Cloud Computing has revolutionized IT infrastructure with scalability, availability, and flexibility. Cloud Infrastructure is provisioned with automation and orchestration. This has brought a new set of Cyber Security Attacks to enterprise IT infrastructure that uses cloud computing resources. The following are the cyber security attacks:
Data Exfiltration – The attacker gets the access of un-authorized of data from the cloud due to misconfiguration, credential theft or malware.
Account Hijacking – Also known as cloud jacking where the attacker compromises and gets access of cloud account.
DoS and DDoS – Attackers perform DoS and DDoS attack on the cloud infrastructure making the computing resources un-available to the consumers.
API Attacks – Cloud uses API (application programming interface) extensively communication and data transfer with peer applications and other IT infrastructure. Attackers exploit the weakness in API and get access to the information passing through the API.
Supply Chain Attacks – The attackers targets and exploits the vulnerabilities in the 3rd party hardware and software present in the cloud either deployed by the service provider and consumer.