CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Cyber Resiliency in the Financial Industry 2024 Survey Report Release Date: 12/09/2024 Data resiliency and operational security have become increasingly critical as digital transformation accelerates. The financial industry faces distinct ch... Request to download |
![]() | Map the Transaction Flows for Zero Trust Release Date: 11/18/2024 The NSTAC Report to the President on Zero Trust defines five steps to implementing a Zero Trust security strategy. This publication provides guidance on e... Request to download |
![]() | Top Concerns With Vulnerability Data Release Date: 11/11/2024 The top vulnerability management frameworks used today include the Common Vulnerabilities and Exposures (CVE) program and the Common Vulnerability Scoring... Request to download |
![]() | Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives Release Date: 11/05/2024 This publication explores the use of asymmetric cryptography in Zero Trust. Asymmetric cryptography provides an industry-standard, secure method to establ... Request to download |
![]() | The State of Multi-Cloud Identity Survey Release Date: 10/29/2024 Enterprises encounter significant obstacles when adopting multi-cloud. Namely, harmonizing hybrid and cloud identity systems for secure integration. Ident... Request to download |
![]() | Zero Trust Guidance for Critical Infrastructure Release Date: 10/28/2024 In most nations, the health of public services relies on secure and resilient Critical Infrastructure. We call these infrastructures "critical" because th... Request to download |
![]() | The State of Non-Human Identity Security Release Date: 09/11/2024 Non-human identities (NHIs) include bots, API keys, service accounts, OAuth tokens, and secrets. These identities keep today’s organizations running smoot... Request to download |
![]() | Confidential Computing Working Group Charter 2024 Release Date: 09/10/2024 The working group is tasked with exploring and implementing Confidential Computing technologies to enhance data security across various industries. This g... Request to download |
![]() | Zero Trust Guiding Principles v1.1 Release Date: 09/03/2024 Zero Trust is a strategic mindset that is highly useful for organizations to adopt as part of their digital transformations. Based on the idea of "never t... Request to download |
![]() | Strengthening Research Integrity with High-Performance Computing (HPC) Security Release Date: 08/07/2024 High-Performance Computing (HPC) systems aggregate computing resources to gain performance greater than that of a single workstation. HPC systems have bec... Request to download |
![]() | Top Threats to Cloud Computing 2024 Release Date: 08/05/2024 The CSA Top Threats Report aims to raise awareness of current cloud security risks, threats, and vulnerabilities. In this 2024 installment, we surveyed ov... Request to download |
![]() | Quantum-Safe Security Governance with the Cloud Controls Matrix Release Date: 07/30/2024 For the last decade or so there have been major developments in the quantum and post-quantum cryptography spaces. The time has come for enterprise IT depa... Request to download |
![]() | Enterprise Authority To Operate (EATO) Controls Framework Release Date: 07/02/2024 Many small and mid-sized cloud-based Anything-as-a-Service (XaaS) vendors struggle to implement robust information security controls. These security gaps ... Request to download |
![]() | SaaS Governance Best Practices for Cloud Customers - Korean Translation Release Date: 06/20/2024 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | CCM v4.0 Implementation Guidelines Release Date: 06/03/2024 This document will help you understand how to navigate through the Cloud Controls Matrix v4 to use it effectively and interpret and implement the CCM cont... Request to download |
![]() | Cloud Controls Matrix and CAIQ v4 Release Date: 06/03/2024 The Cloud Controls Matrix (CCM) is a cybersecurity control framework for cloud computing aligned to the CSA best practices, that is considered the de-facto s... Request to download |
![]() | Identity and Access Management Working Group Charter 2024 Release Date: 06/01/2024 Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using Identity Access Management (IAM)... Request to download |
![]() | Information Technology Governance, Risk, and Compliance in Healthcare v2 Release Date: 05/28/2024 Healthcare organizations are increasingly using cloud services. However, the transition to the cloud presents many Governance, Risk, and Compliance (GRC) ... Request to download |
![]() | The Six Pillars of DevSecOps: Measure, Monitor, Report, and Action Release Date: 05/14/2024 The implementation and maintenance of DevSecOps initiatives can take anywhere from a few months to several years to implement. Therefore, continuous measu... Request to download |
![]() | HSM-as-a-Service Use Cases, Considerations, and Best Practices Release Date: 04/03/2024 A Hardware Security Module (HSM) is a certified, trusted platform for performing cryptographic operations and protecting keys. It is a tamper-responsive a... Request to download |