Cloud 101CircleEventsBlog
The CCSK v5 and Security Guidance v5 are now available!

Download Publication

Top Threats to Cloud Computing Deep Dive: Chinese Translation
Top Threats to Cloud Computing Deep Dive: Chinese Translation

Top Threats to Cloud Computing Deep Dive: Chinese Translation

Release Date: 06/24/2017

Working Group: Top Threats

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its foundation. Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor, spanning from threats and vulnerabilities to end controls and mitigations. We encourage architects and engineers to use this information as a starting point for their own analysis and comparisons.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Top Threats to Cloud Computing Pandemic Eleven
Top Threats to Cloud Computing Pandemic Eleven
Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Arabic Translation
Top Threats to Cloud Computing: Egregious Eleve...
Cloud Threat Modeling
Cloud Threat Modeling
Buckle Up: BEC and VEC Attacks Target Automotive Industry
Buckle Up: BEC and VEC Attacks Target Automotive Industry
Published: 07/15/2024
Unmasking Vendor Fraud: Detecting Suspicious Activity in Email Communications
Unmasking Vendor Fraud: Detecting Suspicious Activity in Email Comm...
Published: 06/04/2024
Why Do Most Cybersecurity Attacks Occur in Q4?
Why Do Most Cybersecurity Attacks Occur in Q4?
Published: 05/24/2024
Unveiling the Dark Arts of Exploiting Trust
Unveiling the Dark Arts of Exploiting Trust
Published: 05/14/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training