A corporation migrates to a public cloud service, and the security team identifies a critical vulnerability in the cloud provider’s API. What is the most likely threat arising from this flaw?
A.
Distributed Denial-of-Service (DDoS) attacks on cloud servers
The CEH Cloud Computing module identifies cloud APIs as one of the most critical attack surfaces in public cloud environments. APIs control provisioning, configuration, authentication, and management of cloud resources.
A vulnerability in a cloud API can allow attackers to:
Bypass authentication
Escalate privileges
Access or modify cloud resources
Create or delete services
Option B is therefore correct.
Option A relates to availability, not API flaws.
Option C is managed by the provider and unrelated to APIs.
Option D would require key compromise, not just API weakness.
CEH strongly emphasizes API security as a top cloud risk.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit