Top 10 Risks For Cloud

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

TOP 10 RISKS FOR CLOUD

Ala’ Zayadeen
1 . DATA BREACH
1.
is an incident where information
is stolen or taken from a system
without the knowledge or
authorization of the system’s
owner.

Source : CSA-Cloud Security Alliance


1
2. MISCONFIGURATION
An incorrect or subobtimal
configuration of an information
system or system component
that may lead to vulnerabilities

Source : CSA-Cloud Security Alliance


2
3. INSECURE APIs
A misconfiguration, poor coding
practices, a lack of authentication,
and inappropriate authorization.
These oversights can leave the
interfaces vulnerable to malicious
activities.

Source : CSA-Cloud Security Alliance


3
Source : CSA-Cloud Security Alliance

4. INSUFFICIENT ACCESS
& KEY MANAGEMENT
Cloud Key Management Service
allows you to create, import, and
manage cryptographic keys and
perform cryptographic operations

Access Management (IAM) lets


administrators authorize who can
take action on specific resources,
giving you full control and visibility
to manage Cloud.

Source : CSA-Cloud Security Alliance


4
5. LACK OF CLOUD
SECURITY STRATEGY
A cloud security strategy is the
combination of the measures,
tools, policies, and procedures
used to secure cloud data,
applications, and infrastructure.

Source : CSA-Cloud Security Alliance


5
6. INSECURE SOFTWAFE
DEVELOPMENT
Secure software development is a
methodology (often associated
with DevSecOps) for creating
software that incorporates security
into every phase of the software
development life cycle (SDLC).

Source : CSA-Cloud Security Alliance


6
7. INSECURE THIRD-PARTY
RESOURCES
Risks stemming from third-party
resources are also considered
supply chain vulnerabilities since
they are a part of the process of
delivering your products or
services.

Source : CSA-Cloud Security Alliance


7
Source
Source: :CSA-Cloud Security Alliance
Source : CSA-Cloud SecurityAlliance
CSA-Cloud Security Alliance

8. SYSTEM VULNERABILITIES
System vulnerabilities are flaws in
cloud service platforms. They may
be exploited in an attempt to
compromise confidentiality,
integrity, and availability of data,

Source : CSA-Cloud Security Alliance


8
9. HACKERS & APTs
Advanced persistent threats (APTs)
is a broad term used to describe an
attack campaign in which an
intruder, or team of intruders,
establishes an illicit, long-term
presence on a network to mine
highly sensitive data

Source : CSA-Cloud Security Alliance


9
10. CLOUD STORAGE DATA
EXFILTRATION
Cloud storage data exfiltration is
an incident involving sensitive,
protected, or confidential
information. These data may be
released, viewed, stolen, or used by
an individual outside of the
organization’s operating
environment.

Source : CSA-Cloud Security Alliance 10

You might also like