-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Cloud Auditing Best Practices
By :

Cloud networks have public frontends and the ability to communicate with the broader internet. As we said earlier in this chapter, cloud infrastructure is exposed to the internet. As a result, it can be susceptible to attacks such as denial-of-service attacks, data exfiltration, and so on.
A denial-of-service attack is the act of flooding your network with tons of illegitimate network traffic to overload your network and prevent you from fulfilling the real requests. Data exfiltration is a type of security breach that leads to the unauthorized transfer of data. There are many attack paths an adversary can take once they have obtained some sort of access to a cloud network.
Securing networks running in the cloud is essential to providing data security. The following security controls can mitigate the risks presented by the cloud:
Change the font size
Change margin width
Change background colour