Wednesday 15 September 2021

IoT security attack surface

Shadow in the cloud computing

Shadow SaaS

An unapproved cloud application that is connected in some way (usually via API) to that organization's SaaS or IaaS with access to corporate data but without permission from the organization.

how the cloud company installed agents on client' server without permission this is security breach or security compliance.??

For example: Microsoft Azure silently installs management agents on its Linux virtual machines, which now have RCE and LPE vulns.  #OMIGOD