1. Cloud Misconfigurations
- Leverage cloud service policies to prevent users from sharing data publicly.
- Deploy cloud or third-party tools to detect misconfigurations.
- Limit access to cloud resources.
- Audit data access logs.
- Restrict data access.
2. Poor Access Controls
- Use multi-factor authentication.
- Leverage cloud-based access controls.
- Avoid the use of application programming interface (API) keys in software version control systems.
3. Shared Tenancy and Supply Chain Vulnerabilities
- Encrypt data at rest and in transit.
- Use dedicated, whole-unit or bare-metal instances for sensitive workloads.
- Choose cloud offerings that have components evaluated against National Information Assurance Partnership (NIAP) Protection Profiles.