6.4 additional considerations (Fundamental Cloud Security U2C2) Cloud computing concept(chapter 6)
6.4. Additional Considerations This section provides a diverse checklist of issues and guidelines that relate to cloud security. The listed considerations are in no particular order. Flawed Implementations The substandard design, implementation, or configuration of cloud service deployments can have undesirable consequences, beyond runtime exceptions and failures. If the cloud provider’s software and/or hardware have inherent security flaws or operational weaknesses, attackers can exploit these vulnerabilities to impair the integrity, confidentiality, and/or availability of cloud provider IT resources and cloud consumer IT resources hosted by the cloud provider. Figure 6.15 depicts a poorly implemented cloud service that results in a server shutdown. Although in this scenario the flaw is exposed accidentally by a legitimate cloud service consumer, it could have easily been discovered and exploited by an attacker. Figure 6.15. Cloud Service Consumer A’s message triggers...