CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
Healthcare Interoperability When Health Information Technology systems seamlessly exchange data with each other, it is referred to as interoperability. Interoperability occurs when i... Request to download | |
Recommendations for using a Customer Controlled Key Store In the latest from the Cloud Key Management working group, this document provides guidance on how to assess and implement cloud key management services co... Request to download | |
Accedere: Using a SOC 2 Approach to Help Organizations Achieve CSA STAR Level 2 Cybersecurity frameworks, standards and certifications can be quite complicated to understand, making it difficult to identify which standard an organizat... Request to download | |
The State of Cloud Security Risk, Compliance, and Misconfigurations - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Security Guidelines for Providing and Consuming APIs - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Cloud and Web Security Challenges in 2022 Organizations’ work environments have undergone rapid but lasting changes in the face of the recent health crisis. Remote work became a necessity and many... Request to download | |
Secure Connection Requirements of Hybrid Cloud - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Top Threats Working Group Charter 2022 The Top Threats Working Group aims to provide up-to-date, industry-informed expert insights on cloud security risks, threats, and vulnerabilities to help ... Request to download | |
Enterprise Architecture Working Group Charter 2022 This is the 2022 Charter for the Enterprise Architecture Working Group to promote research, development, and education of best practices and methodologies... Request to download | |
Software-Defined Perimeter (SDP) Specification v2.0 - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
IoT Controls Matrix v3 - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Guide to the IoT Controls Matrix v3 - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download | |
Third-Party Vendor Risk Management in Healthcare The increased use of third-party vendors for applications and data processing services is a business model that is likely to continue, especially as HDOs ... Request to download | |
CSA CCM v4.0 Addendum - CRI FS Profile v1.2 This document is a CSA CCM v4.0 addendum to the CRI FS Profile v1.2 that contains controls mapping between the CCM and the FS Profile. The document aims t... Request to download | |
Critical Controls Implementation for Oracle Fusion Applications Framed within the context of the Cloud Security Alliance (CSA)’s ERP Twenty Controls, this document presents the essential and optional security features ... Request to download | |
Sensitive Data in the Cloud Anjuna commissioned CSA to develop a survey to better understand the industry’s knowledge, attitudes, and opinions regarding sensitive data in the cloud. ... Request to download | |
State of ICS Security in the Age of Cloud The goal of this document hopes to create awareness and share insights on the benefits of leveraging Cloud Computing for ICS/OT. It also attempts to stimu... Request to download | |
CCPA Addendum - PLA CoC v4.1 This document serves as a mapping exercise between the California Consumer Privacy Act (CCPA), the EU General Data Protection Regulation (GDPR) and the CS... Request to download | |
CSA CCM v4.0 Addendum - UAE IA Regulation This document is an addendum to the CCM V4.0 that contain controls mapping between the CSA CCM and the UAE Information Assurance (IA) Regulation. The docu... Request to download | |
Measuring Risk and Risk Governance Adapting to the cloud presents a new challenge to enterprises. The shared responsibility model, used to distinguish responsibilities between cloud provide... Request to download |