Cloud 101CircleEventsBlog
Join AT&T's experts & CSA's Troy Leach on April 4 to boost your cyber resilience in 2024!

Download Publication

Top Threats to Cloud Computing: Egregious Eleven - Japanese Translation
Top Threats to Cloud Computing: Egregious Eleven - Japanese Translation

Top Threats to Cloud Computing: Egregious Eleven - Japanese Translation

Release Date: 11/18/2019

Working Group: Top Threats

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

This report provides case‌ ‌study‌ ‌analyses‌ ‌for‌ last year’s ‌The‌ ‌Egregious‌ ‌11:‌ ‌Top‌ ‌Threats‌ ‌to‌ ‌Cloud‌ ‌Computing and a relative security industry breach analysis. Using nine actual attacks and breaches, including a major financial services company, a leading enterprise video communications firm, and a multinational grocery chain for its foundation, the paper connects the dots between the CSA Top Threats in terms of security analysis.

Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor spanning from threats and vulnerabilities to end controls and mitigations.

 
Key Takeaways:

  • The attack details for each case study

  • The technical and business impacts of each attack

  • The preventative, detective and corrective mitigation measures organizations should take

  • Where and how CSA Top Threats fit in a greater security analysis

  • How lessons and mitigation concepts can be applied in real-world scenarios


Who it’s for:

These anecdotes will let cybersecurity managers, cloud architects, and cloud engineers better communicate with executives and peers in addition to providing context for discussions with technical staff and offers in-depth detail for implementing mitigations and countermeasures from a security analysis standpoint.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Top Threats to Cloud Computing Pandemic Eleven
Top Threats to Cloud Computing Pandemic Eleven
Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Arabic Translation
Top Threats to Cloud Computing: Egregious Eleve...
Cloud Threat Modeling
Cloud Threat Modeling
Cybersecurity Frontiers: Unveiling CTI's Role in Mitigating Dark Web Risks
Cybersecurity Frontiers: Unveiling CTI's Role in Mitigating Dark We...
Published: 03/25/2024
2023 Threat Intelligence Year in Review: Key Insights and Developments
2023 Threat Intelligence Year in Review: Key Insights and Developments
Published: 03/14/2024
A Comprehensive Guide to Business Cyber Security
A Comprehensive Guide to Business Cyber Security
Published: 03/14/2024
HijackLoader Expands Techniques to Improve Defense Evasion
HijackLoader Expands Techniques to Improve Defense Evasion
Published: 03/08/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training