1.6 Explain the threats and vulnerabilities associated with operating in the cloud

Cloud service models:

  • SaaS: customer only chooses application; hardware managed by provider; access control

  • PaaS: configurable hardware + software/development tools; data protection

  • IaaS: configurable hardware; VM management (VM escape; virtual host patching; virtual guest issues [patching]; virtual network issues)

  • Cloud deployment models:

    • Public: public cloud provider sells services to consumers

    • Private: internal enterprise service to internal customers

    • Community: several companies work on same platform

    • Hybrid: mix of on-premises, private cloud & public cloud

  • FaaS/serverless architecture: apps are hosted by 3rd party; all server software/hardware management is done by the provider

  • IaC: managing/provisioning DCs using machine-readable files

  • Insecure API: Internet-exposed management APIs can have software vulnerabilities (e.g. anonymous access; plaintext authentication; improper authorisations)

  • Improper key management: unencrypted; Internet-exposed key server; weak/reused key

  • Unprotected storage: insider threats; malicious file entry; impersonation; worm that is auto-synced to the cloud, and spread from the cloud to other users

  • Logging and monitoring:

    • Insufficient logging and monitoring: late detection; undetected password spraying; ignored alerts; unidentified suspicious activity

    • Inability to access: access logs provide info about failed requests made to cloud

Last updated