Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

CSA Research

Best practices, guidance, frameworks and tools to help the industry secure the cloud. Read our research to get your questions around cloud security answered.
Research

CSA Research is created by the industry for the industry and is both vendor-neutral and consensus driven. Our research is created by subject matter experts who volunteer for our working groups. Each working group focuses on a unique topic or aspect of cloud security, from IoT, DevSecOps, Serverless and more, we have working groups for over 20 areas of cloud computing. You can view a list of all active research working groups. To find out more about how our research is created and the process we follow you can view the CSA Research Lifecycle.

Contribute to CSA Research

Peer reviews allow security professionals from around the world to collaborate on CSA research. Provide your feedback on the following documents in progress.

Latest Research

Defining the Zero Trust Project Surface - Japanese Translation

Defining the Zero Trust Project Surface - Japanese Translation

Release Date: 04/15/2024

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].
HSM-as-a-Service Use Cases, Considerations, and Best Practices

HSM-as-a-Service Use Cases, Considerations, and Best Practices

Release Date: 04/03/2024

A Hardware Security Module (HSM) is a certified, trusted platform for performing cryptographic operations and protecting keys. It is a tamper-responsive and intrusion-resistant device comprising a security cryptographic accelerator, hardware-based random number generator,  processor, RAM,...
The State of AI and Security Survey Report

The State of AI and Security Survey Report

Release Date: 04/02/2024

The advent of artificial intelligence (AI) in cybersecurity marks a transformative era in the realm of digital defense. AI has the potential to be a vital ally for bolstering security defenses, identifying emerging threats, and facilitating swift responses. However, the journey towards...