Download Publication

Top Threats to Cloud Computing: Egregious Eleven Deep Dive
Release Date: 09/23/2020
Working Groups: Top Threats Data Security
Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor spanning from threats and vulnerabilities to end controls and mitigations.
Key Takeaways:
- The attack details for each case study
- The technical and business impacts of each attack
- The preventative, detective and corrective mitigation measures organizations should take
- Where and how CSA Top Threats fit in a greater security analysis
- How lessons and mitigation concepts can be applied in real-world scenarios
Download this Resource
Related Resources
Acknowledgements

Michael Roza
Head of Risk, Audit, Control and Compliance
Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Jon-Michael Brook
Jon-Michael C. Brook, Principal at Guide Holdings, LLC, has 20 years of experience in Information Security with such organizations as Raytheon, Northrop Grumman, Booz Allen Hamilton, Optiv Security and Symantec. Mr. Brook's work traverses the government, financial, healthcare, gaming, oil and gas and pharmaceutical industries. Mr. Brook obtained a number of industry certifications, including CISSP and CCSK, has patents and trade secrets in...

Nabeel Yousif
This person does not have a biography listed with CSA.

Ebudo Osime
This person does not have a biography listed with CSA.

Suhas Bhat
This person does not have a biography listed with CSA.

Prabu Natarajan
This person does not have a biography listed with CSA.

Brian Kinsley
This person does not have a biography listed with CSA.

John Yeoh
Global Vice President of Research, CSA
With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Frank Guanco
Research Program Manager, CSA
This person does not have a biography listed with CSA.

Sean Heide
Technical Research Director, CSA
This person does not have a biography listed with CSA.

Vic Hargrave
Senior Cyber Analyst/Engineer
This person does not have a biography listed with CSA.

Tal Eliyahu
This person does not have a biography listed with CSA.

Begum Calguner
This person does not have a biography listed with CSA.