Skip to the content.

🔗 Link to the Room

📚 Study Notes

Learning Objectives

What Is Cloud

☁️ IaaS – You manage the OS

☁️ PaaS – You write code

☁️ SaaS – You just use it

 

[!NOTE]

✅ IaaS → you manage most things

✅ PaaS → you manage code only

✅ SaaS → you manage nothing

 


❓Which cloud model allows you to migrate a big on-premises network to the cloud?IaaS

Solution: This is mentioned in the text as well as you can easily google it :) —

❓Which cloud model do Elastic Cloud and CrowdStrike Falcon fit into? Note: You may need to perform external research to answer this question. SaaS

Solution: Same as previous one - search for it on the web. —

 

Security of the Cloud

Risk: Cloud Provider Vulnerabilities

Risk: Poor Visibility in the Cloud

 

SaaS risks: token theft, data exfiltration, shadow IT (employees using unapproved SaaS tools) especially this can lead to unexpected data breaches.

 

Example Cloud Incidents

1. Okta (SaaS, 2023): Support system breached; session tokens exposed; attackers logged into customer tenants.
2. BeyondTrust (SaaS, 2024): Remote Support SaaS compromised; attackers gained remote access to customers.
3. Google Cloud (IaaS, 2025): Cloud Run vulnerability; unauthorized access to container images.

 

Cloud ≠ fully safe
You trade control and visibility for convenience.

 


❓Is the cloud provider responsible for securing and monitoring its own infrastructure (Yea/Nay)? Yea

Solution: Cloud providers are responsible for securing and monitoring their own infrastructure (physical data centers, HW, networking, Virtualization layer) = this is called “Security of the cloud”. You as a customer are responsible for what you put in. —

❓But should you trust the cloud provider without watching for supply chain threats? (Yea/Nay) Nay

Solution: Cloud providers can be breached and that would affect many customers at once. —

 

Security in the Cloud

Cloud Migration Pitfalls

Logging in the Cloud

Cloud Incidents

 


❓Does moving an unpatched server to the cloud make it secure again? (Yea/Nay) Nay

Solution: Moving an old, unpatched server to the cloud doesn’t fix its vulnerabilities as the server has the same security flaws as it had. —  

Cloud ≠ automatic security — it helps with availability and hardware, but doesn’t fix your mistakes.

 


❓What is the first major obstacle to integrating most cloud products with a SIEM? Paid Logs

Solution: Many cloud providers charge extra to export logs or use advanced logging features and if your SIEM relies on these logs, you can’t collect everything for free. —

 

What to Protect & Monitor

Cloud Monitoring Challenges

 

Model Logging Capabilities
On-premises you control everything, you can log everything from servers, apps, network, endpoints
IaaS you control the VMs and workloads, but the cloud provider controls the underlying infrastructure, hence fewer logs available
SaaS you only see user activity and app-level events which means least amount of logs

 

The less control you have, the less logging data you get → harder to monitor everything.

 

Common Cloud Security Tools

tool what does it do
CASB enforce cloud security policies
CWPP protect workloads from malware
CSPM alert on misconfigurations

1. List your clouds: know where critical data lives
2. Know the risks: plan for possible cloud breaches
3. Enable cloud logs: SaaS + IaaS + PaaS
4. Enable workload logs: treat VMs like on-premises systems
5. Collect the logs: forward to SIEM (cloud logs aren’t kept long)
6. Monitor for anomalies: detect suspicious logins and admin actions

 


❓What term describes cloud compute resources like VMs or containers? Workloads

❓Which of the mentioned cloud security tools do Falco and Tetragon fit into? Note: You may need to perform external research to answer this question. CWPP

 

Challenge

 


❓What is the flag you get after completing the first exercise?THM{****_**_*_********}

❓What is the flag you get after completing the second exercise?THM{*****_***_*****_**********}

 

Summary