Theme Description | Frequency | % | |
Anticipated Threats | Insider threat | 12 | 85% |
Weak service level agreement (SLA) | 5 | 35% | |
Customer data manipulation | 2 | 14% | |
Shared technology vulnerabilities | 8 | 57% | |
Abuse of cloud computing resources | 10 | 71% | |
Data segregation issues | 3 | 21% | |
Cloud security attacks | 13 | 92% | |
SLA violations | 2 | 14% | |
Data loss | 14 | 100% |