Cloud 101CircleEventsBlog
Don't miss out! Join us for the free, virtual Global AI Symposium from October 22nd - 24th—register today!

Download Publication

Top Threats to Cloud Computing: Deep Dive
Top Threats to Cloud Computing: Deep Dive

Top Threats to Cloud Computing: Deep Dive

Release Date: 08/08/2018

Working Group: Top Threats

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its foundation. Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor, spanning from threats and vulnerabilities to end controls and mitigations. We encourage architects and engineers to use this information as a starting point for their own analysis and comparisons.
Download this Resource

Bookmark
Share
View translations
Related resources
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
Top Threats to Cloud Computing: Pandemic 11 Deep Dive
Top Threats to Cloud Computing: Pandemic 11 Dee...
The Cybersecurity Landscape in the Benelux Region and Beyond
The Cybersecurity Landscape in the Benelux Region and Beyond
Published: 10/23/2024
Six Key Use Cases for Continuous Controls Monitoring
Six Key Use Cases for Continuous Controls Monitoring
Published: 10/23/2024
7 Ways Data Access Governance Increases Data ROI
7 Ways Data Access Governance Increases Data ROI
Published: 10/23/2024
Top Threat #4 - Cloudy with a Chance of Breach: The Cloud Security Strategy Storm
Top Threat #4 - Cloudy with a Chance of Breach: The Cloud Security ...
Published: 10/21/2024
Defending Against the Cloud Adversary: Detection and Response in the Cloud
Defending Against the Cloud Adversary: Detection and Response in th...
October 24 | Online

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional

Michael Roza

Risk, Audit, Control and Compliance Professional

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Victor Chin Headshot Missing
Victor Chin

Victor Chin

Shamun Mahmud
Shamun Mahmud
Senior Research Analyst, CSA

Shamun Mahmud

Senior Research Analyst, CSA

Scott Field Headshot Missing
Scott Field

Scott Field

Shira Shamban Headshot Missing
Shira Shamban

Shira Shamban

Velan Thangavelu Headshot Missing
Velan Thangavelu

Velan Thangavelu

Jon-Michael Brook
Jon-Michael Brook

Jon-Michael Brook

Jon-Michael C. Brook is a certified, 25-year practitioner of cybersecurity, cloud, and privacy. He is the principal contributor to certification sites for privacy and cloud security, and has published books on privacy. Jon-Michael received numerous awards and recognition during his time with Raytheon, Northrop Grumman, Symantec, and Starbucks. He holds patents and trade secrets in intrusion detection, GUI design, and semantic data redaction...

Read more

Dave Shackleford Headshot Missing
Dave Shackleford

Dave Shackleford

Mark Yanalitis Headshot Missing
Mark Yanalitis

Mark Yanalitis

Randall Brooks Headshot Missing
Randall Brooks

Randall Brooks

Aiyan Ma Headshot Missing
Aiyan Ma

Aiyan Ma

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training