{"id":6232,"date":"2013-03-04T00:31:15","date_gmt":"2013-03-04T00:31:15","guid":{"rendered":"http:\/\/www.cloudcomputing-news.net\/news\/2013\/mar\/04\/csa-what-are-2013s-top-cloud-security-threats\/"},"modified":"2013-03-04T00:31:15","modified_gmt":"2013-03-04T00:31:15","slug":"csa-what-are-2013s-top-cloud-security-threats","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/csa-what-are-2013s-top-cloud-security-threats\/","title":{"rendered":"CSA: What are 2013\u2019s top cloud security threats?"},"content":{"rendered":"<p>The Cloud Security Alliance (CSA) has released a new report designed to examine the most pervasive security threats still threatening cloud in 2013.<\/p>\n<p>Called &ldquo;The Notorious Nine&rdquo; &ndash; presumably using the same nomenclature that Enid Blyton employed for the protagonists of her fabled children&rsquo;s books &ndash; the CSA enlisted the help of industry experts, and is designed to be used in conjunction with other CSA best practice guides; &ldquo;Security Guidance for Critical Areas in Cloud Computing V.3&rdquo; and &ldquo;Security as a Service Implementation Guidance&rdquo;.<\/p>\n<p>According to the CSA the nine security challenges cloud players face, ranked in order, are:<\/p>\n<ul>\n<li>Data breaches<\/li>\n<li>Data loss<\/li>\n<li>Account hijacking<\/li>\n<li>Insecure APIs<\/li>\n<li>Denial of service<\/li>\n<li>Malicious insiders<\/li>\n<li>Abuse and nefarious use<\/li>\n<li>Insufficient due diligence<\/li>\n<li>Shared technology issues<\/li>\n<\/ul>\n<p>Most of these seem relatively self-explanatory, with the vast majority making headlines in the cloud computing space.<\/p>\n<p>The dreaded data breach was, perhaps unsurprisingly, the top threat. Calling &#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Cloud Security Alliance (CSA) has released a new report designed to examine the most pervasive security threats still threatening cloud in 2013.<br \/>\nCalled &ldquo;The Notorious Nine&rdquo; &ndash; presumably using the same nomenclature that Enid Blyton&#8230;<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-6232","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/6232","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=6232"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/6232\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=6232"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=6232"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=6232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}