ChaptersEventsBlog
Share how your organization is preparing for the agentic shift in identity governance. Take the Securing AI Agents Survey by October 10 →

CSA Research

Best practices, guidance, frameworks and tools to help the industry secure the cloud. Read our research to get your questions around cloud security answered.
Research

CSA Research is created by the industry for the industry and is both vendor-neutral and consensus driven. Our research is created by subject matter experts who volunteer for our working groups. Each working group focuses on a unique topic or aspect of cloud security, from IoT, DevSecOps, Serverless and more, we have working groups for over 20 areas of cloud computing. You can view a list of all active research working groups. To find out more about how our research is created and the process we follow you can view the CSA Research Lifecycle.

Contribute to CSA Research

Peer reviews allow security professionals from around the world to collaborate on CSA research. Provide your feedback on the following documents in progress.

Latest Research

Research Lifecycle

Research Lifecycle

Release Date: 10/03/2025

The CSA Research Lifecycle graphic illustrates how research moves from proposal to approval, execution, peer review, publication, and dissemination. This resource helps you understand the deliverables at each stage, from charters and project plans, to drafts, publication, and ongoing awareness, s...
SaaS Security Capability Framework (SSCF)

SaaS Security Capability Framework (SSCF)

Release Date: 09/23/2025

The SaaS Security Capability Framework (SSCF) is a new technical framework that defines configurable, consumable, and customer-facing security controls provided by SaaS vendors to their customers. 

The SSCF represents a comprehensive approach to security management in cloud-based software...
Analyzing Log Data with AI Models to Meet Zero Trust Principles

Analyzing Log Data with AI Models to Meet Zero Trust Principles

Release Date: 09/15/2025

Logs are fundamental to Zero Trust. They capture critical details about user activity, device behavior, network traffic, and application access. However, when companies generate massive volumes of log data, manual review becomes unrealistic.

This publication explores how AI/ML can automate log...