Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

Download Publication

Understanding Cloud Attack Vectors
Understanding Cloud Attack Vectors

Understanding Cloud Attack Vectors

Release Date: 06/06/2023

This publication was produced through the efforts of chapters and volunteers but the content development falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

The goal of the document is to map the various attack vectors that are actually being used during cloud-based attacks in IaaS/PaaS and to map the vectors and their mitigating controls to various resources. The motivation for this document came after we analyzed much research around cloud security and realized that they are listing a combination of risks, threats, attack vectors, vulnerabilities, and concerns. And while there are many risks and threats to IaaS/PaaS platforms and applications, most of the risks are associated with a very specific number of attack vectors.
Download this Resource

Prefer to access this resource without an account?
Download the publication. Download the presentation.

Bookmark
Share
View translations
Related resources
Map the Transaction Flows for Zero Trust
Map the Transaction Flows for Zero Trust
Top Concerns With Vulnerability Data
Top Concerns With Vulnerability Data
Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives
Using Asymmetric Cryptography to Help Achieve Z...
The Lost Art of Visibility, in the World of Clouds
The Lost Art of Visibility, in the World of Clouds
Published: 11/20/2024
Group-Based Permissions and IGA Shortcomings in the Cloud
Group-Based Permissions and IGA Shortcomings in the Cloud
Published: 11/18/2024
9 Tips to Simplify and Improve Unstructured Data Security
9 Tips to Simplify and Improve Unstructured Data Security
Published: 11/18/2024
How AI Changes End-User Experience Optimization and Can Reinvent IT
How AI Changes End-User Experience Optimization and Can Reinvent IT
Published: 11/15/2024

Acknowledgements

Moshe Ferber
Moshe Ferber
Chairman at Cloud Security Alliance, Israel

Moshe Ferber

Chairman at Cloud Security Alliance, Israel

Moshe Ferber is a recognized industry expert and popular public speaker, with over 20 years’ experience at various positions ranging from the largest enterprises to innovative startups. Currently Ferber focuses on cloud security as certified instructor for CCSK & CCSP certification and participate in various initiative promoting responsible cloud adoption.

Read more

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Eitan Satmary Headshot Missing
Eitan Satmary

Eitan Satmary

Gidi Farkash
Gidi Farkash
Head of Security at Pipl; President of the ISC2 Israel Chapter

Gidi Farkash

Head of Security at Pipl; President of the ISC2 Israel Chapter

Gidi Farkash is a seasoned cybersecurity professional with over 22 years of experience in managerial and hands-on roles across various Information and Cyber Security domains. Currently serving as the Head of Security at Pipl, Gidi also holds the esteemed position of President of the (ISC)² Israel Chapter, where he actively contributes to developing and promoting cybersecurity best practices.

Throughout his career, Gidi has demonstrate...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Related Certificates & Training