ChaptersEventsBlog
Register for DataSecAI 2025 in Dallas – Protect Data, Secure AI, and Drive Innovation

Research Topic

Top Threats

Top Threats to Cloud Computing - Deep Dive 2025
Top Threats to Cloud Computing - Deep Dive 2025

Download

Top Threats
The shift from traditional client/server to service-based models is transforming the way technology departments deliver computing technology and applications. However, cloud computing has also created new security vulnerabilities, including security issues whose full impacts are still emerging.

What is CSA doing to help address threats to cloud computing?
CSA created a bi-annual survey report to help the industry stay up to date on the latest threats, risks, and vulnerabilities in the cloud. Such issues are often the result of the shared, on-demand nature of cloud computing. In these reports we survey industry experts on security issues in the cloud industry and they rate salient threats, risks and vulnerabilities in their cloud environments. These reports allow cybersecurity managers to better communicate with executives and peers and provide context for discussions with technical staff.

How can your organization address these threats?
How have organizations dealt with these cloud threats in real life? CSA’s series of case studies help identify where and how those threats fit in a greater security analysis, while providing a clear understanding of how lessons and mitigation concepts can be applied in real-world scenarios. This group has also created a playbook for penetration testing in cloud environments and as well as guidance for how to approach threat modeling for cloud systems.


Top ThreatsCloud Incident Response

Research for Cloud Security Threats

CSA Research crowd-sources the knowledge and expertise of security experts and helps address the challenges and needs they’ve experienced, or seen others experience, within the cybersecurity field. Each publication is vendor-neutral and follows the peer review process outlined in the CSA Research Lifecycle. We recommend getting started by reading the following documents.

Top Threats to Cloud Computing - Deep Dive 2025

Top Threats to Cloud Computing - Deep Dive 2025

This report reviews eight recent cloud security breaches—including the 2024 Snowflake data breach, CrowdStrike outage, and Microsoft breach—through the lens of CSA’s Top Threats to Cloud Computing 2024. Each incident is presented as both a detailed narrative and a threat model, outlining attack vectors, associated risks, mapped CCM controls, and recommended mitigations. The report highlights both technical and business impacts, offering key metrics and lessons learned. Practitioners can use these insights to launch internal discussions, strengthen identity and access management, improve monitoring, and enhance incident response.

Top Threats to Cloud Computing 2024

Top Threats to Cloud Computing 2024

The CSA Top Threats Report 2024 raises awareness of the most pressing cloud security risks and vulnerabilities identified by over 500 industry experts. The report highlights 11 key threats, including misconfiguration, IAM challenges, insecure APIs, third-party risks, and advanced persistent threats. Each threat is analyzed with examples, business impact, security controls, and key takeaways to help organizations strengthen defenses and address evolving risks in today’s complex cloud environments.

Top Threats to Cloud Computing: Pandemic 11 Deep Dive

Top Threats to Cloud Computing: Pandemic 11 Deep Dive

This publication analyzes eight major cloud breach cases, including Okta, Dropbox, Uber, LastPass, and more, presented as detailed narratives and threat models. Each case outlines attack vectors, vulnerabilities, technical and business impacts, and mapped CCM controls. Insights are also tied to CSA’s Top Threats to Cloud Computing 2022, highlighting identity risks, supply chain challenges, and evolving threat actors. Practitioners and leaders can use these case studies to drive internal analysis, strengthen defenses, and improve response to modern cloud security risks.

Webinars

Reducing the Attack Surface in the Cloud

Reducing the Attack Surface in the Cloud

Online
October 14, 2021

Watch now

Impact of Digital Transformation on Security Strategy

Impact of Digital Transformation on Security Strategy

Online
October 28, 2021

Watch now

Cloud Imposter: Using SSO to Stage a SaaS Invasion

Cloud Imposter: Using SSO to Stage a SaaS Invasion

Online
October 19, 2021

Watch now

Standardize Identity Security: From On-Prem to Multi-Cloud

Standardize Identity Security: From On-Prem to Multi-Cloud

Online
November 16, 2021

Watch now

Blog Posts

Reflecting on the 2024 Microsoft Breach
The Hidden Security Threats Lurking in Your Machine Learning Pipeline
A Successful SIM Swap Attack: Unpacking the 2022 FTX Hack