CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Cloud Incident Response Framework – A Quick Guide Release Date: 04/21/2020 What this Quick Guide aims to do is to distill and give readers an overview of key contributions of the work currently undertaken in the CIR WG, towards a co... Request to download |
![]() | Best Practices in Implementing a Secure Microservices Architecture Release Date: 02/24/2020 Application containers and a microservices architecture are being used to design, develop, and deploy applications leveraging agile software development appr... Request to download |
![]() | Critical Controls Implementation for SAP Release Date: 01/06/2020 The Critical Controls Implementation for SAP is the first in a series of implementation documents that the CSA ERP Security Working Group aims to develop. Th... Request to download |
![]() | Software-Defined Perimeter as a DDoS Prevention Mechanism Release Date: 10/27/2019 The primary goal of this document is to increase the awareness and understanding of SDP as a tool to prevent DDoS attacks by demonstrating its efficiency and... Request to download |
![]() | Release Date: 08/07/2019 In our current state of cyber security, there has been a large growth of application flaws that bypass the continuing addition of security frameworks to ensu... Request to download |
![]() | Top Threats to Cloud Computing: Egregious Eleven Release Date: 08/06/2019 The report provides organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated risk-management deci... Request to download |
![]() | Release Date: 08/03/2019 The CCM, the only meta-framework of cloud-specific security controls, mapped to leading standards, best practices and regulations. CCM provides organizations... Request to download |
![]() | Best Practices for Implementing a Secure Application Container Architecture Release Date: 07/26/2019 Application containers and a microservices architecture are being used to design, develop and deploy applications leveraging agile software development appro... Request to download |
![]() | Cloud Penetration Testing Playbook Release Date: 07/12/2019 As cloud services continue to enable new technologies and see massive adoption there is a need to extend the scope of penetration testing into public cloud s... Request to download |
![]() | Software Defined Perimeter for Infrastructure as a Service: Chinese Translation Release Date: 06/24/2019 Obtain a clear sense of the security challenges facing enterprise users of IaaS, understand the problems that arise from combining native IaaS access control... Request to download |
![]() | Software Defined Perimeter for Infrastructure as a Service: Japanese Translation Release Date: 06/23/2019 Obtain a clear sense of the security challenges facing enterprise users of IaaS, understand the problems that arise from combining native IaaS access control... Request to download |
![]() | Release Date: 05/07/2019 Software Defined Perimeter (SDP) Architecture Guide is designed to leverage proven, standards-based components to stop network attacks against application in... Request to download |
![]() | CSA IoT Security Controls Framework Release Date: 03/05/2019 The Internet of Things (IoT) Security Controls Framework introduces the base-level security controls required to mitigate many of the risks associated with a... Request to download |
![]() | CSA Guide to the IoT Security Controls Framework Release Date: 03/05/2019 The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework spreadsheet. This guide ex... Request to download |
![]() | OWASP Secure Medical Devices Deployment Standard Release Date: 08/07/2018 With the explosion of botnets and other malware that now target IoT devices (of which medical devices can be considered a subtype) the need for security-min... Request to download |
![]() | Best Practices for Cyber Incident Exchange Release Date: 04/16/2018 No organization is immune from cyber attack. Malicious actors collaborate with skill and agility, effectively moving from target to target at a breakneck pac... Request to download |
![]() | Observations and Recommendations on Connected Vehicle Security Release Date: 05/25/2017 The introduction of Connected Vehicles (CVs) has been discussed for many years. Pilot implementations currently underway are evaluating CV operations in real... Request to download |
![]() | Release Date: 03/13/2017 Over the last year or so, the perceived threat of the quantum computer to modern cryptographic standards in widespread use has increased dramatically. Govern... Request to download |
![]() | Future Proofing the Connected World Release Date: 10/07/2016 An IoT system is only as secure as its weakest link, this document is our attempt at providing actionable and useful guidance for securing the individual pro... Request to download |
![]() | Identity and Access Management for the Internet of Things Release Date: 09/28/2015 This document is the first in a series of summary guidance aimed at providing easily understandable recommendations to information technology staff charged w... Request to download |