Case Study
Threat detection and response in cloud environments
THREAT DETECTION CLOUD-SECURITY AND RESPONSE ENTERPRISE Threat detection and response in cloud environments WHITE PAPER SECURITY THAT THINKSSECURITY THAT THINKS WHITE PAPER : Threat detection and response in cloud environments 2 TABLE OF CONTENTS Differences in detecting threats from traditional environments .................... 3 Attack lifecycle in the cloud .................................................................... 4 Top cloud security threats ........................................................................ 5 Analysis of a real cloud attack .................................................................. 6 The Cloud Hopper attack lifecycle ......................................................................7 Shared responsibility model .........................