Chapter 16
15 min read
Section 67 of 98

Cloud Security Fundamentals

Cloud Security and AI

Introduction

The migration to cloud computing has fundamentally reshaped the security perimeter. Traditional network-based defenses assumed a clear boundary between trusted internal networks and untrusted external ones. Cloud environments obliterate this assumption, distributing workloads across shared infrastructure managed by third-party providers.

Understanding cloud security begins with recognizing that the threat model is fundamentally different from on-premises environments. Misconfigurations, not sophisticated exploits, are the leading cause of cloud breaches. This section establishes the foundational concepts every AI security engineer must master before applying machine learning to cloud defense.


The Shared Responsibility Model

Every major cloud provider operates under a shared responsibility model that divides security obligations between the provider and the customer. The provider secures the infrastructure "of" the cloud—physical data centers, hypervisors, and the global network backbone. The customer secures everything "in" the cloud—data, identities, application configurations, and access policies.

The exact division varies by service model. In Infrastructure-as-a-Service (IaaS), customers manage the operating system and everything above it. In Platform-as-a-Service (PaaS), the provider manages the runtime and OS, but customers own data and access controls. In Software-as-a-Service (SaaS), the provider manages nearly everything except user access and data classification.

Key Insight: The shared responsibility model means that a cloud provider can be 100% compliant with their security obligations while the customer remains completely vulnerable. Most cloud breaches occur on the customer side of the shared responsibility line.

Top Cloud Security Risks

The Cloud Security Alliance (CSA) and real-world breach data consistently highlight the same categories of cloud risk. Misconfigurations remain the number one cause of cloud data breaches, from publicly exposed S3 buckets to overly permissive IAM policies that grant administrative access to services that only need read permissions.

Insecure APIs represent the second major risk vector. Cloud services are managed entirely through APIs, and every misconfigured endpoint, weak authentication token, or lack of rate limiting creates an attack surface. Excessive permissions compound these risks—the principle of least privilege is routinely violated in cloud environments where developers prioritize speed over security.

  • Misconfigurations: Public storage buckets, open security groups, default credentials, and unencrypted data stores
  • Insecure APIs: Weak authentication, missing input validation, excessive data exposure in API responses
  • Excessive Permissions: Overprivileged IAM roles, wildcard policies, and unused service accounts
  • Lack of Visibility: Shadow IT, untracked resources, and insufficient logging across multi-cloud deployments
  • Data Exfiltration: Unauthorized data movement through misconfigured egress rules or compromised credentials

Cloud-Native Attack Vectors

Cloud-native attacks exploit the unique characteristics of cloud platforms rather than traditional vulnerabilities. IAM privilege escalation is one of the most dangerous vectors—an attacker who compromises a low-privilege service account can systematically escalate permissions by exploiting overly permissive role policies or abusing role assumption chains.

Server-Side Request Forgery (SSRF) attacks gained notoriety after the Capital One breach, where an attacker used SSRF to reach the instance metadata service and steal IAM credentials. Container escape vulnerabilities allow attackers to break out of containerized workloads and access the underlying host or other tenants' containers.

  1. IAM Escalation: Chaining permissions through role assumption, policy attachment, or credential theft from metadata services
  2. SSRF to Metadata: Exploiting web applications to query cloud metadata endpoints (169.254.169.254) and steal temporary credentials
  3. Container Escapes: Breaking out of container isolation through kernel vulnerabilities, misconfigured namespaces, or privileged mode containers
  4. Cross-Account Attacks: Leveraging trust relationships between accounts to pivot laterally across an organization's cloud infrastructure

These attack vectors underscore why cloud security requires a different mindset than traditional infrastructure defense. In the next section, we will explore how AI and machine learning are being applied to detect and prevent these cloud-specific threats at scale.

Loading comments...