Cloud 101CircleEventsBlog

Download Publication

Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Arabic Translation
Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Arabic Translation

Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Arabic Translation

Release Date: 05/27/2022

Working Group: Top Threats

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].


This report provides case‌ ‌study‌ ‌analyses‌ ‌for‌ last year’s ‌The‌ ‌Egregious‌ ‌11:‌ ‌Top‌ ‌Threats‌ ‌to‌ ‌Cloud‌ ‌Computing and a relative security industry breach analysis. Using nine actual attacks and breaches, including a major financial services company, a leading enterprise video communications firm, and a multinational grocery chain for its foundation, the paper connects the dots between the CSA Top Threats in terms of security analysis.


Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor spanning from threats and vulnerabilities to end controls and mitigations.

Download this Resource

Prefer to access this resource without an account? Download it now.

State of Financial Services in Cloud
State of Financial Services in Cloud
Agile Data Lake Threat Modeling
Agile Data Lake Threat Modeling
The Six Pillars of DevSecOps - Pragmatic Implementation
The Six Pillars of DevSecOps - Pragmatic Implem...
Using ChatGPT for Cloud Security Audits
Using ChatGPT for Cloud Security Audits
Published: 06/08/2023
AWS Strengthens Security with Default Encryption on S3, Is Your Data Fully Protected?
AWS Strengthens Security with Default Encryption on S3, Is Your Dat...
Published: 06/07/2023
Is Your Data Leaking via ChatGPT?
Is Your Data Leaking via ChatGPT?
Published: 06/07/2023
Top Ways to Find and Protect Sensitive Data in the Cloud
Top Ways to Find and Protect Sensitive Data in the Cloud
Published: 06/06/2023
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?