CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Context-Based Access Control for Zero Trust Release Date: 01/15/2025 Traditional access decision-making is agnostic to both Zero Trust and context. Historically, security teams based access decisions on trust. The common ac... Request to download |
![]() | Zero Trust Guidance for Small and Medium Size Businesses (SMBs) Release Date: 01/13/2025 Cybersecurity for small businesses involves unique and heightened challenges. This makes the adoption of a Zero Trust strategy critical for safeguarding t... Request to download |
![]() | Cloud Security for Startups 2024 Release Date: 12/18/2024 Volunteers from the CSA Israel Chapter produced this publication. The content development falls outside the CSA Research Lifecycle. For any questions and ... Request to download |
![]() | Key Management for Public Cloud Migration Release Date: 12/17/2024 More and more organizations are adopting public cloud technologies. This leads to a mass data migration where existing applications that are on-premises o... Request to download |
![]() | Top Threats to Cloud Computing 2024 - Japanese Translation Release Date: 12/12/2024 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Cyber Resiliency in the Financial Industry 2024 Survey Report Release Date: 12/09/2024 Data resiliency and operational security have become increasingly critical as digital transformation accelerates. The financial industry faces distinct ch... Request to download |
![]() | Map the Transaction Flows for Zero Trust Release Date: 11/18/2024 The NSTAC Report to the President on Zero Trust defines five steps to implementing a Zero Trust security strategy. This publication provides guidance on e... Request to download |
![]() | Top Concerns With Vulnerability Data Release Date: 11/11/2024 The top vulnerability management frameworks used today include the Common Vulnerabilities and Exposures (CVE) program and the Common Vulnerability Scoring... Request to download |
![]() | Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives Release Date: 11/05/2024 This publication explores the use of asymmetric cryptography in Zero Trust. Asymmetric cryptography provides an industry-standard, secure method to establ... Request to download |
![]() | The State of Multi-Cloud Identity Survey Release Date: 10/29/2024 Enterprises encounter significant obstacles when adopting multi-cloud. Namely, harmonizing hybrid and cloud identity systems for secure integration. Ident... Request to download |
![]() | Zero Trust Guidance for Critical Infrastructure Release Date: 10/28/2024 In most nations, the health of public services relies on secure and resilient Critical Infrastructure. We call these infrastructures "critical" because th... Request to download |
![]() | The State of Non-Human Identity Security Release Date: 09/11/2024 Non-human identities (NHIs) include bots, API keys, service accounts, OAuth tokens, and secrets. These identities keep today’s organizations running smoot... Request to download |
![]() | Confidential Computing Working Group Charter 2024 Release Date: 09/10/2024 The working group is tasked with exploring and implementing Confidential Computing technologies to enhance data security across various industries. This g... Request to download |
![]() | Zero Trust Guiding Principles v1.1 Release Date: 09/03/2024 Zero Trust is a strategic mindset that is highly useful for organizations to adopt as part of their digital transformations. Based on the idea of "never t... Request to download |
![]() | Strengthening Research Integrity with High-Performance Computing (HPC) Security Release Date: 08/07/2024 High-Performance Computing (HPC) systems aggregate computing resources to gain performance greater than that of a single workstation. HPC systems have bec... Request to download |
![]() | Top Threats to Cloud Computing 2024 Release Date: 08/05/2024 The CSA Top Threats Report aims to raise awareness of current cloud security risks, threats, and vulnerabilities. In this 2024 installment, we surveyed ov... Request to download |
![]() | Quantum-Safe Security Governance with the Cloud Controls Matrix Release Date: 07/30/2024 For the last decade or so there have been major developments in the quantum and post-quantum cryptography spaces. The time has come for enterprise IT depa... Request to download |
![]() | Enterprise Authority To Operate (EATO) Controls Framework Release Date: 07/02/2024 Many small and mid-sized cloud-based Anything-as-a-Service (XaaS) vendors struggle to implement robust information security controls. These security gaps ... Request to download |
![]() | SaaS Governance Best Practices for Cloud Customers - Korean Translation Release Date: 06/20/2024 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | CCM v4.0 Implementation Guidelines Release Date: 06/03/2024 This document will help you understand how to navigate through the Cloud Controls Matrix v4 to use it effectively and interpret and implement the CCM cont... Request to download |