From the course: Cloud Data, Platform, and Applications Security by Pearson

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Cloud vulnerabilities, threats, and attacks

Cloud vulnerabilities, threats, and attacks

One thing to realize on this exam and in the exam objectives is there's redundancy. You'll return to concepts that you covered in previous lessons as we get more into the operational aspect. But something that doesn't change is where do we go to look at the source of our risks, especially when it comes to cloud and cloud data centers. And we're going to rely on that CSA Treacherous 12. So even in the cloud data center, we still have to look at data breaches. So let me use Azure for an example. If you're at an Azure data center, obviously there's going to be strict physical security to get into that facility. There'll be no tailgating, no piggybacking. There'll be multi-factor authentication. they use lease privilege and they use separation of duties. So in an Azure datacenter, it's very rare for an individual to get access to every area of the datacenter in their zero trust initiative. Also, as far as things like data breaches, as you move through the datacenter, you will go through…

Contents