© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2022
M. J. Haber et al.Cloud Attack Vectorshttps://doi.org/10.1007/978-1-4842-8236-6_8

8. Regulatory Compliance

Morey J. Haber1  , Brian Chappell2 and Christopher Hills3
(1)
Lake Mary, FL, USA
(2)
Basingstoke, Hampshire, UK
(3)
Gilbert, AZ, USA
 
A threat actor does not care about the law, compliance, regulations, or security best practices. In fact, they are hopeful that your cloud environment is deficient on many of these concepts and recommendations to help facilitate the success of their malicious activity. While regulatory compliance is designed to provide legally binding guidelines for industries and governments, they do not provide the necessary means to stay secure, ...

Get Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.