In the past, traditional networks and system infrastructures allowed organizations to clearly define a perimeter to secure. Clouds used today make this task difficult because of their breadth of organizational boundaries and distributed control points. Attackers are increasingly targeting the cloud to take advantage of these ill-defined boundaries. They are also targeting the public cloud because it offers a chance to move laterally and breach other virtual networks in the same public cloud.