 This document is an addendum to the CCM V4.0 that contain controls mapping between the CSA CCM and the UAE Information Assurance (IA) Regulation. The docu... Request to download |
![]() | Measuring Risk and Risk Governance Release Date: 06/21/2022 Adapting to the cloud presents a new challenge to enterprises. The shared responsibility model, used to distinguish responsibilities between cloud provide... Request to download |
![]() | Secure Connection Requirements of Hybrid Cloud - Japanese Translation Release Date: 06/14/2022 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | C-Level Guidance to Securing Serverless Architectures - Japanese Translation Release Date: 06/08/2022 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | The Continuous Audit Metrics Catalog: Towards a Machine-Readable Representation Release Date: 06/07/2022 In October 2021, the Cloud Security Alliance released the first version of the Continuous Audit Metrics catalog which provides a standard reference for th... Request to download |
![]() | Top Threats to Cloud Computing Pandemic Eleven Release Date: 06/06/2022 The Top Threats reports have traditionally aimed to raise awareness of threats, risks, and vulnerabilities in the cloud. Such issues are often the result ... Request to download |
![]() | CISO Perspectives and Progress in Deploying Zero Trust Release Date: 06/03/2022 Some of the areas covered in this survey include where Zero Trust falls as a priority in the organization, the percentage of those who have completed rela... Request to download |
![]() | Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Arabic Translation Release Date: 05/27/2022 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Best Practices for Smart Contract Security Hyperledger Fabric Release Date: 05/18/2022 The goal is to establish best practices for using smart contract specifically in Hyperledger Fabric 2.0 environment. This document serves as a guide for S... Request to download |
![]() | Serverless Computing Working Group Charter Release Date: 05/17/2022 Serverless working group charter document. The Serverless WG seeks to develop best practices to help organizations that want to run their business wi... Request to download |
![]() | HPC Cloud Services Onboarding Guide Release Date: 05/16/2022 This paper aims to present an overview of what to consider to ensure the proper selection, design, and implementation of an HPC solution that will satisfy... Request to download |
![]() | Healthcare Supply Chain Cybersecurity Risk Management Release Date: 05/11/2022 It is essential for Healthcare Delivery Organizations to conduct proper risk management practices and risk assessments of suppliers and third-party servic... Request to download |
![]() | Cloud Key Management Working Group Charter Release Date: 05/04/2022 Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using key management systems with thos... Request to download |
![]() | Software-Defined Perimeter (SDP) Specification v2.0 - Japanese Translation Release Date: 05/04/2022 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Release Date: 04/25/2022 The IoT Security Controls Matrix is relevant for enterprise IoT systems that incorporate multiple types of connected devices, cloud services, and networki... Request to download |
![]() | Guide to the IoT Controls Matrix v3 Release Date: 04/25/2022 The Guide to the IoT Security Controls Matrix provides instructions for using the companion CSA IoT Security Controls Matrix v3. This guide explains how t... Request to download |
![]() | Identity Access Management Working Group Charter Release Date: 04/22/2022 Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using Identity Access Management (IAM)... Request to download |
![]() | Health Information Management Working Group Charter Release Date: 04/22/2022 The Health Information Management Working Group aims to directly influence how health information service providers deliver secure cloud solutions (servic... Request to download |
![]() | Getting Quantum Safe in 5 Slides Release Date: 04/19/2022 This is a set of 5 high-level slides about how to approach quantum-safe security. The goal is briefly to outline the problem, possible solutions, next ste... Request to download |
![]() | C-Level Guidance to Securing Serverless Architectures Release Date: 04/19/2022 The purpose of this document is to provide a high-level business overview of Serverless architectures, along with the risks and the security concerns when... Request to download |