Threat, Vulnerabilities and Mitigations: Cloud Vulnerabilities Flashcards

1
Q

What are the cloud storage threats?

A

Are you storing sensitive data in open public storage? There can be weaknesses:

Storage services: Could have weaknesses due to misconfiguration in access controls or because data is put in open storage accidentally or unknowingly. Check out https://buckets.grayhatwarfare.com/.

Leaked keys: Used for programmatic access to cloud services, they can get leaked because they’re:

Stored in open cloud storage..
Hard-coded into an app/scripts/configs
Transferred in a less than secure way, such as over a plain-text network.

Identity and access management (IAM) misconfiguration: Incorrect setting of access controls can be a weakness, as accounts have access to things they shouldn’t have access to.

Application vulnerabilities: Your cloud service has an operating system on it, such as Linux or Windows, and those operating systems have vulnerabilities. You also might have weakness in:

Web apps: such as the HTTP Server App or content management system (CMS).

Serverless/Function-as-a-Service(FaaS).

Software apps such as network services or Customer Relationship Management (CRM) software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the other issues?

A

Weak or no security controls.

Denial-of-service (DoS) attacks.

Insider threats: intentional or unintentional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly