Attackers are increasingly taking advantage of trusted vendor relationships to perform software and service based supply chain attacks. As cloud adoption continues to grow, we will see sophisticated threat actors like APT29 increase targeting of cloud vendors.
If a cloud vendor accessed your environment in an unusual way would you know?
If a cloud vendors activity in your environment changed would you know?
Permiso provided their thoughts on this topic earlier this week on SC Magazine: