Summary
In this chapter, we have focused on common security threats to cloud services, including data breaches, misconfiguration, insufficient IAM, account hijacking, insider threats, insecure APIs, and the abuse of cloud services. For each of the identified threats, we reviewed the potential consequences of the threat, a common example of the threat, and best practices to detect and mitigate the threat.
Knowing the most common threats you face when using cloud services and the various built-in cloud service capabilities will allow you to better protect your cloud environment.
In the next chapter, we will learn how to engage with public cloud providers and what important questions to ask a cloud provider before the engagement phase, important topics to embed inside a contractual agreement with the cloud provider, and penetration testing in cloud environments.