ChaptersEventsBlog
How is your enterprise using AI Agents? Help us benchmark security and take the survey before November 30 →

Download Publication

‘The Treacherous Twelve’ Cloud Computing Top Threats in 2016
‘The Treacherous Twelve’ Cloud Computing Top Threats in 2016

‘The Treacherous Twelve’ Cloud Computing Top Threats in 2016

Release Date: 02/29/2016

Working Group: Top Threats

“The Treacherous 12 - Cloud Computing Top Threats in 2016” plays a crucial role in the CSA research ecosystem. The purpose of the report is to provide organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated risk-management decisions regarding cloud adoption strategies. The report reflects the current consensus among security experts in the CSA community about the most significant security issues in the cloud.


You can view the latest version of this report here
Download this Resource

Bookmark
Share
Related resources
Cloud Threat Modeling 2025
Cloud Threat Modeling 2025
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing: Pandemic 11 Deep Dive
Top Threats to Cloud Computing: Pandemic 11 Dee...
Implementing CCM: Threat & Vulnerability Management Controls
Implementing CCM: Threat & Vulnerability Management Controls
Published: 11/21/2025
Red Teaming Voice AI: Securing the Next Generation of Conversational Systems
Red Teaming Voice AI: Securing the Next Generation of Conversationa...
Published: 11/20/2025
It’s Time to Make Cloud Threat Modeling Continuous
It’s Time to Make Cloud Threat Modeling Continuous
Published: 11/20/2025
Reflecting on the 2024 Microsoft Breach
Reflecting on the 2024 Microsoft Breach
Published: 09/15/2025

Interested in helping develop research with CSA?

Related Certificates & Training