Applications & Cloud Layers
Applications
- Risks: Code injection, insecure libraries/dependencies, authentication flaws.
- Controls: Secure SDLC, dependency scanning, input validation, runtime application self-protection (RASP).
Cloud / Connectivity
- Risks: API abuse, misconfigured access, data exfiltration.
- Controls:
- IAM (Identity & Access Management).
- Strong encryption (in transit & at rest).
- API gateways.
- Shared responsibility model with providers.