CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | How to Design a Secure Serverless Architecture - Chinese Translation Release Date: 02/07/2022 Like any solution, serverless computing brings with it a variety of cyber risks. This paper covers security for serverless applications, focusing on best pra... Request to download |
![]() | CSA Enterprise Architecture Reference Guide - Chinese Translation Release Date: 02/07/2022 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Blockchains in the Quantum Era - Chinese Translation Release Date: 02/06/2022 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Cloud Incident Response Framework - Chinese Translation Release Date: 02/06/2022 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | CISO Perspectives and Progress in Deploying Zero Trust - Chinese Translation Release Date: 02/06/2022 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | SaaS Security and Misconfigurations Report - Chinese Translation Release Date: 02/06/2022 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Best Practices for Implementing a Secure Application Container Architecture - Chinese Translation Release Date: 02/06/2022 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Cloud Security and Technology Maturity Survey Release Date: 02/03/2022 The goal of this survey is to better understand the maturity levels of organizations for the cloud and technology both currently and in the near future. K... Request to download |
![]() | Artificial Intelligence in Healthcare Release Date: 01/06/2022 Artificial intelligence (AI) now has the potential to be integrated into all aspects of healthcare, from management to delivery and diagnosis. These advan... Request to download |
![]() | Corda Enterprise 4.8 - Architecture Security Report Release Date: 12/15/2021 Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many... Request to download |
![]() | Corda Enterprise 4.8 - Security Controls Checklist Release Date: 12/15/2021 In this spreadsheet, our Blockchain/Distributed Ledger Working Group delivers a fully implementable security controls checklist for the blockchain framewo... Request to download |
![]() | State of Cloud Security Risk, Compliance, and Misconfigurations - Japanese Translation Release Date: 12/14/2021 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Cloud Incident Response Framework - Korean Translation Release Date: 12/09/2021 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Release Date: 12/08/2021 This document contains auditing guidelines for each of the control specifications within the CCM version 4. The CCM is a detailed controls framework align... Request to download |
![]() | Cloud Key Management System with External Origin Key Release Date: 12/02/2021 The purpose of this document is to provide general guidance for choosing, planning, and deploying cloud-native key management systems (KMS) where there is... Request to download |
![]() | Roles and Responsibilities of Third Party Security Services Release Date: 11/30/2021 As we witness the broader adoption of cloud services, it is no surprise that third-party outsourced services are also on the rise. The security responsibi... Request to download |
![]() | Secure DevOps and Misconfigurations Survey Report Release Date: 11/18/2021 Secure DevOps, DevSecOps, and “shifting left” have become increasingly popular terms in cybersecurity. With the rapid increase both in volume and speed to... Request to download |
![]() | CSA Medical Device Incident Response Playbook Release Date: 11/08/2021 This document presents a best-practices medical device incident response playbook that incorporates clinical aspects of medical device IR. As such, this g... Request to download |
![]() | Secure Connection Requirements of Hybrid Cloud Release Date: 11/05/2021 The National Institute of Standards and Technology (NIST) defines hybrid cloud infrastructure as a composition of distinct cloud infrastructures (pri... Request to download |
![]() | STAR Level 1: Security Questionnaire (CAIQ v4) - Japanese Translation Release Date: 11/02/2021 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |