cloudsecurityalliance.org /research/artifacts/
Research Publications | CSA
Static Web Parser
cloudsecurityalliance.org /research/artifacts/
Research Publications | CSA
Static Web Parser
CCM v4.0 Addendum - ECUC PP v2.1 This document is an addendum to the 'ECUC Position Paper v2.1 (ECUC PP v2.1) that contains controls mapping between the CSA CCM v4.0 and the ECUC PPv2.1. ... Request to download |
CSA Large Language Model (LLM) Threats Taxonomy This document aims to align the industry by defining key terms related to Large Language Model (LLM) risks and threats. Establishing a common language red... Request to download |
Cloud Controls Matrix and CAIQ v4 The Cloud Controls Matrix (CCM) is a cybersecurity control framework for cloud computing aligned to the CSA best practices, that is considered the de-facto s... Request to download |
SaaS Governance Best Practices for Cloud Customers - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
CCM Lite and CAIQ Lite v4 - Japanese Translation This localized version of this publication was produced from the original source material (CCM Lite and CAIQ Lite) through the efforts of chapters and vol... Request to download |
Confronting Shadow Access Risks: Considerations for Zero Trust and Artificial Intelligence Deployments Shadow Access, a growing concern within cloud computing and Identity and Access Management (IAM), refers to unintended, unauthorized access to systems and... Request to download |
Standardizing Security in Diverse Sectors: A Template for STAR-Aligned Sector-Specific Standards The CSA Security, Trust, Assurance, and Risk (STAR) program encompasses the key principles of transparency, rigorous auditing, and harmonization of cybers... Request to download |
Information Technology Governance, Risk, and Compliance in Healthcare v2 Healthcare organizations are increasingly using cloud services. However, the transition to the cloud presents many Governance, Risk, and Compliance (GRC) ... Request to download |
The Six Pillars of DevSecOps: Measure, Monitor, Report, and Action The implementation and maintenance of DevSecOps initiatives can take anywhere from a few months to several years to implement. Therefore, continuous measu... Request to download |
Requirements for Bodies Providing STAR Certification This document outlines how to conduct STAR certification assessments to the Cloud Controls Matrix (CCM) as part of an ISO 27001 assessment. The STAR certi... Request to download |
Open Certification Framework Working Group Charter The CSA Open Certification Framework (OCF) is an industry initiative to allow global, trusted independent evaluation of cloud providers. It is a program for ... Request to download |
Principles to Practice: Responsible AI in a Dynamic Regulatory Environment Artificial Intelligence (AI) innovation is not expected to slow down any time soon, as the big tech giants plan to invest hundreds of billions of dollars ... Request to download |
AI Resilience: A Revolutionary Benchmarking Model for AI Safety The rapid evolution of Artificial Intelligence (AI) promises unprecedented advances. However, as AI systems become increasingly sophisticated, they also p... Request to download |
AI Organizational Responsibilities - Core Security Responsibilities This publication from the CSA AI Organizational Responsibilities Working Group provides a blueprint for enterprises to fulfill their core information secu... Request to download |
Defining the Zero Trust Protect Surface - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
Defining the Zero Trust Protect Surface - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
Defining the Zero Trust Protect Surface Enterprise adoption and implementation of Zero Trust is broad and growing. Venture Beat reports that 90% of organizations moving to the cloud are adopting... Request to download |
Defining Shadow Access: The Emerging IAM Security Challenge - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
Defining the Zero Trust Project Surface - Korean Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
Defining the Zero Trust Project Surface - Japanese Translation This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
CCM-Lite and CAIQ-Lite The Cloud Security Alliance, in collaboration with the CCM Working Group, proudly presents the CCM-Lite and CAIQ-Lite File Bundle. These tools offer a str... Request to download |
AI Controls Framework Working Group Charter 2024 The AI Controls Framework working group is focused on staying abreast of the latest technological advancements in AI while simultaneously identifying, und... Request to download |
CCM v4.0 Implementation Guidelines This document will help you understand how to navigate through the Cloud Controls Matrix v4 to use it effectively and interpret and implement the CCM cont... Request to download |
The Annual SaaS Security Survey Report 2025 Plans and Priorities In 2024, Software-as-a-Service (SaaS) platforms are integral to most businesses. Unfortunately, inventive threat actors regularly breach SaaS applications... Request to download |
CCM Machine Readable Bundle (JSON/YAML/OSCAL) CSA provides in a machine-readable format the CCM Controls, CAIQ Security Questionnaire, Implementation Guidelines (both JSON/YAML and OSCAL) and Mappings... Request to download |