© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2022
M. J. Haber et al.Cloud Attack Vectorshttps://doi.org/10.1007/978-1-4842-8236-6_14

14. Security Recommendations for Your Cloud Environment

Morey J. Haber1  , Brian Chappell2 and Christopher Hills3
(1)
Lake Mary, FL, USA
(2)
Basingstoke, Hampshire, UK
(3)
Gilbert, AZ, USA
 

The cloud will not solve all of your computing problems, enable all of your future business initiatives, nor will it always save your business money. In many use cases, the cloud may be more expensive and be a trade-off in staffing skills that would support a legacy solution if cloud washed. Regulations, compliance, and security best practices will dictate how to proceed in the cloud, but implementing ...

Get Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.