CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Top Threats to Cloud Computing: Egregious Eleven - Japanese Translation Release Date: 11/18/2019 The purpose of the report is to provide organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated ... Request to download |
![]() | Software-Defined Perimeter as a DDoS Prevention Mechanism Release Date: 10/27/2019 The primary goal of this document is to increase the awareness and understanding of SDP as a tool to prevent DDoS attacks by demonstrating its efficiency and... Request to download |
![]() | Mobile Application Security Testing (MAST) - Charter Release Date: 10/22/2019 Mobile Applications are becoming an integral part of not just modern enterprises but also of human existence and a huge part of this shift is due to the emer... Request to download |
![]() | Mapping of 'The Guidelines' Security Recommendations to CCM Release Date: 09/05/2019 This document contains the additional controls that serves to bridge the gap between CCM V3.0.1 and the controls within 'Guideline on Effectively Managing Se... Request to download |
![]() | Release Date: 09/05/2019 The report summarizes the mapping of CCM v3.0.1 to 'Guideline on Effectively Managing Security Services in the Cloud' and provides gap analysis on the result... Request to download |
![]() | Release Date: 08/07/2019 In our current state of cyber security, there has been a large growth of application flaws that bypass the continuing addition of security frameworks to ensu... Request to download |
![]() | Top Threats to Cloud Computing: Egregious Eleven Release Date: 08/06/2019 The report provides organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated risk-management deci... Request to download |
![]() | Release Date: 08/03/2019 The CCM, the only meta-framework of cloud-specific security controls, mapped to leading standards, best practices and regulations. CCM provides organizations... Request to download |
![]() | CCM v3.0.1 Addendum - FedRAMP Moderate Release Date: 08/03/2019 This document is an addendum to the CCM V3.0.1 that contain controls mapping between the CSA CCM and the FedRAMP R4 Moderate Baseline. The document aims to ... Request to download |
![]() | CSA CCM v3.0.1 Addendum - NIST 800-53 Rev 4 Moderate Release Date: 08/03/2019 This document is an addendum to the CCM V3.0.1 that contain controls mapping between the CSA CCM and the NIST 800-53 R4 Moderate Baseline. The document aims ... Request to download |
![]() | CSA CCM v3.0.1 Addendum - AICPA TSC 2017 Release Date: 08/03/2019 This document is an addendum to the CCM V3.0.1 that contain controls mapping between the CSA CCM and the AICPA TSC 2017. The document aims to help AICPA TSC ... Request to download |
![]() | Release Date: 08/03/2019 The CCM, the only meta-framework of cloud-specific security controls, mapped to leading standards, best practices and regulations. CCM provides organizations... Request to download |
![]() | Information Security Management through Reflexive Security Release Date: 08/01/2019 This document defines “Reflexive Security” as a new security management approach that is built upon the interrelationships between security, development and ... Request to download |
![]() | Documentation of Relevant Distributed Ledger Technology and Blockchain Use Cases v2 Release Date: 07/31/2019 Thanks to the rise in popularity of Bitcoin cryptocurrency, the innovative technologies of Blockchain and other systems of distributed ledger technology (DLT... Request to download |
![]() | Best Practices for Implementing a Secure Application Container Architecture Release Date: 07/26/2019 Application containers and a microservices architecture are being used to design, develop and deploy applications leveraging agile software development appro... Request to download |
![]() | Release Date: 07/25/2019 New Services and Tools for Cyber-Crime. The H2020 EU funded project, Takedown, in which CSA participated along with 18 other partners-organisations, deliver... Request to download |
![]() | Challenges in Securing Application Containers and Microservices Release Date: 07/16/2019 Application containers and a microservices architecture are being used to design, develop and deploy applications leveraging agile software development appro... Request to download |
![]() | Cloud Penetration Testing Playbook Release Date: 07/12/2019 As cloud services continue to enable new technologies and see massive adoption there is a need to extend the scope of penetration testing into public cloud s... Request to download |
![]() | CCM and CAIQ v3 (Japanese Translations) Release Date: 07/10/2019 This localized version of this publication was produced from the original source material (CCM, CAIQ) through the efforts of chapters and volunteers but t... Request to download |
![]() | Software Defined Perimeter (SDP): Awareness and Adoption Infographic Release Date: 07/01/2019 A majority of organizations recognize the need to change their approach to user access control. SDP is seeing early market adoption and awareness, with under... Request to download |