Cloud 101CircleEventsBlog
Get 50% off the Cloud Infrastructure Security training bundle with code 'unlock50advantage'

Download Publication

Hybrid Cloud and Its Associated Risks
Hybrid Cloud and Its Associated Risks

Hybrid Cloud and Its Associated Risks

Release Date: 07/13/2020

Working Group: Hybrid Cloud Security

Cloud computing is flourishing. Hybrid clouds, especially, have been gaining more traction as cloud customers increasingly understand that using public clouds or private clouds alone poses certain limitations. Hybrid cloud is often the starting point for organizations to get started on the cloud journey and this document aims to describe the concept and value of hybrid clouds, highlight key application scenarios and point out security risks in the hybrid cloud.

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
IoT Controls Matrix v3
IoT Controls Matrix v3
Guide to the IoT Controls Matrix v3
Guide to the IoT Controls Matrix v3
Secure Connection Requirements of Hybrid Cloud
Secure Connection Requirements of Hybrid Cloud
How AI Changes End-User Experience Optimization and Can Reinvent IT
How AI Changes End-User Experience Optimization and Can Reinvent IT
Published: 11/15/2024
What is Cloud Workload in Cloud Computing?
What is Cloud Workload in Cloud Computing?
Published: 11/13/2024
Dispelling the ‘Straight Line’ Myth of Zero Trust Transformation
Dispelling the ‘Straight Line’ Myth of Zero Trust Transformation
Published: 11/04/2024
Top IAM Priorities for 2025: Addressing Multi-Cloud Identity Management Challenges
Top IAM Priorities for 2025: Addressing Multi-Cloud Identity Manage...
Published: 10/30/2024

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 125 projects, as a Lead Author or Author/Contributor and many more as a Reviewer/Editor.

Michael's extensive contributions encompass critical areas including Artificial Intelligence, Zero Trust/Software Defined Perimeter, Internet of Things, Top Threats, Cloud Control Matrix, DevSecOps, and Key Management. His lea...

Read more

Haojie Zhuang Headshot Missing
Haojie Zhuang

Haojie Zhuang

Dr. Hing-Yan Lee
Dr. Hing-Yan Lee
Executive Vice President of Government Affairs, CSA

Dr. Hing-Yan Lee

Executive Vice President of Government Affairs, CSA

Dr. Hing Yan Lee serves as the Executive Vice President of Asia Pacific (APAC) for Cloud Security Alliance. Dr. Lee has over 30 years of ICT working experience in both the public and private sectors. In the recent 9+ years, he was Director of National Cloud Computing Office at Infocomm Development Authority, where he was responsible for, inter alia, developing the cloud ecosystem, promoting cloud adoption by government agencies and private...

Read more

Jane Chow Headshot Missing
Jane Chow
Associate Research Analyst, CSA

Jane Chow

Associate Research Analyst, CSA

Ankur Gargi Headshot Missing
Ankur Gargi

Ankur Gargi

Nya Murray
Nya Murray
CEO of Trac-Car and Verviam IDaaS

Nya Murray

CEO of Trac-Car and Verviam IDaaS

Nya is a key contributor to the Zero Trust working group and author of several position papers published by CSA’s Software-Defined Perimeter working group. She is the CEO of Trac-Car and Verviam IDaaS and a senior information and communications technology (ICT) cloud cyber security and identity management consulting architect. Nya cons...

Read more

David Chong Headshot Missing
David Chong

David Chong

Diego Diviani Headshot Missing
Diego Diviani

Diego Diviani

Christopher Hughes Headshot Missing
Christopher Hughes

Christopher Hughes

Zou Feng
Zou Feng

Zou Feng

Zou has been working in IT for 15+ years with a strong technical background and broad experience in heterogeneous systems and multi-culture environments.
Starting as Communication Engineer at ICBC, the largest bank in China, Zou maintained legacy telecommunication circuits and an IBM mainframe communication controller. During this period, Zou built up their first experience in data security by implementing a cipher machine to...

Read more

Narudom Roongsiriwong
Narudom Roongsiriwong
Head of Digital Architecture

Narudom Roongsiriwong

Head of Digital Architecture

Narudom ROONGSIRIWONG (SVP, Head of Digital Architecture, Bank of Ayudhya (Krungsri Bank) PCL, Thailand) has been an information security professional for over twenty years with solid technical experience in architecture, data analytics, application development and cloud computing. He has experience in running three security operation centers and the last one operated with in-house AI and Machine Learning. He was a pioneer in setting up the...

Read more

Geng Tao Headshot Missing
Geng Tao

Geng Tao

Saan Vandendriessche
Saan Vandendriessche

Saan Vandendriessche

Jean-Sebastien Mine Headshot Missing
Jean-Sebastien Mine

Jean-Sebastien Mine

John Barnes Headshot Missing
John Barnes

John Barnes

Kevin Blackburn Headshot Missing
Kevin Blackburn

Kevin Blackburn

Anjlica Dattatreya Headshot Missing
Anjlica Dattatreya

Anjlica Dattatreya

Jones Junior Headshot Missing
Jones Junior

Jones Junior

Checri Loandos Headshot Missing
Checri Loandos

Checri Loandos

Adnan Rafique
Adnan Rafique

Adnan Rafique

Pierluigi Riti Headshot Missing
Pierluigi Riti

Pierluigi Riti

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training