T9 🏁

Unit 3

1) Define the fundamentals of cloud security. What are the primary concerns?

Fundamentals of Cloud Security

Cloud security is the practice of protecting cloud-based data, applications, and infrastructure from unauthorized access, loss, and cyber threats. It combines technical controls, organizational policies, and best practices to safeguard information stored and processed in the cloud, ensuring confidentiality, integrity, and availability (the CIA triad). Let's break down the fundamentals and main concerns:

Fundamental Principles of Cloud Security

  1. Shared Responsibility Model
    Security in the cloud is divided between the cloud provider (who secures the infrastructure) and the customer (who secures data, applications, and configurations). Understanding this division is crucial so no gaps occur.

  2. Identity and Access Management (IAM)
    Strong IAM controls limit access to only authorized users. Practices include multi-factor authentication, role-based permissions, and regular audits of user privileges.

  3. Data Encryption
    Data should be encrypted both "at rest" (when stored) and "in transit" (when moving between systems) to prevent unauthorized disclosure if the data is intercepted or a breach occurs.

  4. Security Monitoring and Assessments
    Continuous monitoring, vulnerability scans, and regular security assessments help detect and address risks quickly before they turn into breaches.

  5. Compliance and Governance
    Organizations must adhere to regulations (like GDPR, HIPAA) and industry standards. Security controls in the cloud should support audits, privacy, and legal requirements.

  6. Data Backup and Disaster Recovery
    Reliable backup and recovery strategies maintain data availability and business continuity during incidents, sabotage, or hardware failure.

Primary Concerns in Cloud Security

  • Data Breaches and Leakage: Sensitive information can be exposed if access controls, encryption, or cloud configurations are weak.
  • Account Hijacking: Stolen credentials or compromised accounts can give attackers unauthorized access to cloud assets.
  • Misconfiguration: Incorrect settings (for storage buckets, access roles, etc.) are a leading cause of cloud vulnerabilities.
  • Insider Threats: Disgruntled or careless employees may intentionally or accidentally expose data or systems.
  • Regulatory Compliance: Cloud environments often cross jurisdictions, complicating how data privacy laws apply.
  • Multi-Tenancy Risks: Sharing infrastructure with other customers raises concerns about data isolation and cross-tenant attacks.
  • Denial of Service (DoS) & Service Downtime: Attacks or provider outages can disrupt access to critical resources.

2) Discuss the tools and methods for vulnerability assessment in the cloud.

Tools and Methods for Cloud Vulnerability Assessment

Assessing vulnerabilities in the cloud means using tools and processes to identify, classify, and remediate security weaknesses across infrastructure, applications, networks, and databases. Here’s a structured overview:

Key Methods for Cloud Vulnerability Assessment

  1. Automated Scanning
    • Use vulnerability scanners to regularly check cloud assets for known weaknesses, misconfigurations, and outdated software. Scans should cover server instances, databases, apps, and APIs.
  2. Manual Testing & Penetration Testing
    • Complement automated tools with manual review and penetration testing to uncover complex or subtle vulnerabilities not easily detected by scanners.
  3. Continuous Monitoring and Integration
    • Integrate vulnerability assessment tools into CI/CD pipelines and Infrastructure as Code (IaC) workflows, ensuring new deployments are checked from the start.
  4. Risk Prioritization and Reporting
    • Analyze findings for risk level and prioritize remediation, using dashboards and reports for clear action plans.

Common Vulnerability Assessment Tools for Cloud

  • Network Scanning:
    • Nessus: Widely used for scanning network devices, servers, and cloud resources.
    • OpenVAS: Open-source scanner for infrastructure and networks.
    • Rapid7 InsightVM/Nexpose: Network assessment and dynamic risk scoring.
  • Cloud Provider Tools:
    • AWS Inspector, AWS Config: Automated assessment and configuration analysis.
    • Azure Security Center / Microsoft Defender for Cloud: Vulnerability and threat assessment for Azure resources.
    • Google Cloud Security Scanner: App and infrastructure scanning for Google Cloud.
  • Application and Database Scanners:
    • Qualys: Cloud-based scanning for apps, databases, and compliance management.
    • Bright Security: Dynamic application security testing on web apps.
  • Specialized Tools:
    • Sentra: Data discovery and security analysis for cloud data stores.
    • Wiz: Agentless, cloud-native assessment covering OS, code, and configurations.
    • Cisco Vulnerability Management: Risk-based scoring and remediation tracking.

