The accreditors of this session require that you periodically check in to verify that you are still attentive.
Please click the button below to indicate that you are.
What are the threats to your cloud application? A survey conducted in 2021 looked at major issues that have caused business/financial/reputational impacts to users of cloud services. In the past, the Cloud Security Alliance’s “Top Threats to Cloud Computing: Egregious Eleven” provided an excellent resource for threats and issues that cloud services have to deal with. Documents such as the CSA Top Threat Working Group’s “Cloud Threat Modeling Guidance” provides an excellent basis to perform threat modeling. These new threats can be applied to this guidance with considerations of mitigating controls (such as the Cloud Controls Matrix) to determine one's attack surface and residual risk.
Learning Objectives:
Visualize a detailed description of the 2021 Cloud Security Alliance's Top Threats survey.
Apply the CSA's Top Threats Working Group's Threat Modeling Guidance with consideration of the new survey threats.
Utilize the Cloud Controls Matrix to minimize one's attack surface.