ChaptersEventsBlog
How is your organization adopting AI technologies? Take this short survey to help us identify key trends and risks across FSI →

Download Publication

Measuring Risk and Risk Governance
Measuring Risk and Risk Governance
Who it's for:
  • C-Suite
  • Decision-makers
  • Risk managers
  • Security professionals

Measuring Risk and Risk Governance

Release Date: 06/21/2022

Adapting to the cloud presents a new challenge to enterprises. The shared responsibility model, used to distinguish responsibilities between cloud providers and end users, adds multiple layers of ownership in the supply chain. The COVID-19 pandemic has added another element, accelerating the use of virtual tools and cloud services, causing risk management practices to also need to adapt quickly. However, as enterprises shift toward a heavier reliance on cloud services, it’s clear that the enterprise risk management process doesn’t always shift with them.

Google commissioned CSA to develop a survey to add to the industry’s knowledge about enterprise cloud computing risk and to prepare this report of the survey’s findings. The survey’s key areas of interest included:
  • Assessing the maturity of public cloud consumption and risk management in enterprises
  • Understanding current challenges and perceived effectiveness of risk management in public cloud
  • Analyzing the challenges of measuring risk in the cloud
  • Identifying best practices to reduce risk and address risk tolerance in the cloud
Respondents were asked questions about public cloud usage, cloud inventory management, risk management, and their methods and satisfaction with quantifying risk. Read this report for the full rundown of respondent demographics, their responses, and what it all means.

Key Takeaways:
  • 70% of organizations reported not effective or somewhat effective processes for assigning risk to cloud assets
  • The majority of respondents use 2 or more IaaS platforms (59%)
  • The top security concern when running applications in the public cloud was loss of sensitive data
  • When asked about the vendors or tools used to quantify risk, the most common response was “None” (51%)

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
The Continuous Audit Metrics Catalog
The Continuous Audit Metrics Catalog
 Cloud Controls Matrix and CAIQ v4.1
Cloud Controls Matrix and CAIQ v4.1
The State of Non-Human Identity and AI Security
The State of Non-Human Identity and AI Security
Securing AI in CMMC Level 2 Environments: A Strategic Guide for CISOs and Cloud Security Engineers
Securing AI in CMMC Level 2 Environments: A Strategic Guide for CIS...
Published: 01/23/2026
How Organizations are Addressing Cloud Investigation and Response
How Organizations are Addressing Cloud Investigation and Response
Published: 01/22/2026
Beyond Badge-Selling: Why Compliance Automation Needs Trust by Design
Beyond Badge-Selling: Why Compliance Automation Needs Trust by Design
Published: 01/21/2026
Scoping a Privacy Information Management System (PIMS) With ISO 27701:2025
Scoping a Privacy Information Management System (PIMS) With ISO 277...
Published: 01/21/2026

Interested in helping develop research with CSA?

Related Certificates & Training