Download Publication

Top Threats to Cloud Computing: Egregious Eleven
Release Date: 08/06/2019
The Top Threats reports have traditionally aimed to raise awareness of threats, risks and vulnerabilities in the cloud. Such issues are often the result of the shared, on-demand nature of cloud computing. In this fourth installment, we again surveyed 241 industry experts on security issues in the cloud industry. This year our respondents rated 11 salient threats, risks and vulnerabilities in their cloud environments. The Top Threats Working Group used the survey results along with its expertise to create the final 2019 report.
Related Certificates & Training | Related Articles | Working Group
Help CSA better understand how we can support the cloud community. Answer a couple of questions to download this resource.
In my current job I work in:
CSA is a community driven organization. We would like to send you updates about our ongoing initiatives and opportunities to participate.
By opting into this agreement I am indicating that I want to receive email updates from CSA on related projects. (Marketing purposes, Section 3 of the Privacy Policy).
Our research is freely available in part thanks to the support of industry sponsors. Would you be willing to receive updates from them?
By opting into this agreement I am indicating that I want to receive email updates from CSA’s partners and sponsors on their projects/services. (Marketing purposes, Section 3 of the Privacy Policy).
CSA is a community driven organization. We would like to send you updates about our ongoing initiatives and opportunities to participate.
By opting into this agreement I am indicating that I want to receive email updates from CSA on related projects. (Marketing purposes, Section 3 of the Privacy Policy).
Provide feedback on this form