Chapter 3

The Cloud Threat Landscape

Abstract

In the third chapter, there will be a thorough assessment of the top threats to cloud computing. This will include references to Cloud Security Alliance research as well as third parties that have evaluated the threat landscape.

Keywords

APIs; Breaches; DoS; Threats
Information in this chapter
▪ The cloud threat landscape
▪ Notorious nine
▪ Additional threats
Outsourcing any workload to a third party will introduce risk, although whether the overall risk increases is entirely dependent on the provider and the security deployed within the internally provisioned service. Regardless of whether the service is provisioned internally or externally, there will always be an element of risk; this is because while the ...

Get CSA Guide to Cloud Computing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.