Week 8

 https://www.csoonline.com/article/3043030/top-cloud-security-threats.html

Cloud security is growing in popularity, and because of this, it is important to know what its common risks are. The article above has eleven cloud risks, however, I will only go over the top five in this blog post.

1. Insufficient identity, credential, access and key management

Brute forcing is not nearly as popular as infiltrating cloud security by posing as a legitimate user. Identity management is important for any cloud security to minimize this threat.

2. Insecure interfaces and APIs

Using interfaces and/or APIs can help alleviate some work for security specialists and software development, however, sometimes security flaws exist in these interfaces/APIs. It is important for organizations to know exactly what these APIs are doing and restructure them if a security vulnerability exists in them.

3. Misconfiguration and inadequate change control

This results from a lack of system knowledge, a misconfigured cloud security can give way for attackers to access data they should not be able to.

4. Lack of cloud security architecture and strategy

Many times a cloud system is provided by a third party which leads to less centralized control for an organization.

5. Insecure software development

Developing software over the cloud can be very convenient for software development teams, but more people working on the same project over the cloud leads to more chances for someone who accidentally or intentionally creates a risky security situation.

Comments

Popular posts from this blog

Week 10

Week 6