burger menu
Top Threats to Cloud Computing

Top Threats to Cloud Computing

    Add to bookmarks

The Egregious 11

SUMMARY

This survey’s respondents rated 11 threats and risks in their cloud environments.

The study points out the threats ranked in order of importance per survey results: Data Breaches; Misconfiguration and Inadequate Change Control; Lack of Cloud Security Architecture and Strategy; Insufficient Identity, Credential, Access and Key Management; Account Hijacking; Insider Threat; Insecure Interfaces and APIs; Weak Control Plane; Metastructure and Applistructure Failures; Limited Cloud Usage Visibility; Abuse and Nefarious Use of Cloud Services.

The research highlights a decrease in the ranking of traditional cloud security issues which are the responsibility of cloud service providers. These findings show that traditional security issues are not such a concern compared to security issues that are the consequence of senior management decisions. 

Highly rated security issues in the study are specific to the cloud which shows a technology scenario where consumers are planning cloud migration. These issues are related to potential control plane weaknesses, metastructure and applistructure failures and limited cloud visibility, the paper says. 

This report aims at raising awareness of the main security issues and how to tackle them. Management needs to take them into account when planning budgets regarding cloud migration and security. The study offers recommendations, useful examples, and anecdotes. It includes as well exposition technology trends and overviews handy for executive management.

Report download requires free registration on the publisher's website.

OUTLINE

Executive Summary

Data breaches and misconfiguration

Lack of cloud security architecture

Insufficient identity and credential

Account hijacking

Interfaces and APIs

Metastructure failures

Limited cloud usage

Conclusion and methodology

DETAILS

Overview

Researchfinder Rating
5 out of 5 stars
Title
Top Threats to Cloud Computing
Sub-Title
The Egregious 11
Region
Global
Published
Aug. 6, 2019
Publisher
CSA
Price
FREE
Language
ENGLISH

Content

Number of Pages
41
Number of Tables
0
Number of Exhibits
24
Topics
cloud, security
Tags
cloud computing, cloud security, cloud service providers, CSA, cyber attack, cyber security, data breaches, data protection, global, identity, phising, security
Companies mentioned
Amazon, Uber, Voipo, Deloitte, IBM, Tesla, Facebook, Microsoft, Netflix, Google
Methodology
This report is based on questionnaires, and surveys.
EVALUATION

What makes this report an excellent read is great findings, plenty of examples and clear key takeaways on each chapter.

Positives:

  • Great findings
  • Business impact of each security issue
  • Great key takeaways
  • Anecdotes and examples
  • Links and references per chapter

Similiar Reports

Internet Trends 2019

FREE

2019 Global eCommerce Fraud Management Report

FREE

Internet of Things

FREE