Cloud, Container, and Virtualization Operations

Key Takeaways

  • Cloud security operations require understanding shared responsibility for IaaS, PaaS, and SaaS.
  • Misconfiguration is a common cloud risk, especially public storage, excessive IAM permissions, and exposed management interfaces.
  • Container security includes trusted images, minimal base images, scanning, secrets management, and runtime controls.
  • Virtualization security depends on hypervisor patching, VM isolation, templates, snapshots, and administrative access control.
  • Infrastructure as code helps consistency but can also rapidly deploy insecure settings if not reviewed.
Last updated: April 2026

Cloud, Container, and Virtualization Operations

Cloud and virtualization do not remove security operations. They change who manages each layer and how quickly mistakes can scale.

Shared Responsibility

ModelProvider usually managesCustomer usually manages
IaaSFacilities, hardware, core virtualizationOS, applications, data, IAM, network rules
PaaSPlatform runtime and more infrastructureApplication code, data, IAM, configuration
SaaSApplication platform and infrastructureUsers, data, sharing, identity integration, settings

The exam often asks which party is responsible. In SaaS, the provider patches the service, but the customer still manages accounts, access, data, and sharing settings.

Cloud Operations Controls

ControlPurpose
IAM least privilegeLimits cloud API and resource access
MFA for administratorsProtects management plane access
Security groups and network ACLsRestrict network paths
Cloud loggingRecords API calls, authentication, and resource activity
CSPMFinds risky cloud configurations
Secrets managerStores credentials outside code and images
TaggingSupports ownership, cost, data classification, and response
IaC reviewPrevents insecure templates from being repeatedly deployed

Container Security

AreaGood practice
Image sourceUse trusted registries and signed images where available
Base imageUse minimal, maintained images
Vulnerability scanningScan images before deployment and during runtime lifecycle
SecretsDo not bake secrets into images or environment files in source control
PrivilegesAvoid privileged containers and unnecessary root execution
RuntimeLimit capabilities, monitor behavior, and segment workloads

Virtualization Security

RiskControl
Hypervisor compromisePatch hypervisor and restrict admin access
VM sprawlInventory, ownership, and lifecycle management
Insecure templatesHarden golden images before cloning
Snapshot exposureProtect and expire snapshots containing sensitive data
Escape or lateral movementIsolation, segmentation, and least privilege

Practical Scenario

A team deploys a containerized API into a cloud environment. Strong operations would include least-privilege service roles, private network placement where possible, TLS at ingress, image scanning in CI, no hardcoded secrets, runtime logging, resource limits, patched worker nodes, and a reviewed infrastructure-as-code template.

Common Exam Traps

TrapBetter exam reasoning
"The cloud provider secures everything."Shared responsibility leaves identity, data, and configuration with the customer.
"A container is a full VM."Containers share the host kernel and need image and runtime controls.
"Snapshots are harmless temporary files."Snapshots can contain sensitive data and must be protected.
"IaC is automatically secure."IaC needs review, scanning, and change control.

Quick Drill

Pick the likely control:

  1. Find public storage buckets: CSPM or cloud security posture rule.
  2. Prevent secrets in images: secrets manager and CI scanning.
  3. Harden many identical VMs: secure golden image template.
  4. Track who changed a cloud firewall rule: cloud audit logs.
  5. Reduce container privilege: run as non-root and drop capabilities.
Test Your Knowledge

In a SaaS application, who is usually responsible for disabling a former employee account?

A
B
C
D
Test Your KnowledgeMulti-Select

Which actions improve container security? Choose two.

Select all that apply

Scan images for vulnerabilities before deployment
Store production passwords inside the container image
Use minimal maintained base images
Run every container as privileged by default
Test Your Knowledge

A cloud team repeatedly deploys the same overly permissive security group from a template. What should be reviewed first?

A
B
C
D