Key Vulnerability Assessment Methodologies

  • OWASP Methodology: Focuses on web app vulnerabilities using automated scanning and manual code review. Based on the OWASP Top 10 risks and best practices.
  • NIST SP 800-115: Technical guide for structured information security assessment and penetration testing.

Best Practices

  • Schedule regular automated scans, and complement with targeted manual and penetration testing.
  • Integrate assessment tools into development and deployment pipelines (DevSecOps).
  • Use risk-based prioritization, focusing first on critical vulnerabilities.
  • Ensure assessment tools are kept up to date with the latest threat intelligence.

3) Explain privacy and security issues specific to cloud computing environments.

Privacy and Security Issues in Cloud Computing

Cloud computing offers flexibility, scalability, and cost benefits—but it also introduces unique privacy and security challenges.

Key Privacy Issues

  1. Data Confidentiality: Sensitive data is stored on third-party servers, so unauthorized access is a major concern. Strict access control policies and data encryption are required to maintain confidentiality.
  2. Geographical Data Storage and Sovereignty: Data may be stored in countries with different laws, complicating compliance and raising concerns over legality and government access.
  3. Transparency Challenges: Some cloud providers don't clearly disclose their security policies or controls, making it hard for users to trust them or assess their data risk.
  4. Multi-Tenancy Risks: Resources are shared among many customers (tenants). Without strong isolation, attackers may exploit flaws to access others' data.

Major Security Concerns

  1. Data Loss and Breaches: Data can be lost due to hacks, accidental deletion, outages, or cloud provider mistakes. A single breach or failure can expose huge amounts of data.
  2. Insecure APIs: Cloud services rely on APIs for access; if these aren't protected, attackers can use them to steal or manipulate data.
  3. Account Hijacking: Stolen or weak credentials let attackers take control of user accounts, allowing them to steal data, manipulate services, or cause outages.
  4. Hypervisor Attacks & Virtualization Risks: If attackers compromise the hypervisor (which manages virtual machines), they could gain access to multiple customers' data and systems on the same hardware.
  5. Lack of Visibility & Control: Customers often rely on cloud providers for security, but may not have enough insight into how their data is protected, monitored, or accessed.
  6. Compliance and Legal Issues: Ensuring regulatory compliance is more difficult when data crosses borders and ownership/control is shared.
  7. Insider Threats: Employees or contractors at service providers may abuse privileged access, intentionally or accidentally leaking data.
  8. Shadow IT: Use of unauthorized cloud services increases risk, making it hard for organizations to monitor and enforce security policies.

How to Address These Challenges (in brief)

  • Encryption: Protect data at rest and in transit.
  • Access Controls: Implement strong authentication and least privilege for users.
  • Regular Audits and Monitoring: Detect unauthorized access or misconfigurations quickly.
  • Clarity in SLAs and Governance: Demand transparency from providers and use strong contractual agreements for data handling, reporting, and breach response.

Quick Review

Cloud computing’s shared environments, remote storage, and complex supply chains introduce issues around data confidentiality, loss, legal jurisdiction, and lack of visibility. Primary concerns include breaches, insecure APIs, account hijacking, multi-tenancy risks, compliance difficulties, and insider threats.

4) Describe the architectural considerations for secure cloud computing.

Architectural Considerations for Secure Cloud Computing

Designing a secure cloud computing architecture means deliberately layering protection across all aspects of your cloud environment. Here are the key considerations to focus:

1. Identity and Access Management (IAM)

  • Use role-based access control (RBAC), multi-factor authentication (MFA), and strict least privilege principles so only authorized users and systems can access cloud resources.
  • Regularly audit and monitor IAM policies; enable identity federation for seamless cross-cloud access.

2. Network Security and Segmentation

  • Implement firewalls, Virtual Private Clouds (VPCs), VPNs, and Intrusion Detection/Prevention Systems (IDS/IPS) to block unauthorized traffic.
  • Segment networks and use microperimeters around high-value resources so breaches in one area can’t easily spread to others.

3. Data Security

  • Enforce encryption for data at rest and in transit (SSL/TLS, AES-256), secure key management, and data loss prevention (DLP).
  • Classify and tag data, applying access controls and monitoring for sensitive information.

