A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is
As enterprises place more services in public cloud and as the public cloud providers introduce more infrastructure and platform services directly into the hands of developers, it is becoming increasingly complex and time-consuming to answer the seemingly straightforward question "Are we using these services securely?" and "Does the configuration of my cloud services represent excessive risk?" For example, manually assessing the secure setup and configuration in cloud environments acrossdoi:10.32628/cseit206268 fatcat:tamcusngtzax7dvojydrx6lj6q