ChaptersEventsBlog

Download Publication

Top Threats to Cloud Computing: Deep Dive
Top Threats to Cloud Computing: Deep Dive

Top Threats to Cloud Computing: Deep Dive

Release Date: 08/08/2018

Working Group: Top Threats

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its foundation. Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor, spanning from threats and vulnerabilities to end controls and mitigations. We encourage architects and engineers to use this information as a starting point for their own analysis and comparisons.
Download this Resource

Bookmark
Share
View translations
Related resources
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
Cloud Threat Modeling 2025
Cloud Threat Modeling 2025
Capabilities-Based Risk Assessment (CBRA) for AI Systems
Capabilities-Based Risk Assessment (CBRA) for A...
AI Governance Framework Adoption in Cloud-Native AI Systems: Phased Approach and Considerations
AI Governance Framework Adoption in Cloud-Native AI Systems: Phased...
Published: 01/27/2026
Agentic AI Pen Testing: Speed at Scale, Certainty with Humans
Agentic AI Pen Testing: Speed at Scale, Certainty with Humans
Published: 01/26/2026
What if AI Knew When to Say “I Don’t Know”?
What if AI Knew When to Say “I Don’t Know”?
Published: 01/21/2026
Scoping a Privacy Information Management System (PIMS) With ISO 27701:2025
Scoping a Privacy Information Management System (PIMS) With ISO 277...
Published: 01/21/2026

Interested in helping develop research with CSA?

Related Certificates & Training