Cloud Security Flashcards
What happens with Shared Physical Server Vulnerabilities in a cloud environment?
This can lead to vulnerabilities if one users data is compromised
What happens with Inadequate Virtual Environment Security in a cloud environment?
can lead to unauthorized access, data breaches, and other security incidents.
What happens with User Access Management in a cloud environment?
can lead to unauthorized access to sensitive data and systems.
This is often due to weak passwords, excessive permissions, or lack of user activity monitoring
What happens with Lack of Up-to-Date Security Measures in a cloud environment?
Can lead to leaving the system vulnerable to new threats
What happens with Single Points of Failure in a cloud environment?
can lead to a complete system outage affecting all users.
What happens with Weak Authentication & Encryption Practices in a cloud environment?
Weak authentication can allow unauthorized users to gain access to cloud systems.
What happens with Unclear Policies in a cloud environment?
lack of clear guidelines or procedures for various security aspects
Explain Data Remnants in a cloud environment
residual data left behind after deletion or erasure processes.