ccsp video for in the context of cloud-specific risk assessment, which STRIDE element is most directly associated with the risk of an attacker modifying
In the context of cloud-specific risk assessment, which STRIDE element is most directly associated with the risk of an attacker modifying cloud-based configuration files?