ChaptersCircleEventsBlog
Take the Cloud Security & AI Trends Survey for a chance to win a free CCSK token ($445 value) or a CCZT + CCSK training bundle ($1,250 value)!

Download Publication

Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Arabic Translation
Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Arabic Translation

Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Arabic Translation

Release Date: 05/27/2022

Working Group: Top Threats

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact research@cloudsecurityalliance.org.


This report provides case‌ ‌study‌ ‌analyses‌ ‌for‌ last year’s ‌The‌ ‌Egregious‌ ‌11:‌ ‌Top‌ ‌Threats‌ ‌to‌ ‌Cloud‌ ‌Computing and a relative security industry breach analysis. Using nine actual attacks and breaches, including a major financial services company, a leading enterprise video communications firm, and a multinational grocery chain for its foundation, the paper connects the dots between the CSA Top Threats in terms of security analysis.


Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor spanning from threats and vulnerabilities to end controls and mitigations.

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
State of SaaS Security Report 2025
State of SaaS Security Report 2025
Zero Trust Privacy Assessment and Guidance - Japanese Translation
Zero Trust Privacy Assessment and Guidance - Ja...
CSA Code of Conduct to EU Cloud Code of Conduct Mapping
CSA Code of Conduct to EU Cloud Code of Conduct...
Exploring the Complex Relationship Between Privacy and Cybersecurity
Exploring the Complex Relationship Between Privacy and Cybersecurity
Published: 05/23/2025
Taking the Pressure Off Employees When Protecting the Organization from Phishing Campaigns
Taking the Pressure Off Employees When Protecting the Organization ...
Published: 05/23/2025
The Rising Threat of Consent Phishing: How OAuth Abuse Bypasses MFA
The Rising Threat of Consent Phishing: How OAuth Abuse Bypasses MFA
Published: 05/20/2025
CISO's Guide for Defending against the Top 8 Cyber Threats in 2025
CISO's Guide for Defending against the Top 8 Cyber Threats in 2025
Published: 05/19/2025
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training