Cloud 101CircleEventsBlog
Join CSA's Virtual FinCloud Security Summit to explore cloud security solutions, emerging fintech trends, and best practices for secure, compliant financial services.

CSA Research

Best practices, guidance, frameworks and tools to help the industry secure the cloud. Read our research to get your questions around cloud security answered.
Research

CSA Research is created by the industry for the industry and is both vendor-neutral and consensus driven. Our research is created by subject matter experts who volunteer for our working groups. Each working group focuses on a unique topic or aspect of cloud security, from IoT, DevSecOps, Serverless and more, we have working groups for over 20 areas of cloud computing. You can view a list of all active research working groups. To find out more about how our research is created and the process we follow you can view the CSA Research Lifecycle.

Contribute to CSA Research

Peer reviews allow security professionals from around the world to collaborate on CSA research. Provide your feedback on the following documents in progress.

Publications in Review
Open Until
Feb 02, 2025

Latest Research

Zero Trust Guidance for Critical Infrastructure - Japanese Translation

Zero Trust Guidance for Critical Infrastructure - Japanese Translation

Release Date: 01/16/2025

In most nations, the health of public services relies on secure and resilient Critical Infrastructure. We call these infrastructures "critical" because their destruction would have a drastic impact on the welfare of a nation. This publication promotes the implementation of Zero Trust principles...
Context-Based Access Control for Zero Trust

Context-Based Access Control for Zero Trust

Release Date: 01/15/2025

Traditional access decision-making is agnostic to both Zero Trust and context. Historically, security teams based access decisions on trust. The common access management formula was to entrust digital identities to a given entity, assign entitlements to that entity, and then check access...
CCM Video Series: CEK - Cryptography, Encryption, & Key Management

CCM Video Series: CEK - Cryptography, Encryption, & Key Management

Release Date: 01/15/2025

In this presentation we explore the Cryptography, Encryption, and Key Management (CEK) domain within the Cloud Control Matrix (CCM) that comprises twenty-one control specifications. The CEK domain focuses on safeguarding Cloud Service Customers' (CSCs) data through cryptographic techniques,...