From the course: Cloud Data, Platform, and Applications Security by Pearson
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Cloud infrastructure risk mitigation strategies
From the course: Cloud Data, Platform, and Applications Security by Pearson
Cloud infrastructure risk mitigation strategies
All right, continuing on, we're still talking about risks to the data center. Let's look at the top five cloud risks from another vendor, okay? Number one, insider threats, that compromised privilege insider. The more privileged they are, the more compromised they are, the bigger the threat. data theft, data loss, and we could include the loss of actual components and systems as well, especially if they're removable or if they're small components. You know, it's not just data that can be exfiltrated from a data center, right? Keep that in mind. Number two, misconfiguration. And obviously, we're going to be focusing on terraforming our environment, infrastructure as code to prevent that human error. Number three, account hijacking, and the more privileged the account, the worse the results. I mentioned in the previous lesson that the external attacks, the structured external threats to the Cloud, number one is going to be denial of service and distributed denial of service attacks, and…
Contents
-
-
-
-
-
-
(Locked)
Learning objectives25s
-
(Locked)
Secure data center logical design10m 42s
-
(Locked)
Physical data center design9m 52s
-
(Locked)
Data center environmental design8m 29s
-
(Locked)
Design resilient environments6m 20s
-
(Locked)
Cloud infrastructure risk assessment14m 30s
-
(Locked)
Cloud vulnerabilities, threats, and attacks3m 30s
-
(Locked)
Cloud infrastructure risk mitigation strategies16m 43s
-
(Locked)
-
-
-
-
-