Cloud 101CircleEventsBlog
Join AT&T Cybersecurity in Chicago to learn top 2024 resilience tactics on May 21st!

Download Publication

Top Threats to Cloud Computing: Pandemic 11 Deep Dive
Top Threats to Cloud Computing: Pandemic 11 Deep Dive
Who it's for:
  • Cloud security practitioners and enthusiasts
  • Compliance, risk, and technology staff
  • Executive management

Top Threats to Cloud Computing: Pandemic 11 Deep Dive

Release Date: 10/17/2023

Working Group: Top Threats

This publication reflects on eight recent cloud breach cases, presented as both a detailed narrative and a threat model. The threat model format provides an attack-style synopsis of the threat actor including the relevant cloud computing vulnerabilities, business and technical impacts, and end controls and mitigations, deriving actionable insights to benefit cloud users, builders, and defenders. Additionally, each of the cases is mapped to the cloud security threats outlined in the Top Threats to Cloud Computing Pandemic Eleven publication released in 2022, as well as applicable Cloud Controls Matrix (CCM) controls and key takeaways. 

The analysis of these breaches produced observations on the prevalence of modern cloud security risks, the growing impact of identity and supply chain on cloud security, and the changing profile of threat actors targeting cloud services. Security practitioners and technology leaders are encouraged to use these breach case studies and insights to start their own internal analysis, comparisons, and discussions.

Breaches Covered:
  • Okta (2022)
  • Dropbox (2022)
  • US Department of Defense (2023)
  • Uber (2022)
  • Minecraft Log4j (2022)
  • Codecov (2021)
  • Portuguese & Brazilian Embassies - APT29 (2022)
  • LastPass (2022)



Download this Resource

Bookmark
Share
Related resources
HSM-as-a-Service Use Cases, Considerations, and Best Practices
HSM-as-a-Service Use Cases, Considerations, and...
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
The Six Pillars of DevSecOps - Collaboration and Integration
The Six Pillars of DevSecOps - Collaboration an...
Why Business Risk Should be Your Guiding North Star for Remediation
Why Business Risk Should be Your Guiding North Star for Remediation
Published: 04/25/2024
How to Prepare Your Workforce to Secure Your Cloud Infrastructure with Zero Trust
How to Prepare Your Workforce to Secure Your Cloud Infrastructure w...
Published: 04/24/2024
AI Hallucinations: The Emerging Market for Insuring Against Generative AI's Costly Blunders
AI Hallucinations: The Emerging Market for Insuring Against Generat...
Published: 04/23/2024
Neutralizing the Threat with Cloud Remediation
Neutralizing the Threat with Cloud Remediation
Published: 04/23/2024

Acknowledgements

Jon-Michael Brook
Jon-Michael Brook

Jon-Michael Brook

Jon-Michael C. Brook is a certified, 25-year practitioner of cybersecurity, cloud, and privacy. He is the principal contributor to certification sites for privacy and cloud security, and has published books on privacy. Jon-Michael received numerous awards and recognition during his time with Raytheon, Northrop Grumman, Symantec, and Starbucks. He holds patents and trade secrets in intrusion detection, GUI design, and semantic data redaction...

Read more

Alexander Getsin
Alexander Getsin

Alexander Getsin

Alexander Stone Getsin is a financial technologies security leader with particular expertise and interest in cloud security, secure application design, and security governance. Alex is the lead author of industry security best practices, particularly with the Cloud Security Alliance, Top Threats research group, and the (ISC)2 Israeli Chapter, which he helps champion as a co-chairman. Alex leverages a decade of experience in finance, militar...

Read more

Shira Shamban Headshot Missing
Shira Shamban

Shira Shamban

This person does not have a biography listed with CSA.

Tony Daskalo Headshot Missing
Tony Daskalo

Tony Daskalo

This person does not have a biography listed with CSA.

Rivka Hoffnung Headshot Missing
Rivka Hoffnung

Rivka Hoffnung

This person does not have a biography listed with CSA.

Oren Motola
Oren Motola

Oren Motola

This person does not have a biography listed with CSA.

Oren Yeger
Oren Yeger
Owner & CSO, Cybricks.io

Oren Yeger

Owner & CSO, Cybricks.io

Founder | CSO | (ISC)² Israel Chapter Cloud Security Chair | Speaker | AWS Community Builder | DPO | CISSP | CCSK

Expert in Securing Financial industries in their journey to the cloud along side developing the C2M2 levels journey & CSPM plans

I have build a Cloud Security program in 4 companies 2 of them are Fortune 50 companies

I Drove the deployment and configuration of DSM encryption appliances to 4 geo locations in E...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training