Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

Download Publication

Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Who it's for:
  • Cloud & IT security professionals
  • Compliance & risk professionals
  • Executive management

Top Threats to Cloud Computing 2024

Release Date: 08/05/2024

Working Group: Top Threats

The CSA Top Threats Report aims to raise awareness of current cloud security risks, threats, and vulnerabilities. In this 2024 installment, we surveyed over 500 industry experts on the cloud security issues they’re facing. Respondents identified 11 top threats. The CSA Top Threats Working Group has analyzed the results and provided a description of each cloud security threat, including the business impact, key takeaways, examples, and relevant security controls.

Top Threats Covered:
  • Misconfiguration and inadequate change control
  • Identity and Access Management
  • Insecure interfaces and APIs
  • Inadequate selection/implementation of cloud security strategy
  • Insecure third-party resources
  • Insecure software development
  • Accidental cloud disclosure
  • System vulnerabilities
  • Limited cloud visibility/observability
  • Unauthenticated resource sharing
  • Advanced Persistent Threats
Download this Resource

Bookmark
Share
Related resources
Map the Transaction Flows for Zero Trust
Map the Transaction Flows for Zero Trust
Top Concerns With Vulnerability Data
Top Concerns With Vulnerability Data
Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives
Using Asymmetric Cryptography to Help Achieve Z...
CSA Community Spotlight: Nerding Out About Security with CISO Alexander Getsin
CSA Community Spotlight: Nerding Out About Security with CISO Alexa...
Published: 11/21/2024
The Lost Art of Visibility, in the World of Clouds
The Lost Art of Visibility, in the World of Clouds
Published: 11/20/2024
Top Threat #5 - Third Party Tango: Dancing Around Insecure Resources
Top Threat #5 - Third Party Tango: Dancing Around Insecure Resources
Published: 11/18/2024
Group-Based Permissions and IGA Shortcomings in the Cloud
Group-Based Permissions and IGA Shortcomings in the Cloud
Published: 11/18/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training