© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2022
M. J. Haber et al.Cloud Attack Vectorshttps://doi.org/10.1007/978-1-4842-8236-6_6

6. Attack Vectors

Morey J. Haber1  , Brian Chappell2 and Christopher Hills3
(1)
Lake Mary, FL, USA
(2)
Basingstoke, Hampshire, UK
(3)
Gilbert, AZ, USA
 

The first step in establishing a secure cloud environment is understanding the threats it’s likely to encounter. The attack vectors that your environment will be subjected to will form the to-do list of the areas you need to secure first and foremost. This can seem like a daunting task, even for those who are well versed in the subject matter or particularly for those who are well versed in the immensity of the space. You need to avoid ...

Get Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.