CHAPTER 6

Threats and Vulnerabilities Associated with Operating in the Cloud

In this chapter you will learn:

•   How to identify vulnerabilities associated with common cloud service models

•   Current and emerging cloud deployment models

•   Challenges of operating securely in the cloud

•   Best practices for securing cloud assets

Bronze Age. Iron Age. We define entire epics of humanity by the technology they use.

—Reed Hastings

Cloud solutions offer many benefits to an organization looking to develop new applications and services rapidly or to save costs in the setup and maintenance of an IT infrastructure. To make the best cloud solution decisions, however, an organization must be fully informed of the vulnerabilities that exist and the ...

Get CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002), 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.