CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Top Threats to Cloud Computing - Deep Dive 2025 Release Date: 04/28/2025 This report uses the threats identified in CSA’s Top Threats to Cloud Computing 2024 to reflect on eight recent cybersecurity breaches. Notable incidents ... Request to download |
![]() | Top Threats to Cloud Computing 2024 Release Date: 08/05/2024 The CSA Top Threats Report aims to raise awareness of current cloud security risks, threats, and vulnerabilities. In this 2024 installment, we surveyed ov... Request to download |
![]() | Top Threats Working Group Charter 2024 Release Date: 02/01/2024 The Top Threats Working Group aims to provide up-to-date, industry-informed expert insights on cloud security risks, threats, and vulnerabilities to help ... Request to download |
![]() | Top Threats to Cloud Computing: Pandemic 11 Deep Dive Release Date: 10/17/2023 This publication reflects on eight recent cloud breach cases, presented as both a detailed narrative and a threat model. The threat model format provides ... Request to download |
![]() | Top Threats to Cloud Computing Post Pandemic Eleven Survey Report Release Date: 08/05/2023 The CSA Top Threats Report aims to raise awareness of current cloud security risks, threats, and vulnerabilities. In this 2024 installment, we surveyed ov... Request to download |
![]() | Cloud and Compromise (C&C): Gamifying of Cloud Security Release Date: 07/10/2023 CSA’s Top Threats Working Group works to identify the most significant cloud security threats, vulnerabilities, and weaknesses; analyze major incidents; a... Request to download |
![]() | Top Threats Working Group Charter 2023 Release Date: 02/01/2023 The Top Threats Working Group aims to provide up-to-date, industry-informed expert insights on cloud security risks, threats, and vulnerabilities to help ... Request to download |
![]() | Cloud and Web Security Challenges in 2022 Release Date: 08/16/2022 Organizations’ work environments have undergone rapid but lasting changes in the face of the recent health crisis. Remote work became a necessity and many... Request to download |
![]() | Top Threats Working Group Charter 2022 Release Date: 08/11/2022 The Top Threats Working Group aims to provide up-to-date, industry-informed expert insights on cloud security risks, threats, and vulnerabilities to help ... Request to download |
![]() | Top Threats to Cloud Computing Pandemic Eleven Release Date: 06/06/2022 The Top Threats reports have traditionally aimed to raise awareness of threats, risks, and vulnerabilities in the cloud. Such issues are often the result ... Request to download |
![]() | Top Threats to Cloud Computing: Egregious Eleven Deep Dive - Arabic Translation Release Date: 05/27/2022 This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translate... Request to download |
![]() | Release Date: 07/29/2021 The purpose of this document is to enable, encourage cloud and security practitioners to apply threat modeling for cloud applications, services, and security... Request to download |
![]() | Top Threats to Cloud Computing: Egregious Eleven Deep Dive Release Date: 09/23/2020 The purpose of the report is to provide organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated ... Request to download |
![]() | Top Threats to Cloud Computing: Egregious Eleven Release Date: 08/06/2019 The report provides organizations with an up-to-date, expert-informed understanding of cloud security concerns in order to make educated risk-management deci... Request to download |
![]() | Cloud Penetration Testing Playbook Release Date: 07/12/2019 As cloud services continue to enable new technologies and see massive adoption there is a need to extend the scope of penetration testing into public cloud s... Request to download |
![]() | Cloud Penetration Testing Guidance Release Date: 06/07/2019 This document aims to be a guide for conducting penetration testing on cloud services. The document outlines important aspects such as the scoping of cloud p... Request to download |
![]() | Top Threats to Cloud Computing: Deep Dive Release Date: 08/08/2018 This case study attempts to connect all the dots when it comes to security analysis by using nine anecdotes cited in the Top Threats for its foundation. Each... Request to download |
![]() | Top Threats to Cloud Computing Plus: Industry Insights Release Date: 10/20/2017 Abstract: The Top Threats to Cloud Computing Plus: Industry Insights serves as a validation of the relevance of security issues discussed in the earlier docu... Request to download |
![]() | ‘The Treacherous Twelve’ Cloud Computing Top Threats in 2016 Release Date: 02/29/2016 “The Treacherous 12 - Cloud Computing Top Threats in 2016” plays a crucial role in the CSA research ecosystem. The purpose of the report is to provide organi... Request to download |
![]() | The Notorious Nine: Cloud Computing Top Threats in 2013 Release Date: 02/24/2013 Providing organizations with up-to-date, expert-informed understanding of cloud security threats in order to make educated risk-management decisions regardin... Request to download |