The cloud carries unique threats. The cloud Security Alliance (CSA) is rapidly becoming the OWASP of cloud security standards. DevOps, containers, micro services, APIs, and orchestration are table stakes for effective cloud-native applications. Securing these software interfaces, configurations, and processes is NOT a trivial task. Furthermore, automation isn’t a panacea; in fact, it can mask critical security flaws that propagate.
This session will describe the Top Threats to Cloud Computing (aka “the Egregious Eleven”), how to identify and mitigate these threats, and how they fit into a cloud-native security program.