4. Application Security

  • Develop and deploy applications using secure coding practices; defend against web threats with tools like Web Application Firewalls (WAF) and strong API security policies.
  • Scan code and third-party dependencies for vulnerabilities before deployment.

5. Configuration and Posture Management

  • Use secure, automated configuration baselines, monitor for drift, and remediate misconfigurations quickly (e.g., improper S3 bucket settings).

6. Monitoring, Logging, and Incident Response

  • Deploy Security Information and Event Management (SIEM) systems to monitor logs and security events across all layers in real time.
  • Have automated alerting and robust incident response plans to detect, contain, and recover from threats.

7. Resilience, Redundancy, and Scalability

  • Build redundancy into the architecture (e.g., backup, failover clusters) to ensure availability even during attacks or failures.
  • Design for scaling securely—as workloads grow, ensure that control mechanisms do too.

8. Automation and Centralization

  • Automate security tasks like patching, provisioning, and threat detection to reduce human error and speed up response.
  • Centralize management of policies, updates, and monitoring across cloud services.

9. Compliance and Governance

  • Align design with regulations (GDPR, HIPAA, PCI-DSS) and industry standards, and use tools for audit readiness and reporting.

10. Shared Responsibility Model Awareness

  • Remember: The cloud provider secures infrastructure, while the customer is responsible for their data and configurations. Design controls with this division in mind.

5) What is Trusted Cloud Computing, and how does it ensure security?

What is Trusted Cloud Computing?

Trusted Cloud Computing refers to cloud architectures and platforms that are explicitly designed to guarantee a high level of security, reliability, and predictability. The goal is for users to confidently process, store, and share sensitive information in the cloud, knowing that the infrastructure will enforce strong security policies—even against malicious hardware, software, or network threats.

Trusted cloud systems rely on trusted components, such as a Trusted Computing Base (TCB)—the combination of hardware, software, and firmware that enforces critical security policies—and technologies like Trusted Platform Modules (TPM) and virtual TPMs for cryptographic key storage and platform attestation.

How Trusted Cloud Computing Ensures Security

Trusted cloud computing uses several architectural and technological measures:

  • Trusted Boot and Remote Attestation: Systems measure and verify each stage of the boot process using cryptographic hashes. Remote attestation allows third parties to verify the current state of the software and hardware against expected baselines before trusting the cloud system.
  • Sealed Storage and Encryption: Sensitive cryptographic keys and data are stored securely and only released when the system is in a trusted state, preventing unauthorized access—even if parts of the infrastructure are compromised.
  • Strict Access Control and Need-to-Know Policies: Access models enforce strong separation of duties, so users and processes can only access information necessary for their role. Mandatory access controls (MAC) and fine-grained policy enforcement keep data isolated between tenants.
  • Protection Domains: Each process runs in an isolated memory and execution space (protection domain), blocking unauthorized modification or interference and defending against attacks from other concurrent processes.
  • Trusted Monitoring: Security policies are actively enforced; trusted monitors oversee the execution environment, ensuring policy adherence and quick detection of suspicious actions.
  • Compliance and Audit: Trusted cloud environments employ layered hardware and software assurance mechanisms to support legal compliance, protect sensitive data, and provide strong audit trails for accountability.

In Practice

Trusted cloud computing is used in critical infrastructure, defense, government, and businesses needing guaranteed data protection. By integrating trusted hardware, secure boot, isolation, and strong access controls, these platforms:

  • Prevent execution of untrusted code
  • Protect data at rest, in use, and in transit
  • Ensure applications behave as specified
  • Support compliance and resilience against malicious threats

6) Explain identity management and access control in the context of cloud security.

Identity Management and Access Control in Cloud Security

Identity and Access Management (IAM) is a foundational framework for protecting cloud resources. IAM handles who can access cloud data and services, how their identities are verified, and what actions they're allowed to perform. Let’s break down the two main parts and their role in cloud security.

What Are Identity Management and Access Control?

  • Identity Management: Involves creating, maintaining, and securing digital identities of users, devices, and applications. This covers onboarding, lifecycle management, and removal of users to ensure only legitimate entities access resources.
  • Access Control: Governs what resources each identity can interact with and what actions they can take. Techniques include role-based access control (RBAC), policies, and the principle of least privilege (giving users only as much access as they require).

