Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

Download Publication

Top Threats to Cloud Computing: Deep Dive
Top Threats to Cloud Computing: Deep Dive

Top Threats to Cloud Computing: Deep Dive

Release Date: 08/08/2018

Working Group: Top Threats

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its foundation. Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor, spanning from threats and vulnerabilities to end controls and mitigations. We encourage architects and engineers to use this information as a starting point for their own analysis and comparisons.
Download this Resource

Bookmark
Share
View translations
Related resources
Third-Party Vendor Risk Management in Healthcare
Third-Party Vendor Risk Management in Healthcare
Top Threats to Cloud Computing Pandemic Eleven
Top Threats to Cloud Computing Pandemic Eleven
Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Arabic Translation
Top Threats to Cloud Computing: Egregious Eleve...
Do You Know These 7 Terms About Cyber Threats and Vulnerabilities?
Do You Know These 7 Terms About Cyber Threats and Vulnerabilities?
Published: 04/19/2024
The Data Security Risks of Adopting Copilot for Microsoft 365
The Data Security Risks of Adopting Copilot for Microsoft 365
Published: 04/16/2024
From Gatekeeper to Guardian: Why CISOs Must Embrace Their Inner Business Superhero
From Gatekeeper to Guardian: Why CISOs Must Embrace Their Inner Bus...
Published: 04/15/2024
Cloud Gaming and Data Security: Balancing Fun and Privacy
Cloud Gaming and Data Security: Balancing Fun and Privacy
Published: 04/12/2024

Acknowledgements

Michael Roza
Michael Roza
Head of Risk, Audit, Control and Compliance

Michael Roza

Head of Risk, Audit, Control and Compliance

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Victor Chin Headshot Missing
Victor Chin

Victor Chin

This person does not have a biography listed with CSA.

Shamun Mahmud
Shamun Mahmud
Senior Research Analyst, CSA

Shamun Mahmud

Senior Research Analyst, CSA

This person does not have a biography listed with CSA.

Scott Field Headshot Missing
Scott Field

Scott Field

This person does not have a biography listed with CSA.

Shira Shamban Headshot Missing
Shira Shamban

Shira Shamban

This person does not have a biography listed with CSA.

Velan Thangavelu Headshot Missing
Velan Thangavelu

Velan Thangavelu

This person does not have a biography listed with CSA.

Jon-Michael Brook
Jon-Michael Brook

Jon-Michael Brook

Jon-Michael C. Brook is a certified, 25-year practitioner of cybersecurity, cloud, and privacy. He is the principal contributor to certification sites for privacy and cloud security, and has published books on privacy. Jon-Michael received numerous awards and recognition during his time with Raytheon, Northrop Grumman, Symantec, and Starbucks. He holds patents and trade secrets in intrusion detection, GUI design, and semantic data redaction...

Read more

Dave Shackleford Headshot Missing
Dave Shackleford

Dave Shackleford

This person does not have a biography listed with CSA.

Mark Yanalitis Headshot Missing
Mark Yanalitis

Mark Yanalitis

This person does not have a biography listed with CSA.

Randall Brooks Headshot Missing
Randall Brooks

Randall Brooks

This person does not have a biography listed with CSA.

Aiyan Ma Headshot Missing
Aiyan Ma

Aiyan Ma

This person does not have a biography listed with CSA.

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training