Cloud 101CircleEventsBlog
Discover the latest cloud threats, evolving AI risks, and how to stay ahead. Don’t miss CSA’s free Cloud Threats & Vulnerabilities Summitregister now!

Download Publication

Sensitive Data in the Cloud
Sensitive Data in the Cloud
Who it's for:
  • cloud security practitioners
  • cybersecurity professionals 

Sensitive Data in the Cloud

Release Date: 07/12/2022

Anjuna commissioned CSA to develop a survey to better understand the industry’s knowledge, attitudes, and opinions regarding sensitive data in the cloud. The survey was conducted online in April 2022 and received 452 responses from IT and security professionals from organizations of various sizes and locations. The key areas of interest included:
  • Cloud use and data security issues
  • Cloud data security challenges and priorities for the next year
  • Approach to hosting sensitive data and workloads in the cloud
  • Familiarity with cloud and data security technologies
Respondents were asked questions about how much of their workload is in the cloud, the effectiveness of their cloud provider’s security controls, their confidence in their organization’s ability to protect sensitive data in the cloud, their current use of cloud security technologies, and more. Read this report for the full analysis of their responses.

Key Takeaways: 
  • The vast majority of organizations (89%) host sensitive data or workloads in the cloud.
  • Most organizations report that their cloud provider’s security controls are highly effective (38%) or somewhat effective (51%). 
  • Organizations feel less confident in their own ability to protect sensitive data in the cloud, with most respondents feeling slightly (31%) or moderately (44%) confident.
  • Over half of organizations plan to implement emerging solutions such as homomorphic encryption (59%) and confidential computing (55%) within the next 1-2 years. 
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources

Sponsor

CSA Code of Conduct to EU Cloud Code of Conduct Mapping
CSA Code of Conduct to EU Cloud Code of Conduct...
Cloud Key Management Working Group Charter 2025
Cloud Key Management Working Group Charter 2025
Enterprise Authority To Operate (EATO) Auditing Guidelines
Enterprise Authority To Operate (EATO) Auditing...
Don’t Buy A Network Pen Test Until You Ask These Questions
Don’t Buy A Network Pen Test Until You Ask These Questions
Published: 03/28/2025
How To Transform Your GRC with Continuous Controls Monitoring
How To Transform Your GRC with Continuous Controls Monitoring
Published: 03/26/2025
Zero Trust Makes Cybersecurity Everyone's Responsibility
Zero Trust Makes Cybersecurity Everyone's Responsibility
Published: 03/25/2025
Forget the Corporate Ladder and ‘Rock-Climb’ Your Way to Success
Forget the Corporate Ladder and ‘Rock-Climb’ Your Way to Success
Published: 03/25/2025

Acknowledgements

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training