CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Release Date: 03/11/2025 Shadow Access is undesired or unauthorized access to resources, such as applications, networks, and data. Shadow Access is increasingly a cloud issue, res... Request to download |
![]() | Identity and Access Management Working Group Charter 2024 Release Date: 06/01/2024 Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using Identity Access Management (IAM)... Request to download |
![]() | Release Date: 05/06/2024 Shadow Access, a growing concern within cloud computing and Identity and Access Management (IAM), refers to unintended, unauthorized access to systems and... Request to download |
![]() | What is IAM for the Cloud? - Chinese Translation Release Date: 11/13/2023 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Beyond Passwords: The Role of Passkeys in Modern Web Security Release Date: 11/12/2023 Web authentication methods have evolved significantly over the years to improve security and the user experience. In the early days of the internet, usern... Request to download |
![]() | Machine Identity in Cybersecurity and IAM Release Date: 09/19/2023 Identity management is a crucial aspect of information security, as it ensures that only authorized individuals and entities have access to sensitive data... Request to download |
![]() | Defining Shadow Access: The Emerging IAM Security Challenge Release Date: 09/12/2023 Shadow Access is unmonitored, unauthorized, invisible, unsafe, and generally over-permissioned cloud access. This emerging Identity and Access Management ... Request to download |
![]() | Identity and Access Management Glossary Release Date: 08/29/2023 The Identity and Access Management (IAM) Glossary is a reference document that aggregates and summarizes IAM-related terms and definitions. Bringing toget... Request to download |
![]() | Zero Trust Principles and Guidance for Identity and Access Management (IAM) Release Date: 07/13/2023 Identity and the ability to consume information about that identity as well as other Zero Trust (ZT) signals (additional attributes about an identity), is... Request to download |
![]() | Release Date: 07/12/2023 The threat landscape has materially changed over the years to the point that Identity and Access Management (IAM) is a core component of any digital acces... Request to download |
![]() | Identity Access Management Working Group Charter Release Date: 04/22/2022 Cloud services are becoming ubiquitous in all sizes, and customers encounter many obligations and opportunities for using Identity Access Management (IAM)... Request to download |
![]() | The 2020 State of Identity Security in the Cloud - Chinese Translation Release Date: 02/07/2022 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | The 2020 State of Identity Security in the Cloud Release Date: 11/19/2020 The use of cloud services have continued to increase over the past decade. Particularly in the wake of the COVID-19 public health crisis, many enterprises di... Request to download |
![]() | Release Date: 04/19/2016 The goal of the Identity Solutions: Security Beyond the Perimeter survey was to address Insufficient Identity, Credential, and Access Management and gain a b... Request to download |
![]() | Identity and Access Management for the Internet of Things - Japanese Translation Release Date: 04/05/2016 This document is the first in a series of summary guidance aimed at providing easily understandable recommendations to information technology staff charged ... Request to download |
![]() | Identity and Access Management for the Internet of Things Release Date: 09/28/2015 This document is the first in a series of summary guidance aimed at providing easily understandable recommendations to information technology staff charged w... Request to download |
![]() | SecaaS Category 1 // Identity and Access Management Implementation Guidance Release Date: 09/26/2012 This document addresses personnel involved in the identification and implementation of the IAM solution in the cloud. It will be of particular interest to th... Request to download |