ChaptersCircleEventsBlog
Research Publications currently filtered by Term.
×

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Software-Defined Perimeter (SDP) Specification v2.0

Software-Defined Perimeter (SDP) Specification v2.0

Release Date: 03/10/2022

The Software-Defined Perimeter (SDP) architecture is an effective way to implement the principles of Zero Trust. SDP aims to give enterprise security arch...

Request to download
How to Design a Secure Serverless Architecture - Chinese Translation

How to Design a Secure Serverless Architecture - Chinese Translation

Release Date: 02/07/2022

Like any solution, serverless computing brings with it a variety of cyber risks. This paper covers security for serverless applications, focusing on best pra...

Request to download
Blockchains in the Quantum Era - Chinese Translation

Blockchains in the Quantum Era - Chinese Translation

Release Date: 02/06/2022

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Secure Connection Requirements of Hybrid Cloud

Secure Connection Requirements of Hybrid Cloud

Release Date: 11/05/2021

The National Institute of Standards and Technology (NIST) defines hybrid cloud infrastructure as a composition of distinct cloud infrastructures (pri...

Request to download
The Continuous Audit Metrics Catalog

The Continuous Audit Metrics Catalog

Release Date: 10/19/2021

Are traditional infosec assurance tools outdated? Many cloud customers think so. They see that technology changes quickly, and products are frequently evo...

Request to download
How to Design a Secure Serverless Architecture 2021

How to Design a Secure Serverless Architecture 2021

Release Date: 09/14/2021

Like any solution, serverless computing brings with it a variety of cyber risks. This paper covers security for serverless applications, focusing on best pra...

Request to download
Recommendations for Adopting a Cloud-Native Key Management Service

Recommendations for Adopting a Cloud-Native Key Management Service

Release Date: 09/14/2021

Cloud-native key management services (KMS) offer organizations of any size and complexity a low-cost option for meeting their needs for key management, pa...

Request to download
Hyperledger Fabric 2.0 Architecture Security Report

Hyperledger Fabric 2.0 Architecture Security Report

Release Date: 06/28/2021

Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many...

Request to download
Hyperledger Fabric 2.0 Architecture Security Controls Checklist

Hyperledger Fabric 2.0 Architecture Security Controls Checklist

Release Date: 06/28/2021

Blockchain technology is being rapidly adopted by enterprises to bring traceability and transparency to external business workflows. Considering that many...

Request to download
CSA Guide to the IoT Security Controls Framework v2 - Japanese Translation

CSA Guide to the IoT Security Controls Framework v2 - Japanese Translation

Release Date: 05/28/2021

The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework spreadsheet. This guide ex...

Request to download
Crypto-Asset Exchange Security Guidelines

Crypto-Asset Exchange Security Guidelines

Release Date: 04/13/2021

Thanks to the blockchain technology that makes them possible, crypto-assets are becoming massively successful. As with any successful industry, a multitud...

Request to download
CSA STAR Level 3 Focus Group Charter

CSA STAR Level 3 Focus Group Charter

Release Date: 04/02/2021

The CSA STAR Level 3 Focus Group  will advise on the scope, objectives, structure, go-to-market (GTM) strategy and value proposition for STAR Level 3...

Request to download
Software Defined Perimeter Architecture Guide: Korean Translation

Software Defined Perimeter Architecture Guide: Korean Translation

Release Date: 04/01/2021

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Blockchains in the Quantum Era

Blockchains in the Quantum Era

Release Date: 02/05/2021

Digital Ledger Technologies (DLT) such as blockchain are being deployed as part of diverse applications that span multiple market segments. Application devel...

Request to download
The Six Pillars of DevSecOps: Automation

The Six Pillars of DevSecOps: Automation

Release Date: 07/06/2020

Automation is a critical component of DevSecOps because it enables process efficiency, allowing developers, infrastructure, and information security teams to...

Request to download
Financial Services Stakeholders Platform Working Group Charter

Financial Services Stakeholders Platform Working Group Charter

Release Date: 06/09/2020

Information security plays an integral role in the regulation and protection of customers in the financial industry. Exploring cloud computing and the underl...

Request to download
Managing the Risk for Medical Devices Connected to the Cloud

Managing the Risk for Medical Devices Connected to the Cloud

Release Date: 03/16/2020

With the increased number of Internet of Things devices, Healthcare Delivery Organizations are experiencing a digital transformation bigger than anything in ...

Request to download
Documentation of Relevant Distributed Ledger Technology and Blockchain Use Cases v2

Documentation of Relevant Distributed Ledger Technology and Blockchain Use Cases v2

Release Date: 07/31/2019

Thanks to the rise in popularity of Bitcoin cryptocurrency, the innovative technologies of Blockchain and other systems of distributed ledger technology (DLT...

Request to download
Mitigating the Quantum Threat with Hybrid Cryptography

Mitigating the Quantum Threat with Hybrid Cryptography

Release Date: 06/17/2019

Focus of this document is on four hybrid cryptographic schemes which provide both classical security of classical crypto and the quantum security of a quantu...

Request to download
SDP Architecture Guide v2

SDP Architecture Guide v2

Release Date: 05/07/2019

Software Defined Perimeter (SDP) Architecture Guide is designed to leverage proven, standards-based components to stop network attacks against application in...

Request to download