The document discusses cloud security challenges and the Cloud Security Alliance's (CSA) efforts to address them. Specifically, it summarizes the CSA's "The Treacherous 12 - Cloud Computing Top Threats in 2016" report, which identifies the 12 most critical cloud security issues based on an industry expert survey. The top threats are: 1) data breaches, 2) weak identity and access management, 3) insecure APIs, and 4) system and application vulnerabilities. The report is intended to help organizations make informed risk management decisions regarding cloud adoption and security.
Download as TXT, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
12 views
Study Notes
The document discusses cloud security challenges and the Cloud Security Alliance's (CSA) efforts to address them. Specifically, it summarizes the CSA's "The Treacherous 12 - Cloud Computing Top Threats in 2016" report, which identifies the 12 most critical cloud security issues based on an industry expert survey. The top threats are: 1) data breaches, 2) weak identity and access management, 3) insecure APIs, and 4) system and application vulnerabilities. The report is intended to help organizations make informed risk management decisions regarding cloud adoption and security.