Learn about recent cloud security compromises.
- [Instructor] So thinking about cloud security, a breach to a cloud's service provider's infrastructure can lead to what's known as hyperjacking, where many customer's data is exposed. And there have been examples of these types of breaches in the past. There's a Google failure that exposed data. 150,000 Gmail accounts were leaked. There was a Code Spaces, the business actually ended up going out of business because their AWS infrastructure was hacked to the point that their systems were turned off and their data was lost.
So a complete business going out of business, because all their developers, source code repositories, project management services, everything got shut down. Google Drive breach, that was a hyperlink vulnerability that leaked information. Apple iCloud exposure made the news, Dropbox security breach compromised ya know, many passwords, people had to change their passwords. Worcester Polytechnic Institute claimed there were VM virtual machine instance breakout possibilities in AWS even.
So it's important to keep up on ya know, the latest activity, and the latest ya know, research that's being done on cloud security, but this can give us an example that these systems are vulnerable. We have to ya know, secure our data when we're operating in a cloud's service provider infrastructure, but we also need to check to make sure that these cloud service providers are treating our data confidentiality and that they're following best practices.
This course was created and produced by Mentor Source, Inc. We are pleased to host this training in our library.
- Components of a cloud computing platform
- Reviewing 5-4-3 cloud characteristics
- NIST guidelines on cloud security
- Cloud security considerations
- CSP availability requirements
- Security best practices for clouds
- AWS security settings and best practices
- Software containers used in cloud systems
- Cloud security certifications