Cloud 101CircleEventsBlog
Register for SECtember.ai, Sept. 9-12, to hear keynotes from leaders at Anthropic, OpenAI, Google, Microsoft and CISA!

CSA Research

Best practices, guidance, frameworks and tools to help the industry secure the cloud. Read our research to get your questions around cloud security answered.
Research

CSA Research is created by the industry for the industry and is both vendor-neutral and consensus driven. Our research is created by subject matter experts who volunteer for our working groups. Each working group focuses on a unique topic or aspect of cloud security, from IoT, DevSecOps, Serverless and more, we have working groups for over 20 areas of cloud computing. You can view a list of all active research working groups. To find out more about how our research is created and the process we follow you can view the CSA Research Lifecycle.

Contribute to CSA Research

Peer reviews allow security professionals from around the world to collaborate on CSA research. Provide your feedback on the following documents in progress.

Latest Research

Using AI for Offensive Security

Using AI for Offensive Security

Release Date: 08/06/2024

Offensive security involves proactively simulating an attacker’s behavior by using tactics and techniques similar to those of an adversary to identify system vulnerabilities. The emergence of AI technology has triggered a profound transformation in the landscape of offensive security. 

...
Top Threats to Cloud Computing 2024

Top Threats to Cloud Computing 2024

Release Date: 08/05/2024

The CSA Top Threats Report aims to raise awareness of current cloud security risks, threats, and vulnerabilities. In this 2024 installment, we surveyed over 500 industry experts on the cloud security issues they’re facing. Respondents identified 11 top threats. The CSA Top Threats Working Group...
Quantum-Safe Security Governance with the Cloud Controls Matrix

Quantum-Safe Security Governance with the Cloud Controls Matrix

Release Date: 07/30/2024

For the last decade or so there have been major developments in the quantum and post-quantum cryptography spaces. The time has come for enterprise IT departments to prepare to integrate these tools into their organizations. 

This short document from the Quantum-Safe Security Working Group...