ChaptersEventsBlog

Download Publication

Top Threats to Cloud Computing: Egregious Eleven
Top Threats to Cloud Computing: Egregious Eleven

Top Threats to Cloud Computing: Egregious Eleven

Release Date: 08/06/2019

Working Group: Top Threats

The report provides organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated risk-management decisions regarding cloud adoption strategies.

The Top Threats reports have traditionally aimed to raise awareness of threats, risks and vulnerabilities in the cloud. Such issues are often the result of the shared, on-demand nature of cloud computing.  In this fourth installment, we again surveyed 241 industry experts on security issues in the cloud industry. This year our respondents rated 11 salient threats, risks and vulnerabilities in their cloud environments. The Top Threats Working Group used the survey results along with its expertise to create the final 2019 report.

Related Certificates & Training | Related Articles | Working Group 
Download this Resource

Bookmark
Share
View translations
Related resources
Managing Privileged Access in a Cloud-First World
Managing Privileged Access in a Cloud-First World
Cloud Threat Modeling 2025
Cloud Threat Modeling 2025
Capabilities-Based Risk Assessment (CBRA) for AI Systems
Capabilities-Based Risk Assessment (CBRA) for A...
What if AI Knew When to Say “I Don’t Know”?
What if AI Knew When to Say “I Don’t Know”?
Published: 01/21/2026
Scoping a Privacy Information Management System (PIMS) With ISO 27701:2025
Scoping a Privacy Information Management System (PIMS) With ISO 277...
Published: 01/21/2026
What Actually Makes an Agentic AI Solution Scalable?
What Actually Makes an Agentic AI Solution Scalable?
Published: 01/20/2026
What AI Risks Are Hiding in Your Apps?
What AI Risks Are Hiding in Your Apps?
Published: 01/16/2026

Interested in helping develop research with CSA?

Related Certificates & Training