From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Cloud vulnerabilities, threats, attacks, and risk mitigation

Cloud vulnerabilities, threats, attacks, and risk mitigation

From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep

Cloud vulnerabilities, threats, attacks, and risk mitigation

- [Instructor] Welcome to this lesson where we're going to talk about vulnerabilities, threats, and attacks that affect the cloud, as well as some mitigations to the risks that these things pose. To get started, we'll talk about a handful of different frameworks that can help us understand some common vulnerabilities and threats. And then following that, we'll talk about a handful of different common mitigation techniques. To get started, the first framework that we'll talk about is going to be the CSA Egregious Eleven, and this is the Cloud Security Alliance's publication based off of years of research that covers the most common threats to cloud applications. And looking at this list, you can see that there's a handful of threats here that don't seem to exclusively affect the cloud, such as data breaches and account hijacking, for example. With that being said, if you read through the CSA Egregious Eleven, you'll find that it is specifically covering how these different categories…

Contents