ChaptersCircleEventsBlog
Join us for the in-person CCSK Azure course at Black Hat from August 4–5! Register now for a hands-on deep dive and secure your spot now!

Download Publication

Top Threats to Cloud Computing: Egregious Eleven Deep Dive
Top Threats to Cloud Computing: Egregious Eleven Deep Dive

Top Threats to Cloud Computing: Egregious Eleven Deep Dive

Release Date: 09/23/2020

Working Group: Top Threats

This report provides case‌ ‌study‌ ‌analyses‌ ‌for‌ last year’s ‌The‌ ‌Egregious‌ ‌11:‌ ‌Top‌ ‌Threats‌ ‌to‌ ‌Cloud‌ ‌Computing and a relative security industry breach analysis. Using nine actual attacks and breaches, including a major financial services company, a leading enterprise video communications firm, and a multinational grocery chain for its foundation, the paper connects the dots between the CSA Top Threats in terms of security analysis.

Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor spanning from threats and vulnerabilities to end controls and mitigations.

 
Key Takeaways:

  • The attack details for each case study

  • The technical and business impacts of each attack

  • The preventative, detective and corrective mitigation measures organizations should take

  • Where and how CSA Top Threats fit in a greater security analysis

  • How lessons and mitigation concepts can be applied in real-world scenarios


Who it’s for:

These anecdotes will let cybersecurity managers, cloud architects, and cloud engineers better communicate with executives and peers in addition to providing context for discussions with technical staff and offers in-depth detail for implementing mitigations and countermeasures from a security analysis standpoint.

Download this Resource

Bookmark
Share
View translations
Related resources
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Cloud Controls Matrix and CAIQ v4
Cloud Controls Matrix and CAIQ v4
Top Threats to Cloud Computing: Pandemic 11 Deep Dive
Top Threats to Cloud Computing: Pandemic 11 Dee...
Navigating the Cybersecurity Imperative in India’s Manufacturing Ascent
Navigating the Cybersecurity Imperative in India’s Manufacturing As...
Published: 06/27/2025
A Copilot Studio Story: Discovery Phase in AI Agents
A Copilot Studio Story: Discovery Phase in AI Agents
Published: 06/26/2025
ESXi Ransomware: The Growing Threat to Virtualized Environments
ESXi Ransomware: The Growing Threat to Virtualized Environments
Published: 06/25/2025
A Primer on Model Context Protocol (MCP) Secure Implementation
A Primer on Model Context Protocol (MCP) Secure Implementation
Published: 06/23/2025

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Michael Roza is a seasoned risk, audit, control and compliance, and cybersecurity professional with over 20 years of experience across multinational enterprises and startups. As a Cloud Security Alliance (CSA) Research member for over 10 years, he has led and contributed to more than 140 CSA projects spanning Zero Trust, AI, IoT, Top Threats, DecSecOps, Cloud Key Management, Cloud Control Matrix, and many others.

He has co-chaired...

Read more

Jon-Michael Brook
Jon-Michael Brook

Jon-Michael Brook

Jon-Michael C. Brook is a certified, 25-year practitioner of cybersecurity, cloud, and privacy. He is the principal contributor to certification sites for privacy and cloud security, and has published books on privacy. Jon-Michael received numerous awards and recognition during his time with Raytheon, Northrop Grumman, Symantec, and Starbucks. He holds patents and trade secrets in intrusion detection, GUI design, and semantic data redaction...

Read more

Nabeel Yousif Headshot Missing
Nabeel Yousif

Nabeel Yousif

Ebudo Osime Headshot Missing
Ebudo Osime

Ebudo Osime

Suhas Bhat Headshot Missing
Suhas Bhat

Suhas Bhat

Prabu Natarajan Headshot Missing
Prabu Natarajan

Prabu Natarajan

Brian Kinsley Headshot Missing
Brian Kinsley

Brian Kinsley

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Frank Guanco
Frank Guanco
Operations Director, CSA

Frank Guanco

Operations Director, CSA

Vic Hargrave
Vic Hargrave
Senior Cyber Analyst/Engineer

Vic Hargrave

Senior Cyber Analyst/Engineer

Vic Hargrave has 20 years of experience in cybersecurity working for Everfox, Forcepoint Federal, Trend Micro, and VMware developing a broad range of security solutions including user-entity behavior analytics, threat management, and content filtering. Vic specializes in behavior analytics and insider threat risk. He has co-authored several publications with the Top Treat Working Group and is active in the CSA AI Technology and Risk Working...

Read more

Tal Eliyahu Headshot Missing
Tal Eliyahu

Tal Eliyahu

Begum Calguner Headshot Missing
Begum Calguner

Begum Calguner

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training