From the course: Cloud Data, Platform, and Applications Security by Pearson

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Common software vulnerabilities

Common software vulnerabilities

There's hazards to cloud development and cloud deployment. Remember, not all applications are ready for the cloud. They're not all enabled for virtualization. What do I mean by that? Well, if they're not virtual aware or cloud aware, they can have a tendency to use more resources on the underlying guest than they should. So for example, if you write a custom antivirus program or an off-the-shelf antivirus program. Developers also often fail to encrypt data at rest and data in transit, especially when using code repositories. Cloud development involves additional due diligence performed in the initial phases of the development lifecycle. So for example, the decision to use platform as a service or to use a particular development process, like Agile or CICD, is often rushed when using cloud deployment, but you shouldn't. Remember, you're saving money. You have cost savings in the cloud, so take your time in the early initiation phase. Also remember that on-premise doesn't always…

Contents