Cloud 101CircleEventsBlog
The CCSK v5 and Security Guidance v5 are now available!

Download Publication

Understanding Cloud Attack Vectors
Understanding Cloud Attack Vectors

Understanding Cloud Attack Vectors

Release Date: 06/06/2023

The goal of the document is to map the various attack vectors that are actually being used during cloud-based attacks in IaaS/PaaS and to map the vectors and their mitigating controls to various resources. The motivation for this document came after we analyzed much research around cloud security and realized that they are listing a combination of risks, threats, attack vectors, vulnerabilities, and concerns. And while there are many risks and threats to IaaS/PaaS platforms and applications, most of the risks are associated with a very specific number of attack vectors.
Download this Resource

Prefer to access this resource without an account?
Download the publication. Download the presentation.

Bookmark
Share
View translations
Related resources
Enterprise Authority To Operate (EATO) Controls Framework
Enterprise Authority To Operate (EATO) Controls...
CCM v4.0 Implementation Guidelines
CCM v4.0 Implementation Guidelines
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
New Cloud Security Guidance from CSA
New Cloud Security Guidance from CSA
Published: 07/17/2024
Data Breach Accountability: Who’s to Blame?
Data Breach Accountability: Who’s to Blame?
Published: 07/16/2024
The Cybersecurity Tower of Babel Requires Focus on Business Fundamentals: Part 1
The Cybersecurity Tower of Babel Requires Focus on Business Fundame...
Published: 07/11/2024
How CSA Corporate Membership Enhances Your STAR Submission
How CSA Corporate Membership Enhances Your STAR Submission
Published: 07/09/2024

Acknowledgements

Moshe Ferber
Moshe Ferber
Chairman at Cloud Security Alliance, Israel

Moshe Ferber

Chairman at Cloud Security Alliance, Israel

Moshe Ferber is a recognized industry expert and popular public speaker, with over 20 years’ experience at various positions ranging from the largest enterprises to innovative startups. Currently Ferber focuses on cloud security as certified instructor for CCSK & CCSP certification and participate in various initiative promoting responsible cloud adoption.

Read more

Michael Roza
Michael Roza
Risk, Control and Compliance Professional at EVC

Michael Roza

Risk, Control and Compliance Professional at EVC

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Eitan Satmary Headshot Missing
Eitan Satmary

Eitan Satmary

Gidi Farkash
Gidi Farkash
Head of Security at Pipl; President of the ISC2 Israel Chapter

Gidi Farkash

Head of Security at Pipl; President of the ISC2 Israel Chapter

Gidi Farkash is a seasoned cybersecurity professional with over 22 years of experience in managerial and hands-on roles across various Information and Cyber Security domains. Currently serving as the Head of Security at Pipl, Gidi also holds the esteemed position of President of the (ISC)² Israel Chapter, where he actively contributes to developing and promoting cybersecurity best practices.

Throughout his career, Gidi has demonstrate...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training