CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | CCM Video Series: CEK - Cryptography, Encryption, & Key Management Release Date: 11/02/2024 In this presentation we explore the Cryptography, Encryption, and Key Management (CEK) domain within the Cloud Control Matrix (CCM) that comprises twenty-... Request to download |
![]() | CCM Video Series: LOG - Logging & Monitoring Release Date: 11/02/2024 In this presentation we focus on the Logging and Monitoring domain, which includes thirteen control specifications that help both Cloud Service Providers ... Request to download |
![]() | CCM Video Series: STA - Supply Chain Mgmt, Transparency, & Accountability Release Date: 11/02/2024 In this presentation we explore the Supply Chain Management, Transparency, and Accountability (STA) domain, which includes fourteen control specifications... Request to download |
![]() | CCM Video Series: TVM - Threat & Vulnerability Management Release Date: 11/02/2024 In this presentation we cover the Threat and Vulnerability Management (TVM) domain, which features ten control specifications aimed at helping both Cloud ... Request to download |
![]() | CCM Video Series: BCR - Business Continuity Mgmt & Op Resilience Release Date: 11/02/2024 In this presentation, we introduce the CCM business Continuity Management and Operational Resilience domain, comprising eleven control specifications. Thi... Request to download |
![]() | CCM Video Series: DSP - Data Security & Privacy Release Date: 11/02/2024 In this presentation we explore the Data Security and Privacy Lifecycle Management (DSP) domain, which includes nineteen control specifications focused on... Request to download |
![]() | CCM Video Series: IAM - Identity & Access Management Release Date: 11/02/2024 In this presentation we introduce the Identity and Access Management (IAM) domain, which includes sixteen control specifications aimed at helping both Clo... Request to download |
![]() | CCM Video Series: IVS - Infrastructure & Virtualization Security Release Date: 11/02/2024 In this presentation we delve into the Infrastructure and Virtualization Security (IVS) domain, which comprises nine control specifications designed to gu... Request to download |
![]() | The State of Multi-Cloud Identity Survey Release Date: 10/29/2024 Enterprises encounter significant obstacles when adopting multi-cloud. Namely, harmonizing hybrid and cloud identity systems for secure integration. Ident... Request to download |
![]() | Zero Trust Guidance for Critical Infrastructure Release Date: 10/28/2024 In most nations, the health of public services relies on secure and resilient Critical Infrastructure. We call these infrastructures "critical" because th... Request to download |
![]() | Security Guidance for Critical Areas of Focus in Cloud Computing v5 - Japanese Translation Release Date: 10/22/2024 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | AI Organizational Responsibilities - Governance, Risk Management, Compliance and Cultural Aspects Release Date: 10/21/2024 Continuing CSA's efforts to address the evolving AI landscape, this latest publication covers AI governance, risk management, and culture. Understand vari... Request to download |
![]() | NIST CSF v2 Cloud Community Profile - Based on CCM v4 Release Date: 10/15/2024 The CSFv2.0 Cloud Community Profile aligns the Cloud Controls Matrix (CCM) version 4.0 with the Cybersecurity Framework (CSF) version 2.0 by mapping equiv... Request to download |
![]() | Informative Reference Details for the Mapping of CCM v4 to NIST CSF v2 Release Date: 10/08/2024 The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices for securing cloud... Request to download |
![]() | AI in Medical Research: Applications & Considerations Release Date: 09/25/2024 The advent of artificial intelligence (AI) has brought about a paradigm shift in numerous fields. AI technologies can process vast amounts of data, recogn... Request to download |
![]() | AI Organizational Responsibilities - Core Security Responsibilities - Korean Translation Release Date: 09/24/2024 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | AI Resilience: A Revolutionary Benchmarking Model for AI Safety - Japanese Translation Release Date: 09/23/2024 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Don’t Panic! Getting Real about AI Governance Release Date: 09/18/2024 The excitement around Generative AI and its potential business value continues to grow. A major factor is AI systems' emerging capability to mimic human-l... Request to download |
![]() | The State of Non-Human Identity Security Release Date: 09/11/2024 Non-human identities (NHIs) include bots, API keys, service accounts, OAuth tokens, and secrets. These identities keep today’s organizations running smoot... Request to download |
![]() | Confidential Computing Working Group Charter 2024 Release Date: 09/10/2024 The working group is tasked with exploring and implementing Confidential Computing technologies to enhance data security across various industries. This g... Request to download |