1.6 Explain the security concerns associated with various types of vulnerabilities. Flashcards
Attacks and related concepts to be aware of as a cloud user:
Increased chances of data loss or disclosure
Target of attacker also using the cloud
CSP having insecure APIs and UIs
Potential failure of isolation
Presence of malicious insiders
Weak auth techs
Loss of reputation due to activities of other cloud tenants
Vulns allowing for privilege escalation
Virtualization attacks resulting in VM escaping
Unauthorized access to backups
Zero-day
Newly discovered attacks w/no specific defense available from the vendor
Weak configurations
Open permissions
Unsecured root accounts
Errors
Weak encryption
Unsecure protocols
Default settings
Open ports and services
Third-party risks
Vendor management
-System integration
-Lack of support
Supply chain
Outsourced code development
Data storage
Improper or weak patch management
Firmware
Operating System (OS)
Applications
Legacy platforms
May still function but are no longer supported by original vendor
Impacts
Data loss
Data breaches
Data exfiltration
Identity theft
Financial
Reputation
Availability loss