Compare and contrast the process/steps of threat modeling/vulnerability scanning in the following cloud service providers’ environments:
- Microsoft Azure
- Amazon Web Services (AWS)
- Discuss and compared four (4) requirements necessary to be performed threat modeling in Azure and AWS platforms?
- Discuss two common tools use to perform threat modeling in both AWS and Azure cloud platforms
- Would you need permission to perform threat modeling with your PaaS service provider? If yes, why?