ChaptersCircleEventsBlog

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

Future Proofing the Connected World - Korean Translation

Future Proofing the Connected World - Korean Translation

Release Date: 02/26/2019

An IoT system is only as secure as its weakest link, this document is our attempt at providing actionable and useful guidance for securing the individual pro...

Request to download
High Performance Computing (HPC) Cloud Security Working Group Charter

High Performance Computing (HPC) Cloud Security Working Group Charter

Release Date: 02/26/2019

To develop a holistic security framework for cloud infrastructure architected for High Performance Computing needs, with the aim of securing where the cloud ...

Request to download
CCM Mapping Workpackage Template

CCM Mapping Workpackage Template

Release Date: 02/14/2019

This document is the companion document to the Methodology for the Mapping of the Cloud Controls Matrix (CCM). It is a CCM mapping workpackage template that ...

Request to download
The 12 Most Critical Risks for Serverless Applications

The 12 Most Critical Risks for Serverless Applications

Release Date: 02/11/2019

The 12 Most Critical Risks for Serverless Applications 2019 document is meant to serve as a security awareness and education guide. This report was curated a...

Request to download
Cloud Incident Response Charter

Cloud Incident Response Charter

Release Date: 01/21/2019

To develop a holistic Cloud Incident Response (CIR) framework that comprehensively covers key causes of cloud outages (both security and non-security related...

Request to download
CCM v3.0.1 Addendum - BSI Germany C5 v1

CCM v3.0.1 Addendum - BSI Germany C5 v1

Release Date: 01/18/2019

This document is an addendum to the Cloud Controls Matrix (CCM) V3.0.1 controls. It contains the additional controls that serves to bridge the gap between CC...

Request to download
CCM v3.0.1 Addendum - ISO 27002 27017 27018 v1.1

CCM v3.0.1 Addendum - ISO 27002 27017 27018 v1.1

Release Date: 01/18/2019

This document is an addendum to the Cloud Controls Matrix (CCM) V3.0.1 controls. It contains the additional controls that serves to bridge the gap between CC...

Request to download
Enterprise Resource Planning and Cloud Adoption

Enterprise Resource Planning and Cloud Adoption

Release Date: 01/11/2019

The “Impact of Cloud on ERP” survey report was designed to assess the impact of ERP solutions on organizations and better understand cloud preparation and da...

Request to download
Guideline on Effectively Managing Security Service in the Cloud - Chinese Translation

Guideline on Effectively Managing Security Service in the Cloud - Chinese Translation

Release Date: 01/09/2019

This initiative aims to develop a research whitepaper, focusing on building up a cloud security services management platform. This whitepaper will serve as a...

Request to download
Guideline on Effectively Managing Security Service in the Cloud

Guideline on Effectively Managing Security Service in the Cloud

Release Date: 01/04/2019

This initiative aims to develop a research whitepaper, focusing on building up a cloud security services management platform. This whitepaper will serve as a...

Request to download
Streamlining Vendor IT Security and Risk Assessments

Streamlining Vendor IT Security and Risk Assessments

Release Date: 12/09/2018

Cloud computing has rapidly gained traction as a significant and even default IT system for many different organizations. In such a dynamic environment, cybe...

Request to download
Blockchain DLT Use Cases

Blockchain DLT Use Cases

Release Date: 11/27/2018

Thanks to the rise in popularity of Bitcoin cryptocurrency, the innovative technologies of Blockchain and other systems of distributed ledger technology (DLT...

Request to download
HIM Working Group Charter

HIM Working Group Charter

Release Date: 11/24/2018

The use of new technologies, such as cloud services and the Internet of Things (IoT), will disrupt legacy systems and the chain of data processing in the sup...

Request to download
Security Guidance v4.0 Info Sheet

Security Guidance v4.0 Info Sheet

Release Date: 11/09/2018

This version, the first major update since 2011, is the culmination of over a year of dedicated research and public participation from the CSA community, wor...

Request to download
CCM v3.0 - Chinese Translation

CCM v3.0 - Chinese Translation

Release Date: 10/19/2018

The Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM) provides fundamental security principles to guide cloud vendors and cloud customers seeking to ...

Request to download
Security Guidance for Critical Areas of Focus in Cloud Computing v4.0 (Spanish Translation)

Security Guidance for Critical Areas of Focus in Cloud Computing v4.0 (Spanish Translation)

Release Date: 10/19/2018

Con este documento, nuestro objetivo es proporcionar tanto orientación como inspiración para respaldar los objetivos comerciales, mientras se gestionan y m...

Request to download
Using BlockChain Technology to Secure the Internet of Things - Japanese Translation

Using BlockChain Technology to Secure the Internet of Things - Japanese Translation

Release Date: 10/03/2018

本書「IoT セキュリティのためのブロックチェーン技術の活用」は、Cloud Security Alliance (CSA)が公開して いる「Using Blockchain Technology to Secure the Internet of Things」の日本語訳です。本書は、CSA ジャパ ンが、CS...

Request to download
IoT Firmware Update Processes

IoT Firmware Update Processes

Release Date: 09/20/2018

The traditional approach to updating software for IT assets involves analysis, staging and distribution of the update—a process that usually occurs during of...

Request to download
Code of Conduct for GDPR Compliance - Japanese Translation

Code of Conduct for GDPR Compliance - Japanese Translation

Release Date: 09/14/2018

説明: 本書「GDPR 準拠の為の行動規範」は、Cloud Security Alliance (CSA)が公開している「CODE OF CONDUCT FOR GDPR COMPLIANCE」の日本語訳および一般社団法人日本クラウドセキュリティアライア ンス(CSAジャパン)が解説を加えたものです...

Request to download
Top Threats to Cloud Computing: Deep Dive

Top Threats to Cloud Computing: Deep Dive

Release Date: 08/08/2018

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its foundation. Each...

Request to download