ChaptersCircleEventsBlog
Share how your organization adapts IAM practices to AI. Take the AI Identify Risk & Readiness Survey today!

Download Publication

Top Threats to Cloud Computing Deep Dive: Chinese Translation
Top Threats to Cloud Computing Deep Dive: Chinese Translation

Top Threats to Cloud Computing Deep Dive: Chinese Translation

Release Date: 06/24/2017

Working Group: Top Threats

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact research@cloudsecurityalliance.org.

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its foundation. Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor, spanning from threats and vulnerabilities to end controls and mitigations. We encourage architects and engineers to use this information as a starting point for their own analysis and comparisons.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing: Pandemic 11 Deep Dive
Top Threats to Cloud Computing: Pandemic 11 Dee...
Cloud and Compromise (C&C): Gamifying of Cloud Security
Cloud and Compromise (C&C): Gamifying of Cloud ...
The Hidden Cost of Trust: New Data Reveals Alarming Employee Engagement with Vendor Email Compromise
The Hidden Cost of Trust: New Data Reveals Alarming Employee Engage...
Published: 08/01/2025
Quishing is Here, and It’s Hiding in Plain Sight
Quishing is Here, and It’s Hiding in Plain Sight
Published: 07/31/2025
A Business Guide to…Protecting Personal Information on Social Media
A Business Guide to…Protecting Personal Information on Social Media
Published: 07/30/2025
How to Spot and Stop E-Skimming Before It Hijacks Your Customers—and Your Credibility
How to Spot and Stop E-Skimming Before It Hijacks Your Customers—an...
Published: 07/30/2025
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training