Vulnerabilities Risk of Shared Tenancy Improper Cloud Configuration Management Identity and Access Management Flaws Concepts Identity and Access Management Cloud Access Security Broker