Key Mechanisms & Best Practices

  • Authentication: Validates user identities—commonly through passwords, Single Sign-On (SSO), and Multi-Factor Authentication (MFA) for extra security.
  • Authorization: Assigns permissions and roles to limit what authenticated users can do.
  • Automated Provisioning/Deprovisioning: Efficiently adds/removes users or changes access when needed—critical for large, dynamic cloud environments.
  • Centralized Directory Services: Use platforms like Active Directory to manage access across multi-cloud setups.
  • Access Reviews and Monitoring: Regularly check who has access to what, monitor suspicious activities, and audit changes for compliance and threat detection.

Why Are IAM and Access Control Critical in the Cloud?

  • Traditional perimeter security (corporate firewall) is no longer sufficient—identity now determines access, not just location or device.
  • IAM acts as a gatekeeper, keeping unauthorized users out, reducing privilege escalation risks, and helping teams meet regulatory standards.
  • Centralized IAM simplifies management, supports remote work, and increases visibility across all cloud resources.

7) Discuss autonomic security and its relevance in cloud computing.

Autonomic Security in Cloud Computing

Autonomic security in cloud computing refers to security systems that are able to operate, detect, respond, and recover from threats with minimal or no human intervention. This capability is part of the broader field of autonomic computing—systems that manage, optimize, configure, and protect themselves automatically, inspired by biological systems like the human autonomic nervous system.

Key Features of Autonomic Security

  • Self-Protection: Systems continuously monitor for security threats (like malware or suspicious network traffic). They can identify, block, and recover from attacks automatically, reducing human error and speeding up incident response.
  • Self-Healing: When a vulnerability or fault is detected, the system can repair itself—such as rerouting affected services, restoring backups, or updating software—without user input.
  • Self-Configuration: Autonomic security adjusts settings (firewalls, permissions, access controls) in response to changing conditions, reducing misconfiguration risks and adapting to new threats.
  • Self-Optimization: The system analyzes security events and workload data to tune rules and resources for optimal performance and reduced risk.
  • Adaptive Response: Uses artificial intelligence (AI) and machine learning (ML) to learn normal and abnormal patterns, improving detection and automating tailored responses to evolving attacks.

Relevance in Cloud Computing

Cloud environments are large, dynamic, and complex—making manual security management difficult. Autonomic security offers several advantages:

  • Automation at Scale: Automatically protects vast numbers of users, servers, and applications across distributed cloud resources—essential for managing modern cloud platforms.
  • Speed and Agility: Instant self-defense and recovery responses minimize downtime and data loss, helping maintain service continuity.
  • Reduced Human Intervention: Frees up security teams to focus on strategy, as routine and repetitive tasks (such as threat detection, patching, and remediation) are handled by the system.
  • Continuous Improvement: Systems learn from incidents, adapting security controls and policies proactively.
  • Regulatory Compliance: Autonomic controls help ensure consistent policy enforcement, audit trails, and compliance with privacy and security standards.

Summary Table

FeatureBenefit in Cloud Security
Self-protectionAutomated threat detection & response
Self-healingMinimizes downtime, fast recovery
Self-configureReduces misconfigs, adapts to change
Self-optimizeImproves overall security efficiency
Adaptive/AIResponds to new & complex threats

8) What are virtual threats and how are they managed in virtualization security?

Virtual Threats in Virtualization Security

Virtual threats in cloud environments are security risks that specifically arise from the use of virtual machines (VMs) and virtualized infrastructure. These threats exploit vulnerabilities in virtual machines, hypervisors, network configurations, and management systems to compromise data or disrupt operations.

Common Virtual Threats

  1. VM Sprawl: Uncontrolled proliferation of virtual machines leads to management complexity, resource wastage, and increased attack surface. Unused or forgotten VMs may not be updated or monitored, making them easy targets.
  2. Malware & Ransomware Attacks: VMs can be infected by malicious software, which can then spread throughout the virtual infrastructure if isolation controls are weak.
  3. Hypervisor Vulnerabilities: If attackers exploit flaws in the hypervisor—the core software managing VMs—they can potentially take over multiple VMs or the underlying hardware.
  4. VM Escape: An attacker breaks out of a VM's isolation layer to access the host system or other VMs, compromising confidentiality and integrity.
  5. VM Hopping: This attack lets threats move from one VM to another on the same physical host by exploiting shared resources, risking data leakage or denial of service.
  6. Improper Network and Access Controls: Poor firewall rules, open ports, or weak credentials allow unauthorized access to management interfaces or communication between VMs, increasing exposure.
  7. Offline VM Security Risks: Backed-up or dormant VMs may miss security updates, making them vulnerable if reactivated.

