CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Disaster Recovery as a Service Disaster Recovery as a Service (DRaaS) is a cloud computing service model that allows an organization to back up its data and IT infrastructure in a third... Request to download | |
Top Cloud Priorities for CxOs The Top Cloud Priorities for CxOs was created to equip C-level executives with industry guidance to build pragmatic cloud security projects and strategies... Request to download | |
CSA CxO Trust Working Group Charter The CSA CxO Trust Working Group will conduct research consisting of best practices, metrics, surveys, C-level presentations, and other tools in support of... Request to download | |
STAR Enabled Solution | CAIQ-Lite v3 CSA and Whistic identified the need for a lighter-weight assessment questionnaire in order to accommodate the shift to cloud procurement models, and to enabl... Request to download | |
STAR Enabled Solution | CSA - OneTrust VRM Tool The CSA-OneTrust Vendor Risk Management (VRM) tool automates the entire vendor management lifecycle, including onboarding and offboarding vendors, triaging v... Request to download | |
Cloud Incident Response Framework This document aims to provide a Cloud Incident Response (CIR) framework that serves as a go-to guide for a CSC to effectively prepare for and manage cloud in... Request to download | |
Security Guidelines for Providing and Consuming APIs In modern application workloads, organizations are often required to integrate their application with other parties such as Software-as-a-Service (SaaS) prov... Request to download | |
Crypto-Asset Exchange Security Guidelines Thanks to the blockchain technology that makes them possible, crypto-assets are becoming massively successful. As with any successful industry, a multitud... Request to download | |
Zero Trust Architecture Expert Group Charter The CSA Zero Trust Architecture Expert Group will review and advise on the scope, curriculum, objectives, structure, go-to-market (GTM) strategy and value pr... Request to download | |
Critical Controls Implementation for Oracle E-Business Suite This paper will help an organization determine what security changes are needed when deploying Oracle E-Business Suite (EBS) in the Cloud. For clarity, this ... Request to download | |
Cloud Penetration Testing Playbook: Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
CSA STAR Level 3 Focus Group Charter The CSA STAR Level 3 Focus Group will advise on the scope, objectives, structure, go-to-market (GTM) strategy and value proposition for STAR Level 3... Request to download | |
Software Defined Perimeter Architecture Guide: Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
State of Cloud Security Concerns, Challenges, and Incidents The use of cloud services has continued to increase over the past decade. Particularly in the wake of the COVID-19 public health crisis, many enterprises’... Request to download | |
CCAK Related Study Materials The following resources are frequently referenced in the CCAK study guide and training materials. You can download the unofficial prep-kit with the correc... Request to download | |
Key Management when using Cloud Services - Japanese Translation The purpose of this document is to provide guidance for using Key Management Systems (KMS) with cloud services, whether the key management system is native t... Request to download | |
Confidence in Post Quantum Algorithms NIST made the recent announcement of its Round 3 candidates for future post-quantum cryptography or quantum safe standards. As the world prepares to transiti... Request to download | |
Cloud Incident Response Working Group Charter In today’s connected era, a comprehensive incident response strategy is an integral aspect of any organization aiming to manage and lower their risk profile.... Request to download | |
Blockchains in the Quantum Era Digital Ledger Technologies (DLT) such as blockchain are being deployed as part of diverse applications that span multiple market segments. Application devel... Request to download | |
CSA IoT Security Controls Framework v2 The IoT Security Controls Framework is relevant for enterprise IoT systems that incorporate multiple types of connected devices, cloud services, and networki... Request to download |