O'Reilly logo

CSA Guide to Cloud Computing by Brian Honan, Jim Reavis, Raj Samani

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3

The Cloud Threat Landscape

Abstract

In the third chapter, there will be a thorough assessment of the top threats to cloud computing. This will include references to Cloud Security Alliance research as well as third parties that have evaluated the threat landscape.

Keywords

APIs; Breaches; DoS; Threats
Information in this chapter
▪ The cloud threat landscape
▪ Notorious nine
▪ Additional threats
Outsourcing any workload to a third party will introduce risk, although whether the overall risk increases is entirely dependent on the provider and the security deployed within the internally provisioned service. Regardless of whether the service is provisioned internally or externally, there will always be an element of risk; this is because while the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required