The most critical threats to cloud-based applications have been enumerated by the Cloud Security Alliance. Referred to as the Treacherous Twelve, a secure cloud solution must protect all applications and processes against these attack vectors. Refer to https://downloads.cloudsecurityalliance.org/assets/research/top-threats/Treacherous-12_Cloud-Computing_Top-Threats.pdf for a detailed description of each of these critical threats.





















































