ChaptersEventsBlog
We're exploring how organizations adapt IAM to AI. Take the AI Identity and Risk Readiness Survey by September 5 →
Research Publications currently filtered by Topic, Locale.
×

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

AI Controls Matrix

AI Controls Matrix

Release Date: 07/09/2025

The AI Controls Matrix (AICM) is a first-of-its-kind vendor-agnostic framework for cloud-based AI systems. Organizations can use the AICM to develop, impl...

Request to download
Cloud Controls Matrix and CAIQ v4

Cloud Controls Matrix and CAIQ v4

Release Date: 06/03/2024

The Cloud Controls Matrix (CCM) is a cybersecurity control framework for cloud computing aligned to the CSA best practices, that is considered the de-facto s...

Request to download
Cloud and Web Security Challenges in 2022

Cloud and Web Security Challenges in 2022

Release Date: 08/16/2022

Organizations’ work environments have undergone rapid but lasting changes in the face of the recent health crisis. Remote work became a necessity and many...

Request to download
Third-Party Vendor Risk Management in Healthcare

Third-Party Vendor Risk Management in Healthcare

Release Date: 07/19/2022

The increased use of third-party vendors for applications and data processing services is a business model that is likely to continue, especially as HDOs ...

Request to download
Healthcare Supply Chain Cybersecurity Risk Management

Healthcare Supply Chain Cybersecurity Risk Management

Release Date: 05/11/2022

It is essential for Healthcare Delivery Organizations to conduct proper risk management practices and risk assessments of suppliers and third-party servic...

Request to download
State of Cloud Security Risk, Compliance, and Misconfigurations

State of Cloud Security Risk, Compliance, and Misconfigurations

Release Date: 09/17/2021

Cloud misconfigurations consistently are a top concern for organizations utilizing public cloud. Such errors lead to data breaches, allow the deletion or ...

Request to download
Top Threats to Cloud Computing: Egregious Eleven Deep Dive

Top Threats to Cloud Computing: Egregious Eleven Deep Dive

Release Date: 09/23/2020

The purpose of the report is to provide organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated ...

Request to download
CSA's Perspective on Cloud Risk Management

CSA's Perspective on Cloud Risk Management

Release Date: 08/20/2020

The rapid growth in both scope and market share, combined with the inherent complexity of cloud computing, appears to be straining the capabilities of existi...

Request to download
Top Threats to Cloud Computing: Egregious Eleven

Top Threats to Cloud Computing: Egregious Eleven

Release Date: 08/06/2019

The report provides organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated risk-management deci...

Request to download
Cloud Octagon Model

Cloud Octagon Model

Release Date: 06/24/2019

In this document CSA provides an approach to assess risk in SaaS cloud computing. It takes into account the security challenges in a cloud computing environm...

Request to download
Top Threats to Cloud Computing: Deep Dive

Top Threats to Cloud Computing: Deep Dive

Release Date: 08/08/2018

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its foundation. Each...

Request to download
SecaaS Category 5 // Security Assessments Implementation Guidance

SecaaS Category 5 // Security Assessments Implementation Guidance

Release Date: 10/08/2012

There are many choices for an assessment framework standard and there is no "one size fits all" solution for security assessments. One could reasonably expec...

Request to download