Download Publication

Understanding Cloud Attack Vectors
Release Date: 06/06/2023
The goal of the document is to map the various attack vectors that are actually being used during cloud-based attacks in IaaS/PaaS and to map the vectors and their mitigating controls to various resources. The motivation for this document came after we analyzed much research around cloud security and realized that they are listing a combination of risks, threats, attack vectors, vulnerabilities, and concerns. And while there are many risks and threats to IaaS/PaaS platforms and applications, most of the risks are associated with a very specific number of attack vectors.
Download this Resource
Prefer to access this resource without
an account?
Download the publication. Download the presentation.
Related Resources
Acknowledgements
Moshe Ferber
CCSK, CCSP, CCAK official instructor, Chairman at Cloud Security Alliance, Israel

Michael Roza
Risk, Audit, Control and Compliance Professional at EVC
Michael Roza is a seasoned risk, audit, control and compliance, and cybersecurity professional with over 20 years of experience across multinational enterprises and startups. As a Cloud Security Alliance (CSA) Research member for over 10 years, he has led and contributed to more than 140 CSA projects spanning Zero Trust, AI, IoT, Top Threats, DecSecOps, Cloud Key Management, Cloud Control Matrix, and many others.
He has co-chaired...

Eitan Satmary

Daniel Begimher
Sr. Security Engineer, AWS

Gidi Farkash
VP Operations, Security & IT, Pipl
Related Certificates & Training

Learn more