![](https://www.lioneltan.com/wp-content/uploads/2020/05/image-83.png)
Undocumented cloud configuration changes, whether done by attackers or for legitimate business reasons, present a significant security threat
Undocumented cloud configuration changes, whether done by attackers or for legitimate business reasons, present a significant security threat