CCC.F16: Budgeting
Description:Provides the ability to trigger alerts when spending thresholds are approached or exceeded for the service.
Related Threats:
ID | Title | Description |
---|---|---|
CCC.TH12 | Resource Constraints are Exhausted | An attack or misconfiguration can consume all available resources, such as memory, CPU, or storage, to disrupt the service or deny access to legitimate users. This can be achieved through repeated requests, resource-intensive operations, or the lowering of rate/budget limits. Through auto-scaling, the attacker may also attempt to exhaust higher-level budget thresholds to impact other systems in the same scope. |