Which of the following threats MUST be included while conducting threat modeling for a Cloud Service Provider (CSP)?
Risks of data breaches that can result from inadequate encryption of tenant data in transit and at rest
Potential legal actions from third parties due to tenants’ activities on the CSP’s platform
Vulnerabilities in shared resources that can be exploited by attackers to affect multiple tenants
Threats originating from the CSP’s tenants that can impact the infrastructure and other tenants
Submit