Top Threats to Cloud Computing
Introduction to Top Threats to Cloud Computing
The purpose of this document, Top Threats to Cloud Computing, is to provide needed context to assist organizations in making educated risk management decisions regarding their cloud adoption strategies. In essence, this threat research document should be seen as a companion to Security Guidance for Critical Areas in Cloud Computing. As the first deliverable in the CSA’s Cloud Threat Initiative, the “Top Threats” document will be updated regularly to reflect expert consensus on the probable threats which customers should be concerned about.
Top Threats to Cloud Computing Leadership
Rafal Los, Director, Solutions Research, Accuvant
Don Gray, Solutionary
Dave Shackleford, Voodoo Security
Bryan Sullivan, Microsoft
Join the Initiative
- Join the Top Threats to Cloud Computing LinkedIn SubGroup for official initiative updates.
- Join the Top Threats email announcement list.
- Access the Top Threats to Cloud Computing Basecamp site.
- VOLUNTEER OPPORTUNITY Submit top threat suggestions via the the Top Threats Submission Form on the Submission Form tab.
Submit a New Top Threat or Change Request
Please follow the link below to submit a new threat report. Or, review the current Top Threats to Cloud Computing document and submit feedback or a change request.
Top Threats News
July 24, 2012
This survey’s purpose is to identify whether the Top Threats first identified by the CSA are still relevant today.
July 18, 2012
CSA announces the availability of several new opportunities to sponsor key research initiatives. Your support helps us maintain our aggressive research schedule and accelerate responsible adoption of cloud computing.
April 13, 2012
Join us on our Kick-Off Call as we look for volunteers to participate in updating the CSA Top Threats to Cloud Computing document.
March 01, 2010
The Cloud Security Alliance (CSA) and HP (NYSE: HPQ) today announced new research findings that detail the potential threats surrounding the use of cloud services.