ChaptersCircleEventsBlog

Download Publication

Top Threats to Cloud Computing 2025
Top Threats to Cloud Computing 2025
Who it's for:
  • Cloud & IT security professionals
  • Compliance & risk professionals
  • Executive management

Top Threats to Cloud Computing 2025

Release Date: 04/28/2025

This report uses the threats identified in CSA’s Top Threats to Cloud Computing 2024 to reflect on eight recent cybersecurity breaches. Notable incidents covered include the Snowflake data breach (2024), CrowdStrike outage (2024), and Microsoft breach (2024).

The report presents each security incident as both a detailed narrative and a threat model. This includes an attack-style synopsis with the relevant cloud security risks, CCM controls, and mitigations. It also discusses the technical and business impacts of each case, as well as key metrics and takeaways.

Security practitioners should use the insights from these case studies to start their own internal analyses and discussions. They should draw on the recommendations to improve their organization's security and yield faster responses to critical threats.

Key Takeaways:
  • Cloud security must account for human error and persistent threats by implementing continuous auditing and security automation
  • Strong Identity and Access Management (IAM) practices, including MFA and least privilege access control, must be rigorously enforced
  • Cloud providers and users must work together to secure their environments by implementing configuration management and security monitoring
  • Anomaly detection and centralized logging are necessary to identify misconfigurations, unauthorized access, and malicious activities quickly
  • Continuous monitoring of supply chain security is necessary, since threat actors tend to target supply chain risks
  • Proactive cloud governance, such as maintaining secure configuration baselines, reduces long-term risk
  • Traditional incident response plans fail to account for cloud complexity, leading to delayed detection and mitigation
  • Many breaches originate from vulnerabilities in development and testing environments, where security controls are often weaker than in production
Download this Resource

Prefer to access this resource without an account?
Download the publication. Download the presentation.

Bookmark
Share
Related resources
State of SaaS Security Report 2025
State of SaaS Security Report 2025
Zero Trust Guidance For Critical Infrastructure - Korean Translation
Zero Trust Guidance For Critical Infrastructure...
Zero Trust Privacy Assessment and Guidance - Japanese Translation
Zero Trust Privacy Assessment and Guidance - Ja...
Why We’re Launching a Trusted AI Safety Knowledge Certification Program
Why We’re Launching a Trusted AI Safety Knowledge Certification Pro...
Published: 04/26/2025
Getting Started with Kubernetes Security: A Practical Guide for New Teams
Getting Started with Kubernetes Security: A Practical Guide for New...
Published: 04/25/2025
Phishing Tests: What Your Provider Should Be Telling You
Phishing Tests: What Your Provider Should Be Telling You
Published: 04/24/2025
BEC in the Age of AI: The Growing Threat
BEC in the Age of AI: The Growing Threat
Published: 04/16/2025

Acknowledgements

Udith Wickramasuriya Headshot Missing
Udith Wickramasuriya

Udith Wickramasuriya

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

Vic Hargrave
Vic Hargrave
Senior Cyber Analyst/Engineer

Vic Hargrave

Senior Cyber Analyst/Engineer

Vic Hargrave has 20 years of experience in cybersecurity working for Everfox, Forcepoint Federal, Trend Micro, and VMware developing a broad range of security solutions including user-entity behavior analytics, threat management, and content filtering. Vic specializes in behavior analytics and insider threat risk. He has co-authored several publications with the Top Treat Working Group and is active in the CSA AI Technology and Risk Worki...

Read more

Jon-Michael Brook
Jon-Michael Brook

Jon-Michael Brook

Jon-Michael C. Brook is a certified, 25-year practitioner of cybersecurity, cloud, and privacy. He is the principal contributor to certification sites for privacy and cloud security, and has published books on privacy. Jon-Michael received numerous awards and recognition during his time with Raytheon, Northrop Grumman, Symantec, and Starbucks. He holds patents and trade secrets in intrusion detection, GUI design, and semantic data redaction...

Read more

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 125 projects, as a Lead Author or Author/Contributor and many more as a Reviewer/Editor.
Michael's extensive contributions encompass critical areas including Artificial Intelligence, Zero Trust/Software Defined Perimeter, Internet of Things, Top Threats, Cloud Control Matrix, DevSecOps, and Key Management. H...

Read more

Alexander Getsin
Alexander Getsin

Alexander Getsin

Alexander Stone Getsin is a financial technologies security leader with particular expertise and interest in cloud security, secure application design, and security governance. Alex is the lead author of industry security best practices, particularly with the Cloud Security Alliance, Top Threats research group, and the (ISC)2 Israeli Chapter, which he helps champion as a co-chairman. Alex leverages a decade of experience in finance, militar...

Read more

Randall Brooks Headshot Missing
Randall Brooks

Randall Brooks

Michael Morgenstern Headshot Missing
Michael Morgenstern

Michael Morgenstern

Mark Szalkiewicz Headshot Missing
Mark Szalkiewicz

Mark Szalkiewicz

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training