CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Cloud Threat Modeling - Japanese Translation Release Date: 11/01/2021 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Toward a Zero Trust Architecture Release Date: 10/27/2021 Enterprise stakeholders must consider the challenges of increased real-time system complexity, the need for new cybersecurity policy and strong cultural s... Request to download |
![]() | Release Date: 10/26/2021 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | CCM and CAIQ v4 - Chinese Translations Release Date: 10/26/2021 This localized version of this publication was produced from the original source material (CCM, CAIQ) through the efforts of local organizations and the C... Request to download |
![]() | CCM and CAIQ v4 -Japanese Translations Release Date: 10/26/2021 This localized version of this publication was produced from the original source material (CCM, CAIQ) through the efforts of chapters and volunteers but t... Request to download |
![]() | Release Date: 10/26/2021 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Release Date: 10/26/2021 This localized version of this publication was produced from the original source material (CCM, CAIQ) through the efforts of local organizations and the C... Request to download |
![]() | The Continuous Audit Metrics Catalog Release Date: 10/19/2021 Are traditional infosec assurance tools outdated? Many cloud customers think so. They see that technology changes quickly, and products are frequently evo... Request to download |
![]() | CCM v4 - Hungarian Translation Release Date: 10/19/2021 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Practical Preparations for the Post-Quantum World Release Date: 10/19/2021 This document discusses the cybersecurity challenges and recommended steps to reduce likely new risks due to quantum information sciences. This paper was ... Request to download |
![]() | Information Technology Governance, Risk and Compliance in Healthcare Release Date: 10/15/2021 Information Technology (IT) Governance, Risk, and Compliance (GRC), are three words that have a significant impact on organizations. While each term seems... Request to download |
![]() | Top 10 Blockchain Attacks, Vulnerabilities & Weaknesses Release Date: 09/27/2021 Cryptocurrencies and other blockchain virtual assets have been the target of the majority of Distributed Ledger Technology (DLT) attacks and a variety of ... Request to download |
![]() | State of Cloud Security Risk, Compliance, and Misconfigurations Release Date: 09/17/2021 Cloud misconfigurations consistently are a top concern for organizations utilizing public cloud. Such errors lead to data breaches, allow the deletion or ... Request to download |
![]() | Ransomware in the Healthcare Cloud Release Date: 09/15/2021 Ransomware is the fastest-growing malware threat today. Over the last few years, it has risen to epidemic proportions, quickly becoming a significant reve... Request to download |
![]() | How to Design a Secure Serverless Architecture 2021 Release Date: 09/14/2021 Like any solution, serverless computing brings with it a variety of cyber risks. This paper covers security for serverless applications, focusing on best pra... Request to download |
![]() | Recommendations for Adopting a Cloud-Native Key Management Service Release Date: 09/14/2021 Cloud-native key management services (KMS) offer organizations of any size and complexity a low-cost option for meeting their needs for key management, pa... Request to download |
![]() | The Evolution of STAR: Introducing Continuous Auditing Release Date: 09/14/2021 The CSA Continuous Auditing Certification (aka STAR Level 3) is the most rigorous assurance tier in the STAR program. Level 3 certified services providers... Request to download |
![]() | Microservices Architecture Pattern Release Date: 08/31/2021 This document provides a repeatable approach to architecting, developing, and deploying microservices as Microservices Architecture Patterns (MAPs). The p... Request to download |
![]() | Process for CSA International Standardization Council (ISC) Standards Liaison Officer Release Date: 08/18/2021 The Cloud Security Alliance (CSA) has designated a council to coordinate all aspects of standardization efforts within the CSA. The role of the council is... Request to download |
![]() | Top Threats to Cloud Computing: Egregious Eleven - Korean Translation Release Date: 08/17/2021 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |