The document discusses cloud security challenges and the Cloud Security Alliance's (CSA) efforts to address them. Specifically, it summarizes the CSA's "The Treacherous 12 - Cloud Computing Top Threats in 2016" report, which identifies the 12 most critical cloud security issues based on an industry expert survey. The top threats are: 1) data breaches, 2) weak identity and access management, 3) insecure APIs, and 4) system and application vulnerabilities. The report is intended to help organizations make informed risk management decisions regarding cloud adoption and security.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
24 views6 pages
Study Notes
The document discusses cloud security challenges and the Cloud Security Alliance's (CSA) efforts to address them. Specifically, it summarizes the CSA's "The Treacherous 12 - Cloud Computing Top Threats in 2016" report, which identifies the 12 most critical cloud security issues based on an industry expert survey. The top threats are: 1) data breaches, 2) weak identity and access management, 3) insecure APIs, and 4) system and application vulnerabilities. The report is intended to help organizations make informed risk management decisions regarding cloud adoption and security.