CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | CSA IoT Security Controls Framework Release Date: 03/05/2019 The Internet of Things (IoT) Security Controls Framework introduces the base-level security controls required to mitigate many of the risks associated with a... Request to download |
![]() | CSA Guide to the IoT Security Controls Framework Release Date: 03/05/2019 The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework spreadsheet. This guide ex... Request to download |
![]() | Release Date: 11/27/2018 Thanks to the rise in popularity of Bitcoin cryptocurrency, the innovative technologies of Blockchain and other systems of distributed ledger technology (DLT... Request to download |
![]() | Using BlockChain Technology to Secure the Internet of Things - Japanese Translation Release Date: 10/03/2018 本書「IoT セキュリティのためのブロックチェーン技術の活用」は、Cloud Security Alliance (CSA)が公開して いる「Using Blockchain Technology to Secure the Internet of Things」の日本語訳です。本書は、CSA ジャパ ンが、CS... Request to download |
![]() | OWASP Secure Medical Devices Deployment Standard Release Date: 08/07/2018 With the explosion of botnets and other malware that now target IoT devices (of which medical devices can be considered a subtype) the need for security-min... Request to download |
![]() | Using BlockChain Technology to Secure the Internet of Things - Chinese Translation Release Date: 08/03/2018 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated c... Request to download |
![]() | The State of Post-Quantum Cryptography Release Date: 05/23/2018 Most people pay little attention to the lock icon on their browser’s address bar that signifies a secure connection called HTTPS. This connection establishes... Request to download |
![]() | A Day Without Safe Cryptography Release Date: 04/19/2018 Over the past fifty years, the digital age has sparked the creation of a remarkable infrastructure through which a nearly infinite variety of digital transac... Request to download |
![]() | Using Blockchain Technology to Secure the Internet of Things Release Date: 02/13/2018 In the last four years, technical experts, chief digital officers, marketing managers, journalists, bloggers and research institutions have discussed and pro... Request to download |
![]() | Quantum-Safe Security Awareness Survey Release Date: 01/26/2018 Quantum computing threatens the security of public key cryptography, which underlies our global digital communications infrastructure. While many significant... Request to download |
![]() | Blockchain/Distributed Ledger Working Group Glossary Release Date: 12/15/2017 Blockchain is a radical, evolving technology and there is little awareness or knowledge regarding security aspects or compliance implications among many t... Request to download |
![]() | Observations and Recommendations on Connected Vehicle Security Release Date: 05/25/2017 The introduction of Connected Vehicles (CVs) has been discussed for many years. Pilot implementations currently underway are evaluating CV operations in real... Request to download |
![]() | Release Date: 03/13/2017 Over the last year or so, the perceived threat of the quantum computer to modern cryptographic standards in widespread use has increased dramatically. Govern... Request to download |
![]() | Establishing a Safe and Secure Municipal Drone Program Release Date: 02/02/2017 This paper provides guidance on the safe and secure introduction and operation of a municipal “drone” program. This paper will try to analyze the drone’s rol... Request to download |
![]() | Quantum Safe Security Glossary Release Date: 01/24/2017 The Quantum-Safe Security (QSS) Working Group was formed to address key generation and transmission methods and to help the industry understand quantum-safe ... Request to download |
![]() | Future Proofing the Connected World Release Date: 10/07/2016 An IoT system is only as secure as its weakest link, this document is our attempt at providing actionable and useful guidance for securing the individual pro... Request to download |
![]() | Quantum Random Number Generators Release Date: 06/09/2016 A random number is generated by a process whose outcome is unpredictable, and which cannot be reliably reproduced. Randomness, quantitatively measured by ent... Request to download |
![]() | What is Post-Quantum Cryptography Release Date: 09/28/2015 Most people pay little attention to the lock icon on their browser address bar that signifies a secure HTTPS connection. They don’t realize that there is an ... Request to download |
![]() | What is Quantum Key Distribution? Release Date: 08/05/2015 The security of QKD relies on fundamental laws of nature, which are invulnerable to increasing computational power, new attack algorithms or quantum computer... Request to download |
![]() | Release Date: 05/19/2015 An overview of current cryptographic techniques being used, proactive defenses, and the threats and impact of quantum computing. Request to download |