Cloud 101CircleEventsBlog
Missed CSA's Cyber Monday sale? You can still get 50% off the CCSK + CCZT Exam & Training Bundle and Token Bundle with raincheck code 'rcdoubledip24'

Download Publication

Top Threats to Cloud Computing: Deep Dive
Top Threats to Cloud Computing: Deep Dive

Top Threats to Cloud Computing: Deep Dive

Release Date: 08/08/2018

Working Group: Top Threats

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its foundation. Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor, spanning from threats and vulnerabilities to end controls and mitigations. We encourage architects and engineers to use this information as a starting point for their own analysis and comparisons.
Download this Resource

Bookmark
Share
View translations
Related resources
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
Top Threats to Cloud Computing: Pandemic 11 Deep Dive
Top Threats to Cloud Computing: Pandemic 11 Dee...
It’s Time for Ushered Access to Replace Free Reign for Third-Party Partners
It’s Time for Ushered Access to Replace Free Reign for Third-Party ...
Published: 12/12/2024
Level Up Your Cloud Security Skills With This Jam-Packed Training Bundle
Level Up Your Cloud Security Skills With This Jam-Packed Training B...
Published: 12/11/2024
The Transformative Power of Multifactor Authentication
The Transformative Power of Multifactor Authentication
Published: 12/11/2024
Strengthening Cybersecurity with a Resilient Incident Response Plan
Strengthening Cybersecurity with a Resilient Incident Response Plan
Published: 12/10/2024

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 125 projects, as a Lead Author or Author/Contributor and many more as a Reviewer/Editor.

Michael's extensive contributions encompass critical areas including Artificial Intelligence, Zero Trust/Software Defined Perimeter, Internet of Things, Top Threats, Cloud Control Matrix, DevSecOps, and Key Management. His lea...

Read more

Victor Chin Headshot Missing
Victor Chin

Victor Chin

Shamun Mahmud
Shamun Mahmud
Senior Research Analyst, CSA

Shamun Mahmud

Senior Research Analyst, CSA

Scott Field Headshot Missing
Scott Field

Scott Field

Shira Shamban Headshot Missing
Shira Shamban

Shira Shamban

Velan Thangavelu Headshot Missing
Velan Thangavelu

Velan Thangavelu

Jon-Michael Brook
Jon-Michael Brook

Jon-Michael Brook

Jon-Michael C. Brook is a certified, 25-year practitioner of cybersecurity, cloud, and privacy. He is the principal contributor to certification sites for privacy and cloud security, and has published books on privacy. Jon-Michael received numerous awards and recognition during his time with Raytheon, Northrop Grumman, Symantec, and Starbucks. He holds patents and trade secrets in intrusion detection, GUI design, and semantic data redaction...

Read more

Dave Shackleford Headshot Missing
Dave Shackleford

Dave Shackleford

Mark Yanalitis Headshot Missing
Mark Yanalitis

Mark Yanalitis

Randall Brooks Headshot Missing
Randall Brooks

Randall Brooks

Aiyan Ma Headshot Missing
Aiyan Ma

Aiyan Ma

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training