Managing Virtual Threats

1. Hypervisor Security & Patching

  • Regularly update and patch hypervisors to close vulnerabilities, and isolate management interfaces to reduce attack vectors.
  • Limit access to hypervisor controls to trusted administrators only.

2. Network Configuration

  • Use virtual firewalls, segmented networks, and strict rules to control traffic between VMs and between VMs and the outside world.
  • Monitor network traffic for unusual activity.

3. Access Control

  • Implement strong authentication for users and administrative access.
  • Use role-based access control (RBAC) and regularly audit user privileges.

4. Malware Protection & Monitoring

  • Deploy antivirus and antimalware on VMs.
  • Utilize Host-based and Network-based Intrusion Detection Systems (HIDS/NIDS) to supervise activity.

5. VM Lifecycle Management

  • Regularly review the inventory of running VMs to avoid sprawl; decommission unused VMs and clean up old snapshots.
  • Ensure offline VMs receive updates before activation.

6. Encryption & Key Management

  • Encrypt data at rest, in transit, and on backup media using strong key management practices.

7. Isolation and Segregation

  • Strengthen isolation between VMs and between VMs and the hypervisor to prevent VM escape and hopping.
  • Use trusted platform modules (TPM) and trusted domains for added assurance.

Quick Review

  • Virtual threats exploit the unique aspects of virtual environments: VM proliferation, shared resources, device and hypervisor vulnerabilities.
  • Countermeasures involve patching, monitoring, access controls, lifecycle management, and encryption.

9) Provide recommendations for VM security and specific techniques used to secure virtual machines.

Recommendations and Techniques for VM Security

Securing virtual machines (VMs) in cloud environments requires a multi-layered approach. Here are key recommendations and specific techniques to reduce risks and protect your VMs:

1. Access Controls & Identity Management

  • Enforce multi-factor authentication (MFA), strong passwords, and role-based access controls (RBAC) so only authorized users can access and administer VMs.
  • Practice principle of least privilege—grant users and apps only the minimal permissions needed for their tasks, and regularly review access rights.

2. Data Encryption

  • Use encryption for data at rest (disk, file, and database encryption) and in transit (protocols like HTTPS, SSL/TLS, and SSH) to safeguard sensitive information stored and sent from VMs.

3. Hypervisor and Host Security

  • Patch and update hypervisor software regularly; restrict access to hypervisor management interfaces to trusted personnel.
  • Implement segmentation and isolation between VMs to prevent cross-VM attacks and "VM escape" exploits.

4. Secure VM Configuration and Hardening

  • Harden guest operating systems and applications by disabling unused services, restricting network ports, and deploying host firewalls and intrusion prevention systems (HIPS).
  • Use secure configuration baselines and templates for consistent deployments.

5. Continuous Monitoring & Endpoint Protection

  • Use security monitoring tools (SIEM, IDS/HIDS) and real-time log analysis to detect tampering, malware, and suspicious activities.
  • Protect VMs with up-to-date antivirus/EDR solutions and ensure endpoint defense is correctly configured.

6. Vulnerability Management & Patching

  • Regularly scan VMs for vulnerabilities and promptly apply system and software patches to fix known security issues.

7. Network Segmentation

  • Separate VM networks with micro-segmentation and network security groups to restrict flow between tenants and sensitive resources, mitigating lateral movement of threats.
  • Keep management APIs isolated and secured to prevent unauthorized access to infrastructure controls.

8. Backup & Disaster Recovery

  • Maintain regular, secure backups of VM data and configurations; store backups offsite and validate disaster recovery plans to ensure business continuity.

9. Audit & Compliance

  • Conduct regular security audits and maintain compliance with industry best practices (e.g., NIST, CIS benchmarks) for system hardening and monitoring.

Software-as-a-Service (SaaS) delivers huge benefits, but also creates unique security challenges in cloud environments.

1. Data Leaks and Loss

SaaS applications often store large amounts of sensitive customer and business data. A breach (due to attacks, misconfiguration or insider threats) can expose personal, financial, or confidential information—causing legal and reputational harm.

2. Misconfiguration Risks

Misconfigurations in access controls, API settings, or security policies can unintentionally expose data or systems to the public internet. Even strong SaaS platforms are vulnerable if admins set up permissions, sharing policies, or integrations incorrectly.

