ChaptersCircleEventsBlog
Join us for the in-person CCSK Azure course at Black Hat from August 4–5! Register now for a hands-on deep dive and secure your spot now!
Research Publications currently filtered by Term.
×

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Context-Based Access Control for Zero Trust

Context-Based Access Control for Zero Trust

Release Date: 01/15/2025

Traditional access decision-making is agnostic to both Zero Trust and context. Historically, security teams based access decisions on trust. The common ac...

Request to download
Zero Trust Guidance for Small and Medium Size Businesses (SMBs)

Zero Trust Guidance for Small and Medium Size Businesses (SMBs)

Release Date: 01/13/2025

Cybersecurity for small businesses involves unique and heightened challenges. This makes the adoption of a Zero Trust strategy critical for safeguarding t...

Request to download
Cloud Security for Startups 2024

Cloud Security for Startups 2024

Release Date: 12/18/2024

Volunteers from the CSA Israel Chapter produced this publication. The content development falls outside the CSA Research Lifecycle. For any questions and ...

Request to download
Key Management for Public Cloud Migration

Key Management for Public Cloud Migration

Release Date: 12/17/2024

More and more organizations are adopting public cloud technologies. This leads to a mass data migration where existing applications that are on-premises o...

Request to download
Top Threats to Cloud Computing 2024 - Japanese Translation

Top Threats to Cloud Computing 2024 - Japanese Translation

Release Date: 12/12/2024

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Cyber Resiliency in the Financial Industry 2024 Survey Report

Cyber Resiliency in the Financial Industry 2024 Survey Report

Release Date: 12/09/2024

Data resiliency and operational security have become increasingly critical as digital transformation accelerates. The financial industry faces distinct ch...

Request to download
Map the Transaction Flows for Zero Trust

Map the Transaction Flows for Zero Trust

Release Date: 11/18/2024

The NSTAC Report to the President on Zero Trust defines five steps to implementing a Zero Trust security strategy. This publication provides guidance on e...

Request to download
Top Concerns With Vulnerability Data

Top Concerns With Vulnerability Data

Release Date: 11/11/2024

The top vulnerability management frameworks used today include the Common Vulnerabilities and Exposures (CVE) program and the Common Vulnerability Scoring...

Request to download
Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives

Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives

Release Date: 11/05/2024

This publication explores the use of asymmetric cryptography in Zero Trust. Asymmetric cryptography provides an industry-standard, secure method to establ...

Request to download
The State of Multi-Cloud Identity Survey

The State of Multi-Cloud Identity Survey

Release Date: 10/29/2024

Enterprises encounter significant obstacles when adopting multi-cloud. Namely, harmonizing hybrid and cloud identity systems for secure integration. Ident...

Request to download
Zero Trust Guidance for Critical Infrastructure

Zero Trust Guidance for Critical Infrastructure

Release Date: 10/28/2024

In most nations, the health of public services relies on secure and resilient Critical Infrastructure. We call these infrastructures "critical" because th...

Request to download
The State of Non-Human Identity Security

The State of Non-Human Identity Security

Release Date: 09/11/2024

Non-human identities (NHIs) include bots, API keys, service accounts, OAuth tokens, and secrets. These identities keep today’s organizations running smoot...

Request to download
Confidential Computing Working Group Charter 2024

Confidential Computing Working Group Charter 2024

Release Date: 09/10/2024

The working group is tasked with exploring and implementing Confidential Computing technologies to enhance data security across various industries. This g...

Request to download
Zero Trust Guiding Principles v1.1

Zero Trust Guiding Principles v1.1

Release Date: 09/03/2024

Zero Trust is a strategic mindset that is highly useful for organizations to adopt as part of their digital transformations. Based on the idea of "never t...

Request to download
Strengthening Research Integrity with High-Performance Computing (HPC) Security

Strengthening Research Integrity with High-Performance Computing (HPC) Security

Release Date: 08/07/2024

High-Performance Computing (HPC) systems aggregate computing resources to gain performance greater than that of a single workstation. HPC systems have bec...

Request to download
Top Threats to Cloud Computing 2024

Top Threats to Cloud Computing 2024

Release Date: 08/05/2024

The CSA Top Threats Report aims to raise awareness of current cloud security risks, threats, and vulnerabilities. In this 2024 installment, we surveyed ov...

Request to download
Quantum-Safe Security Governance with the Cloud Controls Matrix

Quantum-Safe Security Governance with the Cloud Controls Matrix

Release Date: 07/30/2024

For the last decade or so there have been major developments in the quantum and post-quantum cryptography spaces. The time has come for enterprise IT depa...

Request to download
Enterprise Authority To Operate (EATO) Controls Framework

Enterprise Authority To Operate (EATO) Controls Framework

Release Date: 07/02/2024

Many small and mid-sized cloud-based Anything-as-a-Service (XaaS) vendors struggle to implement robust information security controls. These security gaps ...

Request to download
SaaS Governance Best Practices for Cloud Customers - Korean Translation

SaaS Governance Best Practices for Cloud Customers - Korean Translation

Release Date: 06/20/2024

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
CCM v4.0 Implementation Guidelines

CCM v4.0 Implementation Guidelines

Release Date: 06/03/2024

This document will help you understand how to navigate through the Cloud Controls Matrix v4 to use it effectively and interpret and implement the CCM cont...

Request to download