Migrating to the cloud opens up new possibilities for an organization, but at the same time, it also increases the attack vectors for an adversary. In the cloud, the perimeter security alone won’t help in keeping the bad actors away. Organisations too need to think out of the box.
Cloud is mostly secure by default, so if we see the responsibility matrix, most of the activities are being handled by the cloud provider but there are certain things that fall on the tenant. The majority of the vulnerabilities are found because of the misconfiguration issues in these three sections.
This talk will be about looking at a cloud infrastructure from an attacker’s point of view and discovering how honeypots can help the defenders, keeping the bad actors away from the cloud infrastructure of your organisation.
We will be covering: