Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

3.4.3.3. Common Cloud Security Threats

3.4.3.3. Common Cloud Security Threats

Understanding common threats helps you design effective detection and prevention controls.

Top threats for the DOP-C02 exam:
ThreatDetection ServicePrevention
Credential compromiseGuardDuty (UnauthorizedAccess:IAMUser)MFA, role-based access, short-lived credentials
Data exfiltrationGuardDuty + Macie + VPC Flow LogsVPC endpoints, S3 bucket policies, NACLs
Privilege escalationCloudTrail + Access AnalyzerPermissions boundaries, SCPs
Crypto miningGuardDuty (CryptoCurrency:EC2)IMDSv2, security groups, monitoring
Supply chain attackInspector + ECR scanningImage signing, CodeArtifact policies
DDoSShield + WAFCloudFront, rate limiting, auto scaling
MisconfigurationConfig + Security HubSCPs, Service Catalog, cfn-guard

Instance metadata service (IMDS) attacks: Attackers exploit SSRF vulnerabilities to steal instance credentials via the metadata endpoint (169.254.169.254).

IMDSv2 mitigation:
# Require IMDSv2 (token-based) — blocks SSRF attacks
aws ec2 modify-instance-metadata-options \
  --instance-id i-1234567890abcdef0 \
  --http-tokens required \
  --http-put-response-hop-limit 1

IMDSv2 requires a PUT request to get a session token before accessing metadata — SSRF attacks can't perform the two-step process.

Exam Trap: GuardDuty finding UnauthorizedAccess:IAMUser/InstanceCredentialExfiltration.OutsideAWS means instance role credentials are being used from outside AWS (not from the instance). This is a strong indicator of credential theft. The correct response is: rotate the role credentials (by revoking active sessions), investigate the instance for compromise, and enable IMDSv2 if not already required.

Alvin Varughese
Written byAlvin Varughese•Founder•15 professional certifications