From the course: Cloud Data, Platform, and Applications Security by Pearson

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Cloud infrastructure risk mitigation strategies

Cloud infrastructure risk mitigation strategies

All right, continuing on, we're still talking about risks to the data center. Let's look at the top five cloud risks from another vendor, okay? Number one, insider threats, that compromised privilege insider. The more privileged they are, the more compromised they are, the bigger the threat. data theft, data loss, and we could include the loss of actual components and systems as well, especially if they're removable or if they're small components. You know, it's not just data that can be exfiltrated from a data center, right? Keep that in mind. Number two, misconfiguration. And obviously, we're going to be focusing on terraforming our environment, infrastructure as code to prevent that human error. Number three, account hijacking, and the more privileged the account, the worse the results. I mentioned in the previous lesson that the external attacks, the structured external threats to the Cloud, number one is going to be denial of service and distributed denial of service attacks, and…

Contents