CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Context-Based Access Control for Zero Trust - Japanese Translation Release Date: 03/11/2025 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Zero Trust Privacy Assessment and Guidance Release Date: 02/18/2025 When people discuss Zero Trust, they often focus on how it can help protect data across an organization. However, they tend to forget how it can also help... Request to download |
![]() | Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Japanese Translation Release Date: 02/11/2025 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Zero Trust Guidance for Critical Infrastructure - Japanese Translation Release Date: 01/16/2025 In most nations, the health of public services relies on secure and resilient Critical Infrastructure. We call these infrastructures "critical" because th... Request to download |
![]() | Context-Based Access Control for Zero Trust Release Date: 01/15/2025 Traditional access decision-making is agnostic to both Zero Trust and context. Historically, security teams based access decisions on trust. The common ac... Request to download |
![]() | Zero Trust Guidance for Small and Medium Size Businesses (SMBs) Release Date: 01/13/2025 Cybersecurity for small businesses involves unique and heightened challenges. This makes the adoption of a Zero Trust strategy critical for safeguarding t... Request to download |
![]() | Map the Transaction Flows for Zero Trust Release Date: 11/18/2024 The NSTAC Report to the President on Zero Trust defines five steps to implementing a Zero Trust security strategy. This publication provides guidance on e... Request to download |
![]() | Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives Release Date: 11/05/2024 This publication explores the use of asymmetric cryptography in Zero Trust. Asymmetric cryptography provides an industry-standard, secure method to establ... Request to download |
![]() | Zero Trust Guidance for Critical Infrastructure Release Date: 10/28/2024 In most nations, the health of public services relies on secure and resilient Critical Infrastructure. We call these infrastructures "critical" because th... Request to download |
![]() | Zero Trust Guiding Principles v1.1 Release Date: 09/03/2024 Zero Trust is a strategic mindset that is highly useful for organizations to adopt as part of their digital transformations. Based on the idea of "never t... Request to download |
![]() | Release Date: 05/06/2024 Shadow Access, a growing concern within cloud computing and Identity and Access Management (IAM), refers to unintended, unauthorized access to systems and... Request to download |
![]() | Defining the Zero Trust Protect Surface - Korean Translation Release Date: 04/24/2024 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Defining the Zero Trust Protect Surface Release Date: 03/05/2024 Enterprise adoption and implementation of Zero Trust is broad and growing. Venture Beat reports that 90% of organizations moving to the cloud are adopting... Request to download |
![]() | Communicating the Business Value of Zero Trust Release Date: 12/18/2023 Zero Trust is a major industry trend that is being adopted and promoted by security teams around the globe, and for good reason - it delivers improved sec... Request to download |
![]() | Data Loss Prevention and Data Security Survey Report - Chinese Translation Release Date: 11/13/2023 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Medical Devices in A Zero Trust Architecture - Chinese Translation Release Date: 11/13/2023 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Medical Devices In A Zero Trust Architecture - Korean Translation Release Date: 10/05/2023 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Release Date: 07/18/2023 Zero Trust is a strategic mindset that is highly useful for organizations to adopt as part of their digital transformations and other efforts to increase ... Request to download |
![]() | Zero Trust Principles and Guidance for Identity and Access Management (IAM) Release Date: 07/13/2023 Identity and the ability to consume information about that identity as well as other Zero Trust (ZT) signals (additional attributes about an identity), is... Request to download |
![]() | Medical Devices in A Zero Trust Architecture - Japanese Translation Release Date: 05/31/2023 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |