ChaptersEventsBlog
How is your enterprise using AI Agents? Help us benchmark security and take the survey before November 30 →

Download Publication

Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Who it's for:
  • Cloud & IT security professionals
  • Compliance & risk professionals
  • Executive management

Top Threats to Cloud Computing 2024

Release Date: 08/05/2024

Working Group: Top Threats

The CSA Top Threats Report aims to raise awareness of current cloud security risks, threats, and vulnerabilities. In this 2024 installment, we surveyed over 500 industry experts on the cloud security issues they’re facing. Respondents identified 11 top threats. The CSA Top Threats Working Group has analyzed the results and provided a description of each cloud security threat, including the business impact, key takeaways, examples, and relevant security controls.

Top Threats Covered:
  • Misconfiguration and inadequate change control
  • Identity and Access Management
  • Insecure interfaces and APIs
  • Inadequate selection/implementation of cloud security strategy
  • Insecure third-party resources
  • Insecure software development
  • Accidental cloud disclosure
  • System vulnerabilities
  • Limited cloud visibility/observability
  • Unauthenticated resource sharing
  • Advanced Persistent Threats
Download this Resource

Bookmark
Share
Related resources
Cloud Threat Modeling 2025
Cloud Threat Modeling 2025
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation
Zero Trust Guidance for Small and Medium Size B...
Zero Trust Automation & Orchestration and Visibility & Analytics Overview
Zero Trust Automation & Orchestration and Visib...
Implementing CCM: Threat & Vulnerability Management Controls
Implementing CCM: Threat & Vulnerability Management Controls
Published: 11/21/2025
Red Teaming Voice AI: Securing the Next Generation of Conversational Systems
Red Teaming Voice AI: Securing the Next Generation of Conversationa...
Published: 11/20/2025
It’s Time to Make Cloud Threat Modeling Continuous
It’s Time to Make Cloud Threat Modeling Continuous
Published: 11/20/2025
Reflecting on the 2024 Microsoft Breach
Reflecting on the 2024 Microsoft Breach
Published: 09/15/2025

Interested in helping develop research with CSA?

Related Certificates & Training