Chapter 3: Securing Storage Services
In the previous chapter, we covered compute services. After compute services, the second most common resource everyone talks about is storage – from object storage to block storage (which is also known as instance attached storage), to file storage.
We are using storage services to store our data.
The following is a list of common threats that might impact our data when it is stored in the cloud:
- Unauthorized access
- Data leakage
- Data exfiltration
- Data loss
As a best practice, we should always use the following countermeasures when storing data in the cloud:
- Access-control lists (ACLs; note that each cloud provider has its own implementation) and Identity and Access Management (IAM), to restrict access ...
Get Cloud Security Handbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.