ChaptersEventsBlog
How is your enterprise using AI Agents? Help us benchmark security and take the survey before November 30 →

Download Publication

Top Threats to Cloud Computing: Egregious Eleven Deep Dive
Top Threats to Cloud Computing: Egregious Eleven Deep Dive

Top Threats to Cloud Computing: Egregious Eleven Deep Dive

Release Date: 09/23/2020

Working Group: Top Threats

This report provides case‌ ‌study‌ ‌analyses‌ ‌for‌ last year’s ‌The‌ ‌Egregious‌ ‌11:‌ ‌Top‌ ‌Threats‌ ‌to‌ ‌Cloud‌ ‌Computing and a relative security industry breach analysis. Using nine actual attacks and breaches, including a major financial services company, a leading enterprise video communications firm, and a multinational grocery chain for its foundation, the paper connects the dots between the CSA Top Threats in terms of security analysis.

Each of the nine examples are presented in the form of (1) a reference chart and (2) a detailed narrative. The reference chart’s format provides an attack-style synopsis of the actor spanning from threats and vulnerabilities to end controls and mitigations.

 
Key Takeaways:

  • The attack details for each case study

  • The technical and business impacts of each attack

  • The preventative, detective and corrective mitigation measures organizations should take

  • Where and how CSA Top Threats fit in a greater security analysis

  • How lessons and mitigation concepts can be applied in real-world scenarios


Who it’s for:

These anecdotes will let cybersecurity managers, cloud architects, and cloud engineers better communicate with executives and peers in addition to providing context for discussions with technical staff and offers in-depth detail for implementing mitigations and countermeasures from a security analysis standpoint.

Download this Resource

Bookmark
Share
View translations
Related resources
Cloud Threat Modeling 2025
Cloud Threat Modeling 2025
Capabilities-Based Risk Assessment (CBRA) for AI Systems
Capabilities-Based Risk Assessment (CBRA) for A...
AI Controls Matrix
AI Controls Matrix
The Internet is a Single Point of Failure
The Internet is a Single Point of Failure
Published: 11/21/2025
Implementing CCM: Threat & Vulnerability Management Controls
Implementing CCM: Threat & Vulnerability Management Controls
Published: 11/21/2025
Red Teaming Voice AI: Securing the Next Generation of Conversational Systems
Red Teaming Voice AI: Securing the Next Generation of Conversationa...
Published: 11/20/2025
It’s Time to Make Cloud Threat Modeling Continuous
It’s Time to Make Cloud Threat Modeling Continuous
Published: 11/20/2025

Interested in helping develop research with CSA?

Related Certificates & Training