ChaptersCircleEventsBlog
Join us for the in-person CCSK Azure course at Black Hat from August 4–5! Register now for a hands-on deep dive and secure your spot now!

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Software-Defined Perimeter (SDP) Specification v2.0 - Japanese Translation

Software-Defined Perimeter (SDP) Specification v2.0 - Japanese Translation

Release Date: 05/04/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
IoT Controls Matrix v3

IoT Controls Matrix v3

Release Date: 04/25/2022

The IoT Security Controls Matrix is relevant for enterprise IoT systems that incorporate multiple types of connected devices, cloud services, and networki...

Request to download
Guide to the IoT Controls Matrix v3

Guide to the IoT Controls Matrix v3

Release Date: 04/25/2022

The Guide to the IoT Security Controls Matrix provides instructions for using the companion CSA IoT Security Controls Matrix v3. This guide explains how t...

Request to download
Identity Access Management Working Group Charter

Identity Access Management Working Group Charter

Release Date: 04/22/2022

Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using Identity Access Management (IAM)...

Request to download
Health Information Management Working Group Charter

Health Information Management Working Group Charter

Release Date: 04/22/2022

The Health Information Management Working Group aims to directly influence how health information service providers deliver secure cloud solutions (servic...

Request to download
Getting Quantum Safe in 5 Slides

Getting Quantum Safe in 5 Slides

Release Date: 04/19/2022

This is a set of 5 high-level slides about how to approach quantum-safe security. The goal is briefly to outline the problem, possible solutions, next ste...

Request to download
C-Level Guidance to Securing Serverless Architectures

C-Level Guidance to Securing Serverless Architectures

Release Date: 04/19/2022

The purpose of this document is to provide a high-level business overview of Serverless architectures, along with the risks and the security concerns when...

Request to download
Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement

Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement

Release Date: 04/12/2022

The purpose of this research article is to explain how DNS and the enterprise-managed DDI system can be combined with a Software-Defined Perimeter to deli...

Request to download
SaaS Security and Misconfigurations Report

SaaS Security and Misconfigurations Report

Release Date: 04/11/2022

Many recent breaches and data leaks have been tied back to misconfigurations causing it to be a top concern for many organizations. Most research related ...

Request to download
State of Cloud Security Concerns, Challenges, and Incidents - Chinese Translation

State of Cloud Security Concerns, Challenges, and Incidents - Chinese Translation

Release Date: 04/06/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Toward a Zero Trust Architecture - Korean Translation

Toward a Zero Trust Architecture - Korean Translation

Release Date: 04/05/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Global Security Database Working Group Charter

Global Security Database Working Group Charter

Release Date: 04/01/2022

The scope of this project is to identify and understand the problems around vulnerability discovery, reporting, publication, tracking, and classification....

Request to download
Guideline on Effectively Managing Security Service in the Cloud - Korean Translation

Guideline on Effectively Managing Security Service in the Cloud - Korean Translation

Release Date: 03/21/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
The Importance of STAR

The Importance of STAR

Release Date: 03/17/2022

Compliance requires a comprehensive review of services and processes related to cloud infrastructure and how it is managed during a data lifecycle. STAR f...

Request to download
CCM v4 - Indonesian Translation

CCM v4 - Indonesian Translation

Release Date: 03/14/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Software-Defined Perimeter (SDP) Specification v2.0

Software-Defined Perimeter (SDP) Specification v2.0

Release Date: 03/10/2022

The Software-Defined Perimeter (SDP) architecture is an effective way to implement the principles of Zero Trust. SDP aims to give enterprise security arch...

Request to download
Blockchain/Distributed Ledger Technology (DLT) Risk and Security Considerations

Blockchain/Distributed Ledger Technology (DLT) Risk and Security Considerations

Release Date: 02/16/2022

There is no shortage of guidance on how to design, configure and deploy Fabric solutions. This paper provides insights into how the three layers of blockc...

Request to download
IoT Charter 2022

IoT Charter 2022

Release Date: 02/15/2022

This charter lays out the scope, responsibilities, and roadmap for the IoT Working Group. The Cloud Security Alliance (CSA) IoT Working Group (IoTWG) plan...

Request to download
Toward a Zero Trust Architecture - Japanese Translation

Toward a Zero Trust Architecture - Japanese Translation

Release Date: 02/10/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Cybersecurity Best Practices for the Manufacturing Industry

Cybersecurity Best Practices for the Manufacturing Industry

Release Date: 02/09/2022

This publication was produced through the efforts of chapters and volunteers but the content development falls outside of the CSA Research Lifecycle. For ...

Request to download