Download Publication

Top Threats to Cloud Computing: Deep Dive
Top Threats to Cloud Computing: Deep Dive

Top Threats to Cloud Computing: Deep Dive

Release Date: 08/08/2018

This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its foundation. Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor, spanning from threats and vulnerabilities to end controls and mitigations. We encourage architects and engineers to use this information as a starting point for their own analysis and comparisons.

Related Certificates & Training | Working Group 

Help CSA better understand how we can support the cloud community. Answer a couple of questions to download this resource.

In my current job I work in:

CSA is a community driven organization. We would like to send you updates about our ongoing initiatives and opportunities to participate.

By opting into this agreement I am indicating that I want to receive email updates from CSA on related projects. (Marketing purposes, Section 3 of the Privacy Policy).

Our research is freely available in part thanks to the support of industry sponsors. Would you be willing to receive updates from them?

By opting into this agreement I am indicating that I want to receive email updates from CSA’s partners and sponsors on their projects/services. (Marketing purposes, Section 3 of the Privacy Policy).

You’ve made safer cloud computing possible.

Download
Download