From the course: Cloud Security Considerations for General Industry
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Infrastructure attack vectors
From the course: Cloud Security Considerations for General Industry
Infrastructure attack vectors
- [Instructor] Now we will take a closer look at some important cloud infrastructure vulnerabilities because cloud computing brings additional attack vectors that need to be considered. In addition to new technical and governance risk, cloud computing uses new technology, such as virtualization, federated identity management, and automation through a management interface. It also introduces external service providers to some of the main new attack vectors, including guest escape, where another user can leave their segregated resource to attack another user. Identify compromise, either technical or social. For example, through employees of the provider. API compromise such as by leaking API credentials. Since every service and connection is managed by an API, this type of attack could be devastating. Attack on the provider's infrastructure and facilities. For example, from a third party administrator that may be hosting with…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
Cloud computing key drivers2m 32s
-
(Locked)
Cloud computing characteristics3m 20s
-
(Locked)
Deployment models2m 53s
-
(Locked)
Service models6m 58s
-
(Locked)
IT implementation options1m 47s
-
(Locked)
Infrastructure attack vectors1m 25s
-
(Locked)
Software attack vectors2m 24s
-
(Locked)
Critical vulnerabilities3m 21s
-
-
-
-
-
-