CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Software Defined Perimeter Glossary Release Date: 06/12/2018 The Software Defined Perimeter (SDP) Glossary is a reference document that brings together SDP related terms and definitions from various professional resour... Request to download |
![]() | The State of Post-Quantum Cryptography Release Date: 05/23/2018 Most people pay little attention to the lock icon on their browser’s address bar that signifies a secure connection called HTTPS. This connection establishes... Request to download |
![]() | The Treacherous 12 – Top Threats to Cloud Computing + Industry Insights - Japanese Translation Release Date: 05/21/2018 誰も予測できなかった速さで、クラウドコンピューティングはビジネスや政府に等しく変容を迫り、そ して新たなセキュリティ課題をもたらしている。クラウドのサービスモデルが開発されることで、ビジ ネスを支える技術はかつてないほど効率性の高いものになった。サーバを保有する発想からサービ ス利用ベースの思考への転換は、IT ... Request to download |
![]() | Justify Your Investment in CCSK Training Release Date: 05/02/2018 The Certificate of Cloud Security Knowledge (CCSK) Foundation class provides students a comprehensive review of cloud security fundamentals and a detailed de... Request to download |
![]() | A Day Without Safe Cryptography Release Date: 04/19/2018 Over the past fifty years, the digital age has sparked the creation of a remarkable infrastructure through which a nearly infinite variety of digital transac... Request to download |
![]() | GDPR Preparation and Awareness Survey Report Release Date: 04/17/2018 Cloud computing, the Internet of Things, Artificial Intelligence, and other new technologies allow businesses to have better customer engagement, more access... Request to download |
![]() | Best Practices for Cyber Incident Exchange Release Date: 04/16/2018 No organization is immune from cyber attack. Malicious actors collaborate with skill and agility, effectively moving from target to target at a breakneck pac... Request to download |
![]() | Release Date: 04/16/2018 Innovators and early adopters have been using cloud for years taking advantage of the quicker deployment, greater scalability, and cost saving of services. T... Request to download |
![]() | Using Blockchain Technology to Secure the Internet of Things Release Date: 02/13/2018 In the last four years, technical experts, chief digital officers, marketing managers, journalists, bloggers and research institutions have discussed and pro... Request to download |
![]() | The State of Enterprise Resource Planning Security in the Cloud Release Date: 02/07/2018 The State of ERP Security in the Cloud briefly highlights some of the issues and challenges of migrating ERP solutions to the cloud. The document examines co... Request to download |
![]() | Quantum-Safe Security Awareness Survey Release Date: 01/26/2018 Quantum computing threatens the security of public key cryptography, which underlies our global digital communications infrastructure. While many significant... Request to download |
![]() | Blockchain/Distributed Ledger Working Group Glossary Release Date: 12/15/2017 Blockchain is a radical, evolving technology and there is little awareness or knowledge regarding security aspects or compliance implications among many t... Request to download |
![]() | Security Guidance for Critical Areas of Focus in Cloud Computing v4.0 - Japanese Translation Release Date: 12/15/2017 The rise of cloud computing as an ever-evolving technology brings with it a number of opportunities and challenges. With this document, we aim to provide bot... Request to download |
![]() | Release Date: 11/20/2017 As a SaaS startup understand how to gain and maintain customers’ trust, by building solid security foundations at an early stage of your product development ... Request to download |
![]() | Top Threats to Cloud Computing Plus: Industry Insights Release Date: 10/20/2017 Abstract: The Top Threats to Cloud Computing Plus: Industry Insights serves as a validation of the relevance of security issues discussed in the earlier docu... Request to download |
![]() | Consensus Assessments Initiative Questionnaire v3.0.1 [NO LONGER SUPPORTED] Release Date: 10/12/2017 The 3.0.1 version of the CAIQ is no longer supported. To get the new CAIQ 3.1 version, please visit this link: https://cloudsecurityalliance.org/artifacts/co... Request to download |
![]() | Improving Metrics in Cyber Resiliency Release Date: 08/30/2017 Cyber resiliency is important as it gives us “the ability to prepare and plan for, absorb, recover from, or more successfully adapt to actual or potential ad... Request to download |
![]() | Security Guidance for Early Adopters of the Internet of Things - Chinese Translation Release Date: 08/03/2017 This document provides guidance for the secure implementation of Internet of Things (IoT)-based systems. We have provided the guidance in this document to a... Request to download |
![]() | Security Guidance for Critical Areas of Focus in Cloud Computing v4.0 Release Date: 07/26/2017 The rise of cloud computing as an ever-evolving technology brings with it a number of opportunities and challenges. With this document, we aim to provide bot... Request to download |
![]() | Top Threats to Cloud Computing Deep Dive: Chinese Translation Release Date: 06/24/2017 This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its foundation. Each... Request to download |