Download Publication
Who it's for:
- Cloud security practitioners and enthusiasts
- Compliance, risk, and technology staff
- Executive management
Top Threats to Cloud Computing: Pandemic 11 Deep Dive
Release Date: 10/17/2023
Working Group: Top Threats
This publication reflects on eight recent cloud breach cases, presented as both a detailed narrative and a threat model. The threat model format provides an attack-style synopsis of the threat actor including the relevant cloud computing vulnerabilities, business and technical impacts, and end controls and mitigations, deriving actionable insights to benefit cloud users, builders, and defenders. Additionally, each of the cases is mapped to the cloud security threats outlined in the Top Threats to Cloud Computing Pandemic Eleven publication released in 2022, as well as applicable Cloud Controls Matrix (CCM) controls and key takeaways.
The analysis of these breaches produced observations on the prevalence of modern cloud security risks, the growing impact of identity and supply chain on cloud security, and the changing profile of threat actors targeting cloud services. Security practitioners and technology leaders are encouraged to use these breach case studies and insights to start their own internal analysis, comparisons, and discussions.
Breaches Covered:
- Okta (2022)
- Dropbox (2022)
- US Department of Defense (2023)
- Uber (2022)
- Minecraft Log4j (2022)
- Codecov (2021)
- Portuguese & Brazilian Embassies - APT29 (2022)
- LastPass (2022)
Download this Resource
Related Resources
Interested in helping develop research with CSA?
Related Certificates & Training

CSA's Cloud Infrastructure Security training provides a high-level introduction to the most critical cloud security topics through virtual self-paced courses. Each Cloud Infrastructure Security training focuses on a specific area of cloud computing, and is design to be succinct, taking one-hour to complete.
Learn more
Learn more


.jpeg)
.jpeg)
