Module 33: Vulnerability and Threat Analysis
The CCSP exam expects you to understand that vulnerability scanning in cloud requires CSP coordination, and that the threat landscape shifts because you share infrastructure with unknown tenants.
Vulnerability Scanning in Cloud: The Permission Problem
In on-premises environments, you scan whatever you want. In cloud, scanning the provider’s infrastructure looks like an attack. The exam tests this critical constraint.
Key rules:
- Most CSPs require pre-authorization before penetration testing or aggressive scanning
- You can scan your own instances and applications without restriction in most cases
- You CANNOT scan the underlying hypervisor, physical network, or provider management plane
- Some CSPs have relaxed authorization requirements for common scanning (AWS no longer requires pen test approval for most services)
If the exam asks whether you need CSP permission to scan cloud infrastructure, the answer depends on WHAT you are scanning. Your own VMs? Usually no. The provider’s infrastructure? Always yes (and they will likely say no).
Cloud-Specific Vulnerability Categories
Beyond traditional CVEs, cloud environments introduce unique vulnerability classes:
- Misconfiguration — the number one cloud vulnerability. Open storage buckets, overly permissive IAM policies, public-facing databases
- Insecure APIs — management APIs with weak authentication or missing rate limiting
- Broken access control — IAM policies that grant excessive privileges
- Insufficient logging — inability to detect or investigate incidents because logging was not enabled
- Shared technology vulnerabilities — hypervisor flaws, container escape, side-channel attacks
The exam consistently ranks misconfiguration as the top threat. When a question presents a cloud breach scenario, check for misconfiguration before looking for sophisticated attack vectors.
Threat Modeling for Cloud
Cloud threat modeling extends traditional approaches with cloud-specific considerations:
- STRIDE — Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege
- CSA Top Threats — updated cloud-specific threat catalog from the Cloud Security Alliance
- MITRE ATT&CK Cloud Matrix — maps adversary tactics and techniques specific to cloud environments
The exam expects you to identify threats that are amplified in cloud:
- Account hijacking — a compromised cloud account can destroy the entire environment
- Insider threats at the CSP — provider employees with access to infrastructure
- Advanced persistent threats — state actors targeting cloud infrastructure for broad impact
- Data exfiltration — easier when data is accessible via internet-facing APIs
Cloud Security Posture Management (CSPM)
CSPM tools automate the detection of misconfigurations and compliance violations. The exam may reference these as a modern approach to continuous vulnerability management:
- Continuously scan cloud configurations against security baselines
- Detect drift from approved configurations
- Map findings to compliance frameworks (CIS Benchmarks, NIST, PCI DSS)
- Provide automated remediation for common misconfigurations
CSPM addresses the number one cloud vulnerability — misconfiguration. If the exam asks about the MOST effective tool for reducing cloud-specific risk, CSPM is often the best answer because it targets the most common attack vector.
Vulnerability Prioritization in Cloud
Not all vulnerabilities carry equal weight. The exam tests whether you can prioritize based on cloud context:
- An internet-facing resource with a critical vulnerability is higher priority than an internal one
- A misconfigured IAM policy affecting all resources is higher priority than a single-instance vulnerability
- Vulnerabilities in the management plane (console, API) are more impactful than data plane issues
- Shared responsibility matters: vulnerabilities in provider-managed components require provider remediation, not customer patching
The exam rewards candidates who think about blast radius. A vulnerability that could compromise the entire cloud account is always higher priority than one affecting a single workload.
Threat Intelligence Integration
Cloud environments benefit from threat intelligence feeds that include cloud-specific indicators:
- Known malicious IP ranges targeting cloud APIs
- Compromised credentials sold on dark web targeting cloud platforms
- New cloud service vulnerabilities disclosed by CSPs
- Industry-specific threat reports referencing cloud attack campaigns
The exam may ask how to operationalize threat intelligence in cloud. The answer typically involves integrating feeds with cloud-native security services (GuardDuty, Security Center, Security Command Center) for automated detection and response.