4. KEY CONCERNS
Attack Vector
Lack of Visibility
Loss of Control
Physical
Inaccessibility
Cross Border
Laws
Multi Tenancy
Data Privacy
Regulatory
Compliance
5. Top Security Risks
5
Compliance Risks
Data Leakage/Loss
Insecure Cloud Software
Malicious use of Cloud services
Account hijacking
Malicious Insider
Loss of Governance
Lock-In
Isolation Failure
Management Interface
Compromise
Insecure or Incomplete Data
Deletion
Administrative or legal outages
6. 6
Cloud Security Risks
Unauthorized
use/ Analytics
Outage of Cloud
services due to
employee error
Data Mix-up
Hospital gown
vulnerability
Data Leakage
Misconfigured
cloud storage
exposed to
internet
Cloud hosted malware
73% of Companies Have
Critical Security
Misconfigurations -
Threat Stack
44 percent of malware in enterprise
cloud apps delivered ransomware
-Netskope
11. Cloud GRC Stack
11
Delivering Stack Pack Description
Continuous monitoring …
with a purpose
• Common technique and nomenclature to
request and receive evidence and affirmation
of current cloud service operating
circumstances from cloud providers
Claims, offers, and the
basis for auditing service
delivery
• Common interface and namespace to
automate the Audit, Assertion, Assessment,
and Assurance (A6) of cloud environments
Pre-audit checklists and
questionnaires to
inventory controls
• Industry-accepted ways to document what
security controls exist
The recommended
foundations for controls
• Fundamental security principles in specifying
the overall security needs of a cloud
consumers and assessing the overall security
risk of a cloud provider
https://cloudsecurityalliance.org/research/grc-stack/#_overview
12. Cloud Consumer Security
12
Through 2020, 80% of cloud breaches will
be due to customer misconfiguration,
mismanaged credentials or insider theft,
not cloud provider vulnerabilities
-Gartner