© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2022
M. J. Haber et al.Cloud Attack Vectorshttps://doi.org/10.1007/978-1-4842-8236-6_3

3. Cloud Service Providers

Morey J. Haber1  , Brian Chappell2 and Christopher Hills3
(1)
Lake Mary, FL, USA
(2)
Basingstoke, Hampshire, UK
(3)
Gilbert, AZ, USA
 

Before we embark on the attack vectors that make the cloud akin to the Wild West, we need to establish that the cloud is not a mysterious entity that operates in the vacuum of deep space (insert your favorite episode of Firefly here). In fact, while there are some companies that run their own clouds exclusively for their own solution, the vast majority of companies, application vendors, and third-party service providers use ...

Get Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.