Cloud 101CircleEventsBlog
Join CSA's Virtual FinCloud Security Summit to explore cloud security solutions, emerging fintech trends, and best practices for secure, compliant financial services.

CSA Research Publications

Whitepapers, Reports and Other Resources

Home
Publications

Browse Publications

SaaS AI-Risk for Mid-Market Organizations Survey Report

SaaS AI-Risk for Mid-Market Organizations Survey Report
Release Date: 01/27/2025

Mid-market organizations are struggling to manage expanding Software as a Service (SaaS) environments. To better understand this challenge, Wing Security ...

Request to download
DLT Cybersecurity Governance Package

DLT Cybersecurity Governance Package
Release Date: 01/22/2025

Distributed Ledger Technology (DLT) brings traceability and transparency to external business workflows, while also instilling trust and efficiency in an ...

Request to download
Zero Trust Guidance for Critical Infrastructure - Japanese Translation

Zero Trust Guidance for Critical Infrastructure - Japanese Translation
Release Date: 01/16/2025

In most nations, the health of public services relies on secure and resilient Critical Infrastructure. We call these infrastructures "critical" because th...

Request to download
Context-Based Access Control for Zero Trust

Context-Based Access Control for Zero Trust
Release Date: 01/15/2025

Traditional access decision-making is agnostic to both Zero Trust and context. Historically, security teams based access decisions on trust. The common ac...

Request to download
Zero Trust Guidance for Small and Medium Size Businesses (SMBs)

Zero Trust Guidance for Small and Medium Size Businesses (SMBs)
Release Date: 01/13/2025

Cybersecurity for small businesses involves unique and heightened challenges. This makes the adoption of a Zero Trust strategy critical for safeguarding t...

Request to download
 AI Risk Management: Thinking Beyond Regulatory Boundaries Korean Translation

AI Risk Management: Thinking Beyond Regulatory Boundaries Korean Translation
Release Date: 01/09/2025

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Cloud Security for Startups 2024

Cloud Security for Startups 2024
Release Date: 12/18/2024

Volunteers from the CSA Israel Chapter produced this publication. The content development falls outside the CSA Research Lifecycle. For any questions and ...

Request to download
Key Management for Public Cloud Migration

Key Management for Public Cloud Migration
Release Date: 12/17/2024

More and more organizations are adopting public cloud technologies. This leads to a mass data migration where existing applications that are on-premises o...

Request to download
Top Threats to Cloud Computing 2024 - Japanese Translation

Top Threats to Cloud Computing 2024 - Japanese Translation
Release Date: 12/12/2024

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Cyber Resiliency in the Financial Industry 2024 Survey Report

Cyber Resiliency in the Financial Industry 2024 Survey Report
Release Date: 12/09/2024

Data resiliency and operational security have become increasingly critical as digital transformation accelerates. The financial industry faces distinct ch...

Request to download
AI Resilience A Revolutionary Benchmarking Model for AI Safety - Korean Translation

AI Resilience A Revolutionary Benchmarking Model for AI Safety - Korean Translation
Release Date: 12/03/2024

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
CCM v4.0 Implementation Guidelines - Japanese Translation

CCM v4.0 Implementation Guidelines - Japanese Translation
Release Date: 12/03/2024

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate...

Request to download
Map the Transaction Flows for Zero Trust

Map the Transaction Flows for Zero Trust
Release Date: 11/18/2024

The NSTAC Report to the President on Zero Trust defines five steps to implementing a Zero Trust security strategy. This publication provides guidance on e...

Request to download
CCM Video Series: IPY - Interoperability & Portability

CCM Video Series: IPY - Interoperability & Portability
Release Date: 11/18/2024

In this presentation we explore the Interoperability and Portability (IPY) domain of the Cloud Control Matrix (CCM), which comprises four control specific...

Request to download
AI Risk Management: Thinking Beyond Regulatory Boundaries

AI Risk Management: Thinking Beyond Regulatory Boundaries
Release Date: 11/13/2024

While artificial intelligence (AI) offers tremendous benefits, it also introduces significant risks and challenges that remain unaddressed. A comprehensiv...

Request to download
Top Concerns With Vulnerability Data

Top Concerns With Vulnerability Data
Release Date: 11/11/2024

The top vulnerability management frameworks used today include the Common Vulnerabilities and Exposures (CVE) program and the Common Vulnerability Scoring...

Request to download
CCM Video Series: A&A - Audit & Assurance

CCM Video Series: A&A - Audit & Assurance
Release Date: 11/11/2024

In this presentation we introduce the Audit and Assurance (A&A) domain within the Cloud Control Matrix (CCM). The A&A domain, consisting of six co...

Request to download
CCM Video Series: AIS - Application & Interface Security

CCM Video Series: AIS - Application & Interface Security
Release Date: 11/10/2024

In this presentation, we introduce the CCM's Application and Interface Security (AIS) domain. With seven control specifications, the AIS domain is focused...

Request to download
Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives

Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives
Release Date: 11/05/2024

This publication explores the use of asymmetric cryptography in Zero Trust. Asymmetric cryptography provides an industry-standard, secure method to establ...

Request to download
CCM Video Series: HRS - Human Resources Security

CCM Video Series: HRS - Human Resources Security
Release Date: 11/04/2024

In this presentation we focus on the Human Resources (HRS) security domain, which comprises thirteen control specifications designed to help cloud organiz...

Request to download