Download Publication

Top Threats to Cloud Computing: Egregious Eleven Deep Dive
Release Date: 09/23/2020
Working Group: Top Threats
Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor spanning from threats and vulnerabilities to end controls and mitigations.
Key Takeaways:
- The attack details for each case study
- The technical and business impacts of each attack
- The preventative, detective and corrective mitigation measures organizations should take
- Where and how CSA Top Threats fit in a greater security analysis
- How lessons and mitigation concepts can be applied in real-world scenarios
Fill out this form to access this resource.
In my current job I work in:
Can we send you emails about other CSA projects?
By opting into this agreement I am indicating that I want to receive email updates from CSA on related projects. (Marketing purposes, Section 3 of the Privacy Policy).
Our research is freely available in part thanks to the support of industry sponsors. Would you be willing to receive updates from them?
By opting into this agreement I am indicating that I want to receive email updates from CSA’s partners and sponsors on their projects/services. (Marketing purposes, Section 3 of the Privacy Policy).
Can we send you emails about other CSA projects?
By opting into this agreement I am indicating that I want to receive email updates from CSA on related projects. (Marketing purposes, Section 3 of the Privacy Policy).
Provide feedback on this form