© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2022
M. J. Haber et al.Cloud Attack Vectorshttps://doi.org/10.1007/978-1-4842-8236-6_9

9. Architectures

Morey J. Haber1  , Brian Chappell2 and Christopher Hills3
(1)
Lake Mary, FL, USA
(2)
Basingstoke, Hampshire, UK
(3)
Gilbert, AZ, USA
 

Throughout time, there have been some awe-inspiring examples of architecture. From the Sydney Opera House to the Taj Mahal to the Empire State Building. However, when we think of cloud architectures to support video streaming, social media, and even business applications, we think of the business names (Amazon, Netflix, Twitter, Salesforce, ServiceNow, etc.) and not the underlying plumbing that makes them viable. In fact, much of the ...

Get Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.