Cloud 101CircleEventsBlog

Download Publication

Top Threats to Cloud Computing: Egregious Eleven Deep Dive
Top Threats to Cloud Computing: Egregious Eleven Deep Dive

Top Threats to Cloud Computing: Egregious Eleven Deep Dive

Release Date: 09/23/2020

Working Groups: Top Threats Data Security

This report provides case‌ ‌study‌ ‌analyses‌ ‌for‌ last year’s ‌The‌ ‌Egregious‌ ‌11:‌ ‌Top‌ ‌Threats‌ ‌to‌ ‌Cloud‌ ‌Computing and a relative security industry breach analysis. Using nine actual attacks and breaches, including a major financial services company, a leading enterprise video communications firm, and a multinational grocery chain for its foundation, the paper connects the dots between the CSA Top Threats in terms of security analysis.

Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor spanning from threats and vulnerabilities to end controls and mitigations.

 
Key Takeaways:

  • The attack details for each case study

  • The technical and business impacts of each attack

  • The preventative, detective and corrective mitigation measures organizations should take

  • Where and how CSA Top Threats fit in a greater security analysis

  • How lessons and mitigation concepts can be applied in real-world scenarios


Who it’s for:

These anecdotes will let cybersecurity managers, cloud architects, and cloud engineers better communicate with executives and peers in addition to providing context for discussions with technical staff and offers in-depth detail for implementing mitigations and countermeasures from a security analysis standpoint.

Download this Resource

Bookmark
Share
View translations
Related resources
Third-Party Vendor Risk Management in Healthcare
Third-Party Vendor Risk Management in Healthcare
Top Threats to Cloud Computing Pandemic Eleven
Top Threats to Cloud Computing Pandemic Eleven
Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Arabic Translation
Top Threats to Cloud Computing: Egregious Eleve...
Artificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
Published: 11/27/2023
5 Tips to Defend Against Access Brokers This Holiday Season
5 Tips to Defend Against Access Brokers This Holiday Season
Published: 11/27/2023
Kubernetes Security Companies: 10 Considerations for Business Leaders
Kubernetes Security Companies: 10 Considerations for Business Leaders
Published: 11/21/2023
You’ve Tackled Shadow IT - Now It’s Time to Tackle Shadow DevOps
You’ve Tackled Shadow IT - Now It’s Time to Tackle Shadow DevOps
Published: 11/21/2023
Using Threat Intelligence to Break Down Security Silos
Using Threat Intelligence to Break Down Security Silos
November 30 | Online
Using Threat Intelligence to Break Down Security Silos
Using Threat Intelligence to Break Down Security Silos
November 30 | Online
The Need for Intelligence-Driven Incident Response
The Need for Intelligence-Driven Incident Response
December 7 | Online
The Need for Intelligence-Driven Incident Response
The Need for Intelligence-Driven Incident Response
December 7 | Online

Acknowledgements

Michael Roza
Michael Roza
Head of Risk, Audit, Control and Compliance

Michael Roza

Head of Risk, Audit, Control and Compliance

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Jon-Michael Brook
Jon-Michael Brook

Jon-Michael Brook

Jon-Michael C. Brook, Principal at Guide Holdings, LLC, has 20 years of experience in Information Security with such organizations as Raytheon, Northrop Grumman, Booz Allen Hamilton, Optiv Security and Symantec. Mr. Brook's work traverses the government, financial, healthcare, gaming, oil and gas and pharmaceutical industries. Mr. Brook obtained a number of industry certifications, including CISSP and CCSK, has patents and trade secrets in...

Read more

Nabeel Yousif Headshot Missing
Nabeel Yousif

Nabeel Yousif

This person does not have a biography listed with CSA.

Ebudo Osime Headshot Missing
Ebudo Osime

Ebudo Osime

This person does not have a biography listed with CSA.

Suhas Bhat Headshot Missing
Suhas Bhat

Suhas Bhat

This person does not have a biography listed with CSA.

Prabu Natarajan Headshot Missing
Prabu Natarajan

Prabu Natarajan

This person does not have a biography listed with CSA.

Brian Kinsley Headshot Missing
Brian Kinsley

Brian Kinsley

This person does not have a biography listed with CSA.

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Frank Guanco
Frank Guanco
Research Program Manager, CSA

Frank Guanco

Research Program Manager, CSA

This person does not have a biography listed with CSA.

Sean Heide
Sean Heide
Technical Research Director, CSA

Sean Heide

Technical Research Director, CSA

This person does not have a biography listed with CSA.

Vic Hargrave
Vic Hargrave
Senior Cyber Analyst/Engineer

Vic Hargrave

Senior Cyber Analyst/Engineer

This person does not have a biography listed with CSA.

Tal Eliyahu Headshot Missing
Tal Eliyahu

Tal Eliyahu

This person does not have a biography listed with CSA.

Begum Calguner Headshot Missing
Begum Calguner

Begum Calguner

This person does not have a biography listed with CSA.

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training