Skip to content
Home / Risk Management

CSA Top Threats to Cloud Computing 2025

The “Top Threats to Cloud Computing 2025” report highlights a rapidly evolving threat landscape driven by both technological advances and persistent human factors. Key risks include data breaches, often resulting from misconfigured cloud settings and weak identity management, as well as account hijacking through stolen credentials and sophisticated phishing attacks, increasingly powered by AI and deepfake technology. Insider threats-whether intentional or accidental-remain a significant concern, as do vulnerabilities in APIs, supply chain dependencies, and the proliferation of non-human identities like API keys and service accounts, which dramatically expand the attack surface. The complexity of multi-cloud environments and the explosion of IoT devices introduce additional entry points for attackers, while ransomware and denial-of-service (DoS) attacks continue to escalate in frequency and impact. The report underscores the importance of enforcing robust identity and access controls, adopting a zero-trust approach, ensuring continuous monitoring and real-time detection, and maintaining shared responsibility between cloud providers and customers to mitigate these threats effectively


Publication's URL

URL: https://cloudsecurityalliance.org/artifacts/top-threats-to-cloud-computing-2025

Publication's scorecard

Issuer: CSA
Country: USA
Scope: Cyber
Typology: Benchmark
Publication's date: April 28, 2025
Category: Risk Management
Sector: Cross-Sector
Rating: 1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Loading...




Share and follow us

Leave a Reply

Your email address will not be published. Required fields are marked *