Research Topic
Top Threats
Top Threats to Cloud Computing - Deep Dive 2025

Discuss this topic in Circle
View discussion community
Participate
Press Mention | Source | Date |
---|---|---|
‘One of the key issues is a lack of experience’: Security teams struggle amid shift to cloud | SC Magazine | May 26, 2022 |
Ransomware, bad and bogus. Updates on the cyber phases of Russia's hybrid war. | The CyberWire | June 07, 2022 |
RSA Conference 2022 - Announcements Summary (Day 2) | Security Week | June 08, 2022 |
Cloud Security Alliance's Top Threats to Cloud Computing: Pandemic 11 Report Finds Traditional Cloud Security Issues Becoming Less Concerning | VMBlog | June 07, 2022 |
Cloud computing: Here's the security threat you should be most worried about | ZDNet | June 09, 2022 |
Research for Cloud Security Threats
CSA Research crowd-sources the knowledge and expertise of security experts and helps address the challenges and needs they’ve experienced, or seen others experience, within the cybersecurity field. Each publication is vendor-neutral and follows the peer review process outlined in the CSA Research Lifecycle. We recommend getting started by reading the following documents.
Top Threats to Cloud Computing - Deep Dive 2025
This report reviews eight recent cloud security breaches—including the 2024 Snowflake data breach, CrowdStrike outage, and Microsoft breach—through the lens of CSA’s Top Threats to Cloud Computing 2024. Each incident is presented as both a detailed narrative and a threat model, outlining attack vectors, associated risks, mapped CCM controls, and recommended mitigations. The report highlights both technical and business impacts, offering key metrics and lessons learned. Practitioners can use these insights to launch internal discussions, strengthen identity and access management, improve monitoring, and enhance incident response.
Top Threats to Cloud Computing 2024
The CSA Top Threats Report 2024 raises awareness of the most pressing cloud security risks and vulnerabilities identified by over 500 industry experts. The report highlights 11 key threats, including misconfiguration, IAM challenges, insecure APIs, third-party risks, and advanced persistent threats. Each threat is analyzed with examples, business impact, security controls, and key takeaways to help organizations strengthen defenses and address evolving risks in today’s complex cloud environments.
Top Threats to Cloud Computing: Pandemic 11 Deep Dive
This publication analyzes eight major cloud breach cases, including Okta, Dropbox, Uber, LastPass, and more, presented as detailed narratives and threat models. Each case outlines attack vectors, vulnerabilities, technical and business impacts, and mapped CCM controls. Insights are also tied to CSA’s Top Threats to Cloud Computing 2022, highlighting identity risks, supply chain challenges, and evolving threat actors. Practitioners and leaders can use these case studies to drive internal analysis, strengthen defenses, and improve response to modern cloud security risks.