Cloud 101CircleEventsBlog

Download Publication

Top Threats to Cloud Computing: Deep Dive
Top Threats to Cloud Computing: Deep Dive

Top Threats to Cloud Computing: Deep Dive

Release Date: 08/08/2018

Working Group: Top Threats

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its foundation. Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor, spanning from threats and vulnerabilities to end controls and mitigations. We encourage architects and engineers to use this information as a starting point for their own analysis and comparisons.
Download this Resource

Bookmark
Share
View translations
Related resources
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
Third-Party Vendor Risk Management in Healthcare
Third-Party Vendor Risk Management in Healthcare
Top Threats to Cloud Computing Pandemic Eleven
Top Threats to Cloud Computing Pandemic Eleven
Hacking Paris 2024: Olympic Cyber Threats
Hacking Paris 2024: Olympic Cyber Threats
Published: 07/11/2024
Combatting Data Security Cluelessness
Combatting Data Security Cluelessness
Published: 07/11/2024
Why ASPM is Critical Now—And How You Can Make It Happen
Why ASPM is Critical Now—And How You Can Make It Happen
Published: 07/10/2024
Revamping Third Party Vendor Assessments for the Age of Large Language Models
Revamping Third Party Vendor Assessments for the Age of Large Langu...
Published: 07/10/2024

Acknowledgements

Michael Roza
Michael Roza
Risk, Control and Compliance Professional at EVC

Michael Roza

Risk, Control and Compliance Professional at EVC

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Victor Chin Headshot Missing
Victor Chin

Victor Chin

Shamun Mahmud
Shamun Mahmud
Senior Research Analyst, CSA

Shamun Mahmud

Senior Research Analyst, CSA

Scott Field Headshot Missing
Scott Field

Scott Field

Shira Shamban Headshot Missing
Shira Shamban

Shira Shamban

Velan Thangavelu Headshot Missing
Velan Thangavelu

Velan Thangavelu

Jon-Michael Brook
Jon-Michael Brook

Jon-Michael Brook

Jon-Michael C. Brook is a certified, 25-year practitioner of cybersecurity, cloud, and privacy. He is the principal contributor to certification sites for privacy and cloud security, and has published books on privacy. Jon-Michael received numerous awards and recognition during his time with Raytheon, Northrop Grumman, Symantec, and Starbucks. He holds patents and trade secrets in intrusion detection, GUI design, and semantic data redaction...

Read more

Dave Shackleford Headshot Missing
Dave Shackleford

Dave Shackleford

Mark Yanalitis Headshot Missing
Mark Yanalitis

Mark Yanalitis

Randall Brooks Headshot Missing
Randall Brooks

Randall Brooks

Aiyan Ma Headshot Missing
Aiyan Ma

Aiyan Ma

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training