Understanding Common Security Threats to Cloud Services
In previous chapters, we covered the fundamental building blocks of securing cloud services (including services for compute, storage, networking, identity and access management (IAM), auditing, and threat management), as well as looking at encryption for cloud services.
This chapter will cover the other side of the equation: common security threats to cloud services. We will also consider how to manage these threats by monitoring and responding to them.
Knowing the threats your organization may face when using cloud services will give you an understanding of what to look for and how to better protect your cloud environments in advance. Getting breached is more a question of when rather than if, so the knowledge presented in this chapter should help you to be prepared for such an eventuality.
In this chapter, we will learn how to detect and mitigate the following:
- Data breaches in cloud services
- Misconfigurations...