module4-cloudcomputing
module4-cloudcomputing
continuous monitoring.
2. Misconfiguration
o Challenge: Misconfigured cloud storage, services, or
data
2. Compliance with Regulations
Users, particularly those in regulated industries (finance,
4. Data Leakage
o Risk: If shared images contain residual data from
shared images.
Access Controls:
to sensitive systems.
Monitoring and Logging:
response.
Configuration Management:
images.
o Conduct regular security assessments to identify and
remediate misconfigurations.
Incident Response Planning: