The Cloud Threat Landscape
In the third chapter, there will be a thorough assessment of the top threats to cloud computing. This will include references to Cloud Security Alliance research as well as third parties that have evaluated the threat landscape.
KeywordsAPIs; Breaches; DoS; Threats
Information in this chapter
▪ The cloud threat landscape
▪ Notorious nine
▪ Additional threats
Outsourcing any workload to a third party will introduce risk, although whether the overall risk increases is entirely dependent on the provider and the security deployed within the internally provisioned service. Regardless of whether the service is provisioned internally or externally, there will always be an element of risk; this is because while the ...