ChaptersCircleEventsBlog
Research Publications currently filtered by Term.
×

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

CSA IoT Security Controls Framework

CSA IoT Security Controls Framework

Release Date: 03/05/2019

The Internet of Things (IoT) Security Controls Framework introduces the base-level security controls required to mitigate many of the risks associated with a...

Request to download
CSA Guide to the IoT Security Controls Framework

CSA Guide to the IoT Security Controls Framework

Release Date: 03/05/2019

The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework spreadsheet. This guide ex...

Request to download
Blockchain DLT Use Cases

Blockchain DLT Use Cases

Release Date: 11/27/2018

Thanks to the rise in popularity of Bitcoin cryptocurrency, the innovative technologies of Blockchain and other systems of distributed ledger technology (DLT...

Request to download
Using BlockChain Technology to Secure the Internet of Things - Japanese Translation

Using BlockChain Technology to Secure the Internet of Things - Japanese Translation

Release Date: 10/03/2018

本書「IoT セキュリティのためのブロックチェーン技術の活用」は、Cloud Security Alliance (CSA)が公開して いる「Using Blockchain Technology to Secure the Internet of Things」の日本語訳です。本書は、CSA ジャパ ンが、CS...

Request to download
OWASP Secure Medical Devices Deployment Standard

OWASP Secure Medical Devices Deployment Standard

Release Date: 08/07/2018

With the explosion of botnets and other malware that now target IoT devices (of which medical devices can be considered a subtype) the need for security-min...

Request to download
Using BlockChain Technology to Secure the Internet of Things - Chinese Translation

Using BlockChain Technology to Secure the Internet of Things - Chinese Translation

Release Date: 08/03/2018

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated c...

Request to download
The State of Post-Quantum Cryptography

The State of Post-Quantum Cryptography

Release Date: 05/23/2018

Most people pay little attention to the lock icon on their browser’s address bar that signifies a secure connection called HTTPS. This connection establishes...

Request to download
A Day Without Safe Cryptography

A Day Without Safe Cryptography

Release Date: 04/19/2018

Over the past fifty years, the digital age has sparked the creation of a remarkable infrastructure through which a nearly infinite variety of digital transac...

Request to download
Using Blockchain Technology to Secure the Internet of Things

Using Blockchain Technology to Secure the Internet of Things

Release Date: 02/13/2018

In the last four years, technical experts, chief digital officers, marketing managers, journalists, bloggers and research institutions have discussed and pro...

Request to download
Quantum-Safe Security Awareness Survey

Quantum-Safe Security Awareness Survey

Release Date: 01/26/2018

Quantum computing threatens the security of public key cryptography, which underlies our global digital communications infrastructure. While many significant...

Request to download
Blockchain/Distributed Ledger Working Group Glossary

Blockchain/Distributed Ledger Working Group Glossary

Release Date: 12/15/2017

Blockchain is a radical, evolving technology and there is little awareness or knowledge regarding security aspects or compliance implications among many t...

Request to download
Observations and Recommendations on Connected Vehicle Security

Observations and Recommendations on Connected Vehicle Security

Release Date: 05/25/2017

The introduction of Connected Vehicles (CVs) has been discussed for many years. Pilot implementations currently underway are evaluating CV operations in real...

Request to download
Applied Quantum Safe Security

Applied Quantum Safe Security

Release Date: 03/13/2017

Over the last year or so, the perceived threat of the quantum computer to modern cryptographic standards in widespread use has increased dramatically. Govern...

Request to download
Establishing a Safe and Secure Municipal Drone Program

Establishing a Safe and Secure Municipal Drone Program

Release Date: 02/02/2017

This paper provides guidance on the safe and secure introduction and operation of a municipal “drone” program. This paper will try to analyze the drone’s rol...

Request to download
Quantum Safe Security Glossary

Quantum Safe Security Glossary

Release Date: 01/24/2017

The Quantum-Safe Security (QSS) Working Group was formed to address key generation and transmission methods and to help the industry understand quantum-safe ...

Request to download
Future Proofing the Connected World

Future Proofing the Connected World

Release Date: 10/07/2016

An IoT system is only as secure as its weakest link, this document is our attempt at providing actionable and useful guidance for securing the individual pro...

Request to download
Quantum Random Number Generators

Quantum Random Number Generators

Release Date: 06/09/2016

A random number is generated by a process whose outcome is unpredictable, and which cannot be reliably reproduced. Randomness, quantitatively measured by ent...

Request to download
What is Post-Quantum Cryptography

What is Post-Quantum Cryptography

Release Date: 09/28/2015

Most people pay little attention to the lock icon on their browser address bar that signifies a secure HTTPS connection. They don’t realize that there is an ...

Request to download
What is Quantum Key Distribution?

What is Quantum Key Distribution?

Release Date: 08/05/2015

The security of QKD relies on fundamental laws of nature, which are invulnerable to increasing computational power, new attack algorithms or quantum computer...

Request to download
What is Quantum Safe Security

What is Quantum Safe Security

Release Date: 05/19/2015

An overview of current cryptographic techniques being used, proactive defenses, and the threats and impact of quantum computing.

Request to download