ChaptersCircleEventsBlog
Improve the quality of your STAR Level 1 self-assessment by submitting to Valid-AI-ted →

Download Publication

Top Threats to Cloud Computing - Pandemic Eleven - Japanese Translation
Top Threats to Cloud Computing - Pandemic Eleven - Japanese Translation

Top Threats to Cloud Computing - Pandemic Eleven - Japanese Translation

Release Date: 11/16/2022

Working Group: Top Threats

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact research@cloudsecurityalliance.org.

The Top Threats reports have traditionally aimed to raise awareness of threats, risks, and vulnerabilities in the cloud. Such issues are often the result of the shared, on-demand nature of cloud computing. In this sixth installment, we surveyed 703 industry experts on security issues in the cloud industry. This year our respondents identified eleven salient threats, risks, and vulnerabilities in their cloud environments. The Top Threats Working Group used the survey results and its expertise to create the 2022 Top Cloud Threats report - the ‘Pandemic Eleven’. 

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing: Pandemic 11 Deep Dive
Top Threats to Cloud Computing: Pandemic 11 Dee...
Cloud and Compromise (C&C): Gamifying of Cloud Security
Cloud and Compromise (C&C): Gamifying of Cloud ...
The 2024 Football Australia Data Breach: A Case of Misconfiguration and Inadequate Change Control
The 2024 Football Australia Data Breach: A Case of Misconfiguration...
Published: 06/09/2025
Taking the Pressure Off Employees When Protecting the Organization from Phishing Campaigns
Taking the Pressure Off Employees When Protecting the Organization ...
Published: 05/23/2025
The Rising Threat of Consent Phishing: How OAuth Abuse Bypasses MFA
The Rising Threat of Consent Phishing: How OAuth Abuse Bypasses MFA
Published: 05/20/2025
Unpacking the 2024 Snowflake Data Breach
Unpacking the 2024 Snowflake Data Breach
Published: 05/07/2025
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training