CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
The Six Pillars of DevSecOps: Automation Automation is a critical component of DevSecOps because it enables process efficiency, allowing developers, infrastructure, and information security teams to... Request to download | |
Financial Services Stakeholders Platform Working Group Charter Information security plays an integral role in the regulation and protection of customers in the financial industry. Exploring cloud computing and the underl... Request to download | |
Managing the Risk for Medical Devices Connected to the Cloud With the increased number of Internet of Things devices, Healthcare Delivery Organizations are experiencing a digital transformation bigger than anything in ... Request to download | |
Documentation of Relevant Distributed Ledger Technology and Blockchain Use Cases v2 Thanks to the rise in popularity of Bitcoin cryptocurrency, the innovative technologies of Blockchain and other systems of distributed ledger technology (DLT... Request to download | |
Mitigating the Quantum Threat with Hybrid Cryptography Focus of this document is on four hybrid cryptographic schemes which provide both classical security of classical crypto and the quantum security of a quantu... Request to download | |
SDP Architecture Guide v2 Software Defined Perimeter (SDP) Architecture Guide is designed to leverage proven, standards-based components to stop network attacks against application in... Request to download | |
CSA IoT Security Controls Framework The Internet of Things (IoT) Security Controls Framework introduces the base-level security controls required to mitigate many of the risks associated with a... Request to download | |
CSA Guide to the IoT Security Controls Framework The Guide to the IoT Security Controls Framework provides instructions for using the companion CSA IoT Security Controls Framework spreadsheet. This guide ex... Request to download | |
Blockchain DLT Use Cases Thanks to the rise in popularity of Bitcoin cryptocurrency, the innovative technologies of Blockchain and other systems of distributed ledger technology (DLT... Request to download | |
Using BlockChain Technology to Secure the Internet of Things - Japanese Translation 本書「IoT セキュリティのためのブロックチェーン技術の活用」は、Cloud Security Alliance (CSA)が公開して いる「Using Blockchain Technology to Secure the Internet of Things」の日本語訳です。本書は、CSA ジャパ ンが、CS... Request to download | |
OWASP Secure Medical Devices Deployment Standard With the explosion of botnets and other malware that now target IoT devices (of which medical devices can be considered a subtype) the need for security-min... Request to download | |
Using BlockChain Technology to Secure the Internet of Things - Chinese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated c... Request to download | |
The State of Post-Quantum Cryptography Most people pay little attention to the lock icon on their browser’s address bar that signifies a secure connection called HTTPS. This connection establishes... Request to download | |
A Day Without Safe Cryptography Over the past fifty years, the digital age has sparked the creation of a remarkable infrastructure through which a nearly infinite variety of digital transac... Request to download | |
Using Blockchain Technology to Secure the Internet of Things In the last four years, technical experts, chief digital officers, marketing managers, journalists, bloggers and research institutions have discussed and pro... Request to download | |
Quantum-Safe Security Awareness Survey Quantum computing threatens the security of public key cryptography, which underlies our global digital communications infrastructure. While many significant... Request to download | |
Blockchain/Distributed Ledger Working Group Glossary Blockchain is a radical, evolving technology and there is little awareness or knowledge regarding security aspects or compliance implications among many t... Request to download | |
Observations and Recommendations on Connected Vehicle Security The introduction of Connected Vehicles (CVs) has been discussed for many years. Pilot implementations currently underway are evaluating CV operations in real... Request to download | |
Applied Quantum Safe Security Over the last year or so, the perceived threat of the quantum computer to modern cryptographic standards in widespread use has increased dramatically. Govern... Request to download | |
Establishing a Safe and Secure Municipal Drone Program This paper provides guidance on the safe and secure introduction and operation of a municipal “drone” program. This paper will try to analyze the drone’s rol... Request to download |