CLOUD SECURITY ALLIANCE The Treacherous 12 - Top Threats to Cloud Computing + Industry Insights The permanent and official location for Cloud Security Alliance Top Threats research is https://cloudsecurityalliance.org/group/top-threats/ © 2017 Cloud Security Alliance – All Rights Reserved All rights reserved. You may download, store, display on your computer, view, print, and link to The Treacherous 12 - Cloud Computing Top Threats in 2016 at https://cloudsecurityalliance.org/download/the-treacherous-twelvecloud-computing-top-threats-in-2016/, subject to the following: (a) the Report may be used solely for your personal, informational, non-commercial use; (b) the Report may not be modified or altered in any way; (c) the Report may not be redistributed; and (d) the trademark, copyright or other notices may not be removed. You may quote portions of the Report as permitted by the Fair Use provisions of the United States Copyright Act, provided that you attribute the portions to The Treacherous 12 - Cloud Computing Top Threats in 2016. © 2017, Cloud Security Alliance. All right reserved. 1 CLOUD SECURITY ALLIANCE The Treacherous 12 - Top Threats to Cloud Computing + Industry Insights Contents Acknowledgments................................................................................................................................................. 5 Executive Summary............................................................................................................................................... 6 Methodology............................................................................................................................................................. 8 1. Data Breaches............................................................................................................................................. 9 2. Insufficient Identity, Credential and Access Management..................................................... 12 3. Insecure Interfaces and APIs.............................................................................................................. 15 4. System Vulnerabilities.......................................................................................................................... 17 5. Account Hijacking.................................................................................................................................. 19 6. Malicious Insiders................................................................................................................................... 21 7. Advanced Persistent Threats............................................................................................................... 23 8. Data Loss.................................................................................................................................................... 25 9. Insufficient Due Diligence................................................................................................................... 27 10. Abuse and Nefarious Use of Cloud Services.................................................................................. 30 11. Denial of Service..................................................................................................................................... 32 12. Shared Technology Vulnerabilities................................................................................................... 34 © 2017, Cloud Security Alliance. All right reserved. 2 CLOUD SECURITY ALLIANCE The Treacherous 12 - Top Threats to Cloud Computing + Industry Insights 2017 Edition: Industry Insights Acknowledgments.............................................................................................................................................. 37 Executive Summary............................................................................................................................................ 38 . Box mismanagement of invite links Data Breaches.......................................................................................................................................... 39 Yahoo breach Data Breaches.......................................................................................................................................... 40 LinkedIn failure to salt passwords when hashing Insufficient Identity Credential Access Managem

pdf文档 2018-《12大顶级云安全威胁:行业见解报告》

安全研究库 > 国外研究报告 > 国外研究报告 > 文档预览
60 页 0 下载 35 浏览 0 评论 0 收藏 3.0分
温馨提示:如果当前文档出现乱码或未能正常浏览,请先下载原文档进行浏览。
2018-《12大顶级云安全威胁:行业见解报告》 第 1 页 2018-《12大顶级云安全威胁:行业见解报告》 第 2 页 2018-《12大顶级云安全威胁:行业见解报告》 第 3 页 2018-《12大顶级云安全威胁:行业见解报告》 第 4 页 2018-《12大顶级云安全威胁:行业见解报告》 第 5 页
下载文档到电脑,方便使用
还有 55 页可预览,继续阅读
本文档由 张玉竹2022-04-08 10:20:14上传分享
给文档打分
您好可以输入 255 个字符
安信天行文库的中文名是什么?( 答案:安信天行 )
评论列表
  • 暂时还没有评论,期待您的金玉良言