206k views
0 votes
In the ___________________stage, the cloud environment is analyzed to identify potential vulnerabilities and shortcomings that threats can exploit. The cloud provider can be asked to produce statistics and other information about past attacks (successful and unsuccessful) carried out in its cloud.

User Kamyl
by
3.3k points

1 Answer

4 votes

Answer:

Risk assessment

Step-by-step explanation:

As applications keep migrating to the cloud, the security of these applications and data become serious issues for consideration. Cloud-related Risk assessment becomes pertinent before systems are deployed to the cloud.

Some of the risk assessed are:

  1. The organization's APIs on the cloud can be compromised.
  2. Data corruption and deletion risk
  3. Attack on credentials risk: This happens when basic information about an organization is targeted by the attacker for access to a sophisticated system.
  4. The staff becomes uncomfortable as they deal with new work complexity. Staff within the organization have to learn to deal with new environments and work ethics.

User Gareth Simpson
by
4.0k points