7. Abuse Of Cloud Services
Cloud computing allows organizations of all sizes to access vast amounts of computing power, but not everyone wants to use this power for good, the CSA warned. For example, an attacker could use an array of cloud servers to crack an encryption key in minutes.
Cloud providers need to consider how they can detect people abusing their service, how they define abuse and prevent it, the report advised.