When looking at the components in a cloud based solution, we can conclude that not much is changed. We still use servers, networking and enterprise storage components. Cloud based services are therefore not very different when it comes to security. In the end it all depends on the party maintaining the service.
Security measures for cloud based components has to be applied in a similar way. The big difference is the way how to divide resources. From complete servers to smaller (virtual) containers. With the help of Lynis enterprise, these parts can now be scanned as well.
CoreOS & Linux AMI
As our audit tool only needs a normal shell, cloud based operating systems are also supported. Think of Linux AMI, used on the Amazon AWS cloud, or bare install CoreOS.