Download Publication

Top Threats to Cloud Computing: Egregious Eleven Deep Dive
Release Date: 09/23/2020
Working Group: Top Threats
Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor spanning from threats and vulnerabilities to end controls and mitigations.
Key Takeaways:
- The attack details for each case study
- The technical and business impacts of each attack
- The preventative, detective and corrective mitigation measures organizations should take
- Where and how CSA Top Threats fit in a greater security analysis
- How lessons and mitigation concepts can be applied in real-world scenarios
Download this Resource
Related Resources
Acknowledgements

Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Jon-Michael Brook
Jon-Michael C. Brook is a certified, 25-year practitioner of cybersecurity, cloud, and privacy. He is the principal contributor to certification sites for privacy and cloud security, and has published books on privacy. Jon-Michael received numerous awards and recognition during his time with Raytheon, Northrop Grumman, Symantec, and Starbucks. He holds patents and trade secrets in intrusion detection, GUI design, and semantic data redaction...

Nabeel Yousif

Ebudo Osime

Suhas Bhat

Prabu Natarajan

Brian Kinsley

John Yeoh
Global Vice President of Research, CSA
With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Frank Guanco
Operations Director, CSA

Vic Hargrave
Senior Cyber Analyst/Engineer
Vic Hargrave has 20 years of experience in cybersecurity working for Everfox, Forcepoint Federal, Trend Micro, and VMware developing a broad range of security solutions including user-entity behavior analytics, threat management, and content filtering. Vic specializes in behavior analytics and insider threat risk. He has co-authored several publications with the Top Treat Working Group and is active in the CSA AI Technology and Risk Worki...

Tal Eliyahu

Begum Calguner
Interested in helping develop research with CSA?
Related Certificates & Training

Learn more