ChaptersEventsBlog
Register now for the December 11 session on the rise of DeepSeek, AI experimentation, and critical security gaps.

Download Publication

State of Cloud Security Risk, Compliance, and Misconfigurations - Japanese Translation
State of Cloud Security Risk, Compliance, and Misconfigurations - Japanese Translation

State of Cloud Security Risk, Compliance, and Misconfigurations - Japanese Translation

Release Date: 12/14/2021

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected]

クラウドの設定ミスは、パブリッククラウドを利用している組織にとって常に最大の懸念事項です。このような設定ミスは、データ侵害につながり、リソースの削除または変更を許可し、サービスの中断を引き起こし、事業運営に大混乱をもたらすこともあります。構成ミスによる侵害が最近の大きな話題となっていることから、この調査では、クラウドセキュリティプログラムの現状、セキュリティリスクを軽減するために利用されるツール、組織のクラウドセキュリティポスチャ、および組織がセキュリティリスクを軽減する上で直面する障壁をよりよく理解できるように実施されました。

この調査の目的は、構成の誤りによるパブリッククラウドのセキュリティとコンプライアンスのリスクを軽減するための組織の準備状況を評価することです。

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Introductory Guidance to AICM
Introductory Guidance to AICM
Capabilities-Based Risk Assessment (CBRA) for AI Systems
Capabilities-Based Risk Assessment (CBRA) for A...
Beyond the Hype: A Benchmark Study of AI Agents in the SOC
Beyond the Hype: A Benchmark Study of AI Agents...
Why Compliance as Code is the Future (And How to Get Started)
Why Compliance as Code is the Future (And How to Get Started)
Published: 12/04/2025
Why AI Won't Replace Us: The Critical Role of Human Oversight in AI-Driven Workflows
Why AI Won't Replace Us: The Critical Role of Human Oversight in AI...
Published: 12/03/2025
The CSA Cloud Controls Matrix v4.1: Strengthening the Future of Cloud Security
The CSA Cloud Controls Matrix v4.1: Strengthening the Future of Clo...
Published: 12/02/2025
Navigating the Liminal Edge of AI Security: Deconstructing Prompt Injection, Model Poisoning, and Adversarial Perturbations in the Cognitive Cyber Domain
Navigating the Liminal Edge of AI Security: Deconstructing Prompt I...
Published: 12/01/2025

Interested in helping develop research with CSA?

Related Certificates & Training