Common attacks against cloud resources include accessing service endpoints exposed to the Internet, brute forcing weak passwords, re-using stolen credentials, and access to exposed data storage containers. The root cause leading to the success of these attacks is typically misconfigurations in the deployment and operation of cloud workloads. Although public clouds present unique challenges to security teams, Azure comes with several tools that can help prevent such attacks from occurring.
Governing Your Azure Workloads
Denne ressource er tilgængelig på English.