3. Poor Access Control & Account Hijacking

Weak identity management, absence of multi-factor authentication (MFA), or poor password hygiene make it easier for attackers to hijack user accounts, move laterally within the app, and steal or manipulate data. Role-based access and least privilege are critical controls but often lacking.

4. API Vulnerabilities

APIs in SaaS platforms make it easy to automate or integrate with other apps, but poorly secured APIs are a major target for attackers—for data breaches, injection attacks, and unauthorized access.

5. Insider Threats

Both intentional and accidental actions by trusted users (employees, contractors, partners) can lead to data leaks, deletion, or manipulation. Lack of monitoring and improper privilege management increase this risk.

6. Shadow IT & Supply Chain Attacks

Employees might use SaaS applications not sanctioned or monitored by IT, exposing sensitive data to vulnerabilities. Additionally, third-party services integrated with SaaS platforms can be exploited by attackers to reach your organization's data.

7. Regulatory Compliance Challenges

Storing and processing data via remote SaaS providers complicates compliance with regulations like GDPR, HIPAA, or PCI DSS. Data residency, audibility, and governance are ongoing concerns—especially with cross-border data flow.

8. Virtualization and Multi-Tenancy Risks

SaaS generally runs on shared infrastructure. Poor isolation between tenants (users/organizations) or vulnerabilities in the virtualization layer can lead to data commingling or leaks.

On this page

1) Define the fundamentals of cloud security. What are the primary concerns?
Fundamentals of Cloud Security
Fundamental Principles of Cloud Security
Primary Concerns in Cloud Security
2) Discuss the tools and methods for vulnerability assessment in the cloud.
Tools and Methods for Cloud Vulnerability Assessment
Key Methods for Cloud Vulnerability Assessment
Common Vulnerability Assessment Tools for Cloud
Key Vulnerability Assessment Methodologies
Best Practices
3) Explain privacy and security issues specific to cloud computing environments.
Privacy and Security Issues in Cloud Computing
Key Privacy Issues
Major Security Concerns
How to Address These Challenges (in brief)
Quick Review
4) Describe the architectural considerations for secure cloud computing.
Architectural Considerations for Secure Cloud Computing
1. Identity and Access Management (IAM)
2. Network Security and Segmentation
3. Data Security
4. Application Security
5. Configuration and Posture Management
6. Monitoring, Logging, and Incident Response
7. Resilience, Redundancy, and Scalability
8. Automation and Centralization
9. Compliance and Governance
10. Shared Responsibility Model Awareness
5) What is Trusted Cloud Computing, and how does it ensure security?
What is Trusted Cloud Computing?
How Trusted Cloud Computing Ensures Security
In Practice
6) Explain identity management and access control in the context of cloud security.
Identity Management and Access Control in Cloud Security
What Are Identity Management and Access Control?
Key Mechanisms & Best Practices
Why Are IAM and Access Control Critical in the Cloud?
7) Discuss autonomic security and its relevance in cloud computing.
Autonomic Security in Cloud Computing
Key Features of Autonomic Security
Relevance in Cloud Computing
Summary Table
8) What are virtual threats and how are they managed in virtualization security?
Virtual Threats in Virtualization Security
Common Virtual Threats
Managing Virtual Threats
1. Hypervisor Security & Patching
2. Network Configuration
3. Access Control
4. Malware Protection & Monitoring
5. VM Lifecycle Management
6. Encryption & Key Management
7. Isolation and Segregation
Quick Review
9) Provide recommendations for VM security and specific techniques used to secure virtual machines.
Recommendations and Techniques for VM Security
1. Access Controls & Identity Management
2. Data Encryption
3. Hypervisor and Host Security
4. Secure VM Configuration and Hardening
5. Continuous Monitoring & Endpoint Protection
6. Vulnerability Management & Patching
7. Network Segmentation
8. Backup & Disaster Recovery
9. Audit & Compliance
10) Discuss the security issues related to SaaS in a cloud computing environment.
Security Issues Related to SaaS in Cloud Computing
1. Data Leaks and Loss
2. Misconfiguration Risks
3. Poor Access Control & Account Hijacking
4. API Vulnerabilities
5. Insider Threats
6. Shadow IT & Supply Chain Attacks
7. Regulatory Compliance Challenges
8. Virtualization and Multi-Tenancy Risks