Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

Download Publication

Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Japanese Translation
Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Japanese Translation

Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Japanese Translation

Release Date: 11/30/2020

Working Group: Top Threats

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

このレポートは、昨年の「クラウドの重大セキュリティ脅威 11の悪質な脅威」のケーススタディー‌‌‌を分析しています:‌‌‌‌‌‌「11の悪質な脅威」は、クラウド‌‌コンピューティングの重大脅威と関連性のあるセキュリティ業界の侵害の分析です。大手金融サービス会社、大手エンタープライズビデオ通信会社、多国籍食料品チェーンを含む9つの実際の攻撃や侵害を使ったセキュリティ分析に関して、CSA重大脅威の点と点を結びつけています。

9つの例はそれぞれ、(1)参考図表と(2)詳細説明の形式で紹介されています。参考図表のフォーマットは、脅威や脆弱性からエンド・コントロールや緩和策に至るまで、アクターの攻撃スタイルの概要を提供しています。

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing: Pandemic 11 Deep Dive
Top Threats to Cloud Computing: Pandemic 11 Dee...
Cloud and Compromise (C&C): Gamifying of Cloud Security
Cloud and Compromise (C&C): Gamifying of Cloud ...
CSA Community Spotlight: Nerding Out About Security with CISO Alexander Getsin
CSA Community Spotlight: Nerding Out About Security with CISO Alexa...
Published: 11/21/2024
Top Threat #5 - Third Party Tango: Dancing Around Insecure Resources
Top Threat #5 - Third Party Tango: Dancing Around Insecure Resources
Published: 11/18/2024
The Rocky Path of Managing AI Security Risks in IT Infrastructure
The Rocky Path of Managing AI Security Risks in IT Infrastructure
Published: 11/15/2024
Threat Report: BEC and VEC Attacks Continue to Surge, Outpacing Legacy Solutions
Threat Report: BEC and VEC Attacks Continue to Surge, Outpacing Leg...
Published: 11/08/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training