CSA顶级云安全威胁网络安全英文版201760页

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

CLOUDSECURITYALLIANCETheTreacherous12-TopThreatstoCloudComputing+IndustryInsights©2017,CloudSecurityAlliance.Allrightreserved.1©2017CloudSecurityAlliance–AllRightsReservedAllrightsreserved.Youmaydownload,store,displayonyourcomputer,view,print,andlinktoTheTreacherous12-CloudComputingTopThreatsin2016at:(a)theReportmaybeusedsolelyforyourpersonal,informational,non-commercialuse;(b)theReportmaynotbemodifiedoralteredinanyway;(c)theReportmaynotberedistributed;and(d)thetrademark,copyrightorothernoticesmaynotberemoved.YoumayquoteportionsoftheReportaspermittedbytheFairUseprovisionsoftheUnitedStatesCopyrightAct,providedthatyouattributetheportionstoTheTreacherous12-CloudComputingTopThreatsin2016.ThepermanentandofficiallocationforCloudSecurityAllianceTopThreatsresearchis©2017,CloudSecurityAlliance.Allrightreserved.2Acknowledgments.................................................................................................................................................5ExecutiveSummary...............................................................................................................................................6Methodology.............................................................................................................................................................81.DataBreaches.............................................................................................................................................92.InsufficientIdentity,CredentialandAccessManagement.....................................................123.InsecureInterfacesandAPIs..............................................................................................................154.SystemVulnerabilities..........................................................................................................................175.AccountHijacking..................................................................................................................................196.MaliciousInsiders...................................................................................................................................217.AdvancedPersistentThreats...............................................................................................................238.DataLoss....................................................................................................................................................259.InsufficientDueDiligence...................................................................................................................2710.AbuseandNefariousUseofCloudServices..................................................................................3011.DenialofService.....................................................................................................................................3212.SharedTechnologyVulnerabilities...................................................................................................34ContentsCLOUDSECURITYALLIANCETheTreacherous12-TopThreatstoCloudComputing+IndustryInsights©2017,CloudSecurityAlliance.Allrightreserved.3Acknowledgments..............................................................................................................................................37ExecutiveSummary............................................................................................................................................38.Boxmismanagementofinvitelinks-DataBreaches..........................................................................................................................................39Yahoobreach-DataBreaches..........................................................................................................................................40LinkedInfailuretosaltpasswordswhenhashing-InsufficientIdentityCredentialAccessManagement..............................................................41Instagramabuseofaccountrecovery-InsufficientIdentityCredentialAccessManagement.............................................................42MongoDBMexicanvoterinformationleak-InsufficientIdentityCredentialAccessmanagement..............................................................43MongoDBunprotected,attackedbyransomware-InsufficientIdentityCredentialAccessManagement.............................................................44Moonpiginsecuremobileapplication-InsecureInterfaceandAPIs................................................................................................................45DirtyCowLinuxprivilegeescalationvulnerability-SystemVulnerabilities...............................................................................................................

1 / 60
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功