CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | A Repeatable Cloud-first Deployment Process Model Release Date: 06/06/2017 By now the benefits of cloud computing are generally understood at high level. What is not necessarily clear are the details of the potential security, legal... Request to download |
![]() | Observations and Recommendations on Connected Vehicle Security Release Date: 05/25/2017 The introduction of Connected Vehicles (CVs) has been discussed for many years. Pilot implementations currently underway are evaluating CV operations in real... Request to download |
![]() | State of Cloud Adoption in APAC 2017 Release Date: 04/23/2017 Request to download |
![]() | Custom Applications and IaaS Trends 2017 Release Date: 04/07/2017 Despite the wide range of commercial off-the-shelf applications, both on-premises and cloud-based, enterprises continue to develop their own custom applicati... Request to download |
![]() | Release Date: 03/13/2017 Over the last year or so, the perceived threat of the quantum computer to modern cryptographic standards in widespread use has increased dramatically. Govern... Request to download |
![]() | Release Date: 02/13/2017 Obtain a clear sense of the security challenges facing enterprise users of IaaS, understand the problems that arise from combining native IaaS access control... Request to download |
![]() | Establishing a Safe and Secure Municipal Drone Program Release Date: 02/02/2017 This paper provides guidance on the safe and secure introduction and operation of a municipal “drone” program. This paper will try to analyze the drone’s rol... Request to download |
![]() | Quantum Safe Security Glossary Release Date: 01/24/2017 The Quantum-Safe Security (QSS) Working Group was formed to address key generation and transmission methods and to help the industry understand quantum-safe ... Request to download |
![]() | Cloud Adoption and Security in India Release Date: 11/22/2016 The “State on Cloud Adoption and Security in 2016: India” survey was circulated in an effort to understand and evaluate cloud computing trends in India. We h... Request to download |
![]() | Cloud Adoption Practices & Priorities in the Chinese Financial Sector Release Date: 10/28/2016 We circulated the “Financial Services Industry Cloud Adoption Survey: China” survey to IT and security professionals in the Financial Services Institutions (... Request to download |
![]() | CloudWatch2 Risk Based Decision Making Mechanisms For Cloud Service In The Public Sector Release Date: 10/27/2016 Despite the undisputed advantages of cloud computing, customers (in particular Public Administrations or PAs, and Small and Medium-sized Enterprises or SMEs)... Request to download |
![]() | Release Date: 10/19/2016 As a follow up to the Top Threats in Cloud Computing and from the months of May to July 2016 we surveyed approximately 100 professionals on the extent of the... Request to download |
![]() | Future Proofing the Connected World Release Date: 10/07/2016 An IoT system is only as secure as its weakest link, this document is our attempt at providing actionable and useful guidance for securing the individual pro... Request to download |
![]() | Big Data Security and Privacy Handbook Release Date: 08/26/2016 The term “big data” refers to the massive amounts of digital information companies and governments collect about human beings and our environment. This Cloud... Request to download |
![]() | Release Date: 08/17/2016 With several years of cloud adoption in organizations, approaches to security have been evolving rapidly. To dig deeper into these concerns and the controls ... Request to download |
![]() | Release Date: 07/15/2016 Request to download |
![]() | Mobile Application Security Testing Release Date: 06/30/2016 The Mobile Application Security Testing (MAST) Initiative is a research which aims to help organizations and individuals reduce the possible risk exposures a... Request to download |
![]() | Quantum Random Number Generators Release Date: 06/09/2016 A random number is generated by a process whose outcome is unpredictable, and which cannot be reliably reproduced. Randomness, quantitatively measured by ent... Request to download |
![]() | Release Date: 04/19/2016 The goal of the Identity Solutions: Security Beyond the Perimeter survey was to address Insufficient Identity, Credential, and Access Management and gain a b... Request to download |
![]() | CSA STAR Program & Open Certification Framework in 2016 and Beyond Release Date: 04/12/2016 The Cloud Security Alliance (CSA) Security, Trust and Assurance Registry (STAR) program is the industry’s leading trust mark for cloud security. The CSA Open... Request to download |