Download Publication

Understanding Cloud Attack Vectors
Release Date: 06/06/2023
This publication was produced through the efforts of chapters and volunteers but the content development falls outside of the CSA Research Lifecycle. For any questions and feedback, contact research@cloudsecurityalliance.org.
The goal of the document is to map the various attack vectors that are actually being used during cloud-based attacks in IaaS/PaaS and to map the vectors and their mitigating controls to various resources. The motivation for this document came after we analyzed much research around cloud security and realized that they are listing a combination of risks, threats, attack vectors, vulnerabilities, and concerns. And while there are many risks and threats to IaaS/PaaS platforms and applications, most of the risks are associated with a very specific number of attack vectors.
The goal of the document is to map the various attack vectors that are actually being used during cloud-based attacks in IaaS/PaaS and to map the vectors and their mitigating controls to various resources. The motivation for this document came after we analyzed much research around cloud security and realized that they are listing a combination of risks, threats, attack vectors, vulnerabilities, and concerns. And while there are many risks and threats to IaaS/PaaS platforms and applications, most of the risks are associated with a very specific number of attack vectors.
Download this Resource
Prefer to access this resource without
an account?
Download the publication. Download the presentation.
Related Resources
Acknowledgements
Moshe Ferber
CCSK, CCSP, CCAK official instructor, Chairman at Cloud Security Alliance, Israel
Moshe Ferber
CCSK, CCSP, CCAK official instructor, Chairman at Cloud Security Alliance, Israel
Moshe Ferber is a recognized industry expert and popular public speaker, with over 20 years’ experience at various positions ranging from the largest enterprises to innovative startups. Currently Ferber focuses on cloud security as certified instructor for CCSK, CCSP and CCAK certification and participate in various initiative promoting responsible cloud adoption.

Michael Roza
Risk, Audit, Control and Compliance Professional at EVC
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC
Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 125 projects, as a Lead Author or Author/Contributor and many more as a Reviewer/Editor.
Michael's extensive contributions encompass critical areas including Artificial Intelligence, Zero Trust/Software Defined Perimeter, Internet of Things, Top Threats, Cloud Control Matrix, DevSecOps, and Key Management. H...

Eitan Satmary
Eitan Satmary

Daniel Begimher
Sr. Security Engineer, AWS
Daniel Begimher
Sr. Security Engineer, AWS

Gidi Farkash
VP Operations, Security & IT, Pipl
Gidi Farkash
VP Operations, Security & IT, Pipl
Gidi Farkash is a seasoned cybersecurity professional with over 25 years of experience in managerial and hands-on roles across various Information and Cyber Security domains. Currently serving as the Head of Security at Pipl, Gidi also holds the esteemed position of President of the (ISC)² Israel Chapter, where he actively contributes to developing and promoting cybersecurity best practices.Throughout his career, Gidi has demonstrated exp...
Are you a research volunteer? Request to have your profile displayed on the website here.
Related Certificates & Training

Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more
Learn more