ChaptersCircleEventsBlog
Download CSA’s AI Controls Matrix to Secure Cloud-Based AI Systems

Download Publication

Sensitive Data in the Cloud
Sensitive Data in the Cloud
Who it's for:
  • cloud security practitioners
  • cybersecurity professionals 

Sensitive Data in the Cloud

Release Date: 07/12/2022

Updated On: 07/16/2025

Anjuna commissioned CSA to develop a survey to better understand the industry’s knowledge, attitudes, and opinions regarding sensitive data in the cloud. The survey was conducted online in April 2022 and received 452 responses from IT and security professionals from organizations of various sizes and locations. The key areas of interest included:
  • Cloud use and data security issues
  • Cloud data security challenges and priorities for the next year
  • Approach to hosting sensitive data and workloads in the cloud
  • Familiarity with cloud and data security technologies
Respondents were asked questions about how much of their workload is in the cloud, the effectiveness of their cloud provider’s security controls, their confidence in their organization’s ability to protect sensitive data in the cloud, their current use of cloud security technologies, and more. Read this report for the full analysis of their responses.

Key Takeaways: 
  • The vast majority of organizations (89%) host sensitive data or workloads in the cloud.
  • Most organizations report that their cloud provider’s security controls are highly effective (38%) or somewhat effective (51%). 
  • Organizations feel less confident in their own ability to protect sensitive data in the cloud, with most respondents feeling slightly (31%) or moderately (44%) confident.
  • Over half of organizations plan to implement emerging solutions such as homomorphic encryption (59%) and confidential computing (55%) within the next 1-2 years. 
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources

Sponsor

Zero Trust Automation & Orchestration and Visibility & Analytics Overview
Zero Trust Automation & Orchestration and Visib...
Zero Trust Guidance for IoT
Zero Trust Guidance for IoT
State of SaaS Security Report 2025
State of SaaS Security Report 2025
What is SOC 1? — A Complete Guide to SOC 1 Reports
What is SOC 1? — A Complete Guide to SOC 1 Reports
Published: 07/18/2025
7 Email Security Metrics That Matter: How to Measure and Improve Your Protection
7 Email Security Metrics That Matter: How to Measure and Improve Yo...
Published: 07/15/2025
How Your Zero Trust Environment Affects Your Compliance Assessment
How Your Zero Trust Environment Affects Your Compliance Assessment
Published: 07/10/2025
Why EU Cybersecurity Compliance is the New Competitive Advantage
Why EU Cybersecurity Compliance is the New Competitive Advantage
Published: 07/09/2025

Acknowledgements

Hillary Baron
Hillary Baron
Senior Technical Director - Research, CSA

Hillary Baron

Senior Technical Director - Research, CSA

Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training