Abstract
The first step in establishing a secure cloud environment is understanding the threats it’s likely to encounter. The attack vectors that your environment will be subjected to will form the to-do list of the areas you need to secure first and foremost. This can seem like a daunting task, even for those who are well versed in the subject matter or particularly for those who are well versed in the immensity of the space. You need to avoid analysis paralysis, getting caught in a loop of trying to address everything at once. We’ll come back to that later in the book, but for now, the best advice we can give you is to look at the cybersecurity frameworks that exist; many intelligent people have thought about the attack surface and identified the attack vectors, so you don’t have to. Treat these as toolkits, guidelines, and, in some cases, gospel in understanding cloud attack vectors.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
- 9.
- 10.
- 11.
- 12.
- 13.
- 14.
- 15.
- 16.
- 17.
- 18.
- 19.
- 20.
- 21.
- 22.
- 23.
- 24.
- 25.
- 26.
- 27.
- 28.
- 29.
- 30.
- 31.
- 32.
- 33.
- 34.
- 35.
- 36.
- 37.
- 38.
- 39.
- 40.
- 41.
- 42.
- 43.
- 44.
- 45.
- 46.
- 47.
- 48.
- 49.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature
About this chapter
Cite this chapter
Haber, M.J., Chappell, B., Hills, C. (2022). Attack Vectors. In: Cloud Attack Vectors. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-8236-6_6
Download citation
DOI: https://doi.org/10.1007/978-1-4842-8236-6_6
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-8235-9
Online ISBN: 978-1-4842-8236